003 File Manager
Current Path:
/usr/local/lib/python3.8/site-packages/salt/modules
usr
/
local
/
lib
/
python3.8
/
site-packages
/
salt
/
modules
/
📁
..
📄
__init__.py
(35 B)
📁
__pycache__
📄
acme.py
(12.74 KB)
📄
aix_group.py
(4.11 KB)
📄
aix_shadow.py
(1.93 KB)
📄
aixpkg.py
(10.91 KB)
📄
aliases.py
(5.07 KB)
📄
alternatives.py
(5.1 KB)
📄
ansiblegate.py
(11.38 KB)
📄
apache.py
(12.47 KB)
📄
apcups.py
(2.21 KB)
📄
apf.py
(3.09 KB)
📄
apkpkg.py
(16 KB)
📄
aptly.py
(15.28 KB)
📄
aptpkg.py
(102.35 KB)
📄
archive.py
(46.97 KB)
📄
arista_pyeapi.py
(22.06 KB)
📄
artifactory.py
(24.78 KB)
📄
at.py
(10.65 KB)
📄
at_solaris.py
(8.56 KB)
📄
augeas_cfg.py
(13.93 KB)
📄
aws_sqs.py
(6.55 KB)
📄
azurearm_compute.py
(19.55 KB)
📄
azurearm_dns.py
(14.7 KB)
📄
azurearm_network.py
(80.8 KB)
📄
azurearm_resource.py
(34.27 KB)
📄
bamboohr.py
(7.36 KB)
📄
baredoc.py
(11.13 KB)
📄
bcache.py
(28.97 KB)
📄
beacons.py
(27.89 KB)
📄
bigip.py
(69.11 KB)
📄
bluez_bluetooth.py
(6.76 KB)
📄
boto3_elasticache.py
(37.34 KB)
📄
boto3_elasticsearch.py
(53.17 KB)
📄
boto3_route53.py
(39.75 KB)
📄
boto3_sns.py
(12.93 KB)
📄
boto_apigateway.py
(61.86 KB)
📄
boto_asg.py
(35.7 KB)
📄
boto_cfn.py
(7.95 KB)
📄
boto_cloudfront.py
(12.75 KB)
📄
boto_cloudtrail.py
(14.45 KB)
📄
boto_cloudwatch.py
(10.99 KB)
📄
boto_cloudwatch_event.py
(9.48 KB)
📄
boto_cognitoidentity.py
(14.63 KB)
📄
boto_datapipeline.py
(6.94 KB)
📄
boto_dynamodb.py
(10.54 KB)
📄
boto_ec2.py
(79.29 KB)
📄
boto_efs.py
(14.05 KB)
📄
boto_elasticache.py
(23.69 KB)
📄
boto_elasticsearch_domain.py
(15.85 KB)
📄
boto_elb.py
(35.4 KB)
📄
boto_elbv2.py
(10.81 KB)
📄
boto_iam.py
(75.62 KB)
📄
boto_iot.py
(26.2 KB)
📄
boto_kinesis.py
(19.63 KB)
📄
boto_kms.py
(17.29 KB)
📄
boto_lambda.py
(35.05 KB)
📄
boto_rds.py
(34.92 KB)
📄
boto_route53.py
(32.55 KB)
📄
boto_s3.py
(4.24 KB)
📄
boto_s3_bucket.py
(31.8 KB)
📄
boto_secgroup.py
(25.22 KB)
📄
boto_sns.py
(7.22 KB)
📄
boto_sqs.py
(6.43 KB)
📄
boto_ssm.py
(3.65 KB)
📄
boto_vpc.py
(112.81 KB)
📄
bower.py
(5.89 KB)
📄
bridge.py
(10.86 KB)
📄
bsd_shadow.py
(6.92 KB)
📄
btrfs.py
(33.64 KB)
📄
cabal.py
(3.79 KB)
📄
capirca_acl.py
(40.04 KB)
📄
cassandra_cql.py
(39 KB)
📄
cassandra_mod.py
(3.97 KB)
📄
celery.py
(3.33 KB)
📄
ceph.py
(15.82 KB)
📄
chassis.py
(1.52 KB)
📄
chef.py
(4.66 KB)
📄
chocolatey.py
(39.34 KB)
📄
chronos.py
(2.89 KB)
📄
chroot.py
(11.51 KB)
📄
cimc.py
(23.02 KB)
📄
ciscoconfparse_mod.py
(14.79 KB)
📄
cisconso.py
(3.83 KB)
📄
cloud.py
(9.39 KB)
📄
cmdmod.py
(162.16 KB)
📄
composer.py
(10.31 KB)
📄
config.py
(16.85 KB)
📄
consul.py
(68.93 KB)
📄
container_resource.py
(13.36 KB)
📄
cp.py
(27.98 KB)
📄
cpan.py
(5.54 KB)
📄
cron.py
(26.8 KB)
📄
cryptdev.py
(10.08 KB)
📄
csf.py
(16.04 KB)
📄
cyg.py
(8.32 KB)
📄
daemontools.py
(5.41 KB)
📄
data.py
(3.83 KB)
📄
datadog_api.py
(7.64 KB)
📄
ddns.py
(7.04 KB)
📄
deb_apache.py
(7.41 KB)
📄
deb_postgres.py
(4.22 KB)
📄
debconfmod.py
(4.06 KB)
📄
debian_ip.py
(64.78 KB)
📄
debian_service.py
(6.6 KB)
📄
debuild_pkgbuild.py
(34.69 KB)
📄
defaults.py
(5.42 KB)
📄
devinfo.py
(9.05 KB)
📄
devmap.py
(627 B)
📄
dig.py
(7.45 KB)
📄
disk.py
(30.44 KB)
📄
djangomod.py
(7.53 KB)
📄
dnsmasq.py
(5.71 KB)
📄
dnsutil.py
(11.51 KB)
📄
dockercompose.py
(32.62 KB)
📄
dockermod.py
(224.97 KB)
📄
dpkg_lowpkg.py
(12.9 KB)
📄
drac.py
(10.97 KB)
📄
dracr.py
(38.53 KB)
📄
drbd.py
(7.19 KB)
📄
dummyproxy_pkg.py
(2.46 KB)
📄
dummyproxy_service.py
(2.91 KB)
📄
ebuildpkg.py
(38.74 KB)
📄
eix.py
(1.58 KB)
📄
elasticsearch.py
(51.44 KB)
📄
environ.py
(8.96 KB)
📄
eselect.py
(4.99 KB)
📄
esxcluster.py
(502 B)
📄
esxdatacenter.py
(514 B)
📄
esxi.py
(1.64 KB)
📄
esxvm.py
(481 B)
📄
etcd_mod.py
(7.02 KB)
📄
ethtool.py
(7.65 KB)
📄
event.py
(8.23 KB)
📄
extfs.py
(8.78 KB)
📄
file.py
(224.74 KB)
📄
firewalld.py
(20.51 KB)
📄
freebsd_sysctl.py
(4.76 KB)
📄
freebsd_update.py
(6.19 KB)
📄
freebsdjail.py
(7.16 KB)
📄
freebsdkmod.py
(6.17 KB)
📄
freebsdpkg.py
(17.04 KB)
📄
freebsdports.py
(13.13 KB)
📄
freebsdservice.py
(12.53 KB)
📄
freezer.py
(8.91 KB)
📄
gcp_addon.py
(4.07 KB)
📄
gem.py
(10.6 KB)
📄
genesis.py
(21.75 KB)
📄
gentoo_service.py
(9.18 KB)
📄
gentoolkitmod.py
(8.33 KB)
📄
git.py
(171.44 KB)
📄
github.py
(53.19 KB)
📄
glanceng.py
(4.69 KB)
📄
glassfish.py
(19.49 KB)
📄
glusterfs.py
(19.55 KB)
📄
gnomedesktop.py
(6.85 KB)
📄
google_chat.py
(1.52 KB)
📄
gpg.py
(39.99 KB)
📄
grafana4.py
(30.27 KB)
📄
grains.py
(23.67 KB)
📄
groupadd.py
(10.85 KB)
📄
grub_legacy.py
(3.08 KB)
📄
guestfs.py
(2.32 KB)
📄
hadoop.py
(3.76 KB)
📄
haproxyconn.py
(10.17 KB)
📄
hashutil.py
(6.77 KB)
📄
heat.py
(25.26 KB)
📄
helm.py
(39.27 KB)
📄
hg.py
(7.16 KB)
📄
highstate_doc.py
(22.76 KB)
📄
hosts.py
(10.47 KB)
📄
http.py
(3.75 KB)
📄
icinga2.py
(4.46 KB)
📄
idem.py
(1.75 KB)
📄
ifttt.py
(2.28 KB)
📄
ilo.py
(15.98 KB)
📄
incron.py
(7.68 KB)
📄
influxdb08mod.py
(15.07 KB)
📄
influxdbmod.py
(16.13 KB)
📄
infoblox.py
(17.53 KB)
📄
ini_manage.py
(14.63 KB)
📁
inspectlib
📄
inspector.py
(8.19 KB)
📄
introspect.py
(4.02 KB)
📄
iosconfig.py
(14.78 KB)
📄
ipmi.py
(25.45 KB)
📄
ipset.py
(17.97 KB)
📄
iptables.py
(57.33 KB)
📄
iwtools.py
(3.99 KB)
📄
jboss7.py
(20.51 KB)
📄
jboss7_cli.py
(15.23 KB)
📄
jenkinsmod.py
(11.9 KB)
📄
jinja.py
(2.66 KB)
📄
jira_mod.py
(7.07 KB)
📄
junos.py
(73.9 KB)
📄
k8s.py
(24.87 KB)
📄
kapacitor.py
(5.37 KB)
📄
kerberos.py
(5.42 KB)
📄
kernelpkg_linux_apt.py
(6.91 KB)
📄
kernelpkg_linux_yum.py
(7.46 KB)
📄
key.py
(1007 B)
📄
keyboard.py
(2.64 KB)
📄
keystone.py
(43.16 KB)
📄
keystoneng.py
(21.82 KB)
📄
keystore.py
(6.69 KB)
📄
kmod.py
(7.29 KB)
📄
kubeadm.py
(34.01 KB)
📄
kubernetesmod.py
(46.66 KB)
📄
launchctl_service.py
(9.73 KB)
📄
layman.py
(4.22 KB)
📄
ldap3.py
(18.81 KB)
📄
ldapmod.py
(5.9 KB)
📄
libcloud_compute.py
(23.51 KB)
📄
libcloud_dns.py
(9.76 KB)
📄
libcloud_loadbalancer.py
(13.17 KB)
📄
libcloud_storage.py
(12.19 KB)
📄
linux_acl.py
(7.7 KB)
📄
linux_ip.py
(5.44 KB)
📄
linux_lvm.py
(17.86 KB)
📄
linux_service.py
(4.64 KB)
📄
linux_shadow.py
(13.37 KB)
📄
linux_sysctl.py
(7.39 KB)
📄
localemod.py
(11.84 KB)
📄
locate.py
(2.58 KB)
📄
logadm.py
(9.57 KB)
📄
logmod.py
(1.24 KB)
📄
logrotate.py
(7.72 KB)
📄
lvs.py
(11.54 KB)
📄
lxc.py
(148.61 KB)
📄
lxd.py
(90.2 KB)
📄
mac_assistive.py
(6.36 KB)
📄
mac_brew_pkg.py
(19.82 KB)
📄
mac_desktop.py
(2.77 KB)
📄
mac_group.py
(6.34 KB)
📄
mac_keychain.py
(6.68 KB)
📄
mac_pkgutil.py
(2.84 KB)
📄
mac_portspkg.py
(11.36 KB)
📄
mac_power.py
(13.29 KB)
📄
mac_service.py
(19.64 KB)
📄
mac_shadow.py
(14.23 KB)
📄
mac_softwareupdate.py
(14.52 KB)
📄
mac_sysctl.py
(5.13 KB)
📄
mac_system.py
(15.2 KB)
📄
mac_timezone.py
(8.34 KB)
📄
mac_user.py
(16.36 KB)
📄
mac_xattr.py
(6.11 KB)
📄
macdefaults.py
(2.33 KB)
📄
macpackage.py
(6.94 KB)
📄
makeconf.py
(17.31 KB)
📄
mandrill.py
(6.31 KB)
📄
marathon.py
(5.36 KB)
📄
match.py
(10.28 KB)
📄
mattermost.py
(3.4 KB)
📄
mdadm_raid.py
(9.86 KB)
📄
mdata.py
(3.44 KB)
📄
memcached.py
(6.13 KB)
📄
mine.py
(18.79 KB)
📄
minion.py
(7.68 KB)
📄
mod_random.py
(6.72 KB)
📄
modjk.py
(12.48 KB)
📄
mongodb.py
(17.3 KB)
📄
monit.py
(5.51 KB)
📄
moosefs.py
(3.87 KB)
📄
mount.py
(56.18 KB)
📄
mssql.py
(14.64 KB)
📄
msteams.py
(2 KB)
📄
munin.py
(2.4 KB)
📄
mysql.py
(87.86 KB)
📄
nacl.py
(9.73 KB)
📄
nagios.py
(6.53 KB)
📄
nagios_rpc.py
(5.09 KB)
📄
namecheap_domains.py
(12.84 KB)
📄
namecheap_domains_dns.py
(5.93 KB)
📄
namecheap_domains_ns.py
(4.51 KB)
📄
namecheap_ssl.py
(25.72 KB)
📄
namecheap_users.py
(2.4 KB)
📄
napalm_bgp.py
(9.72 KB)
📄
napalm_formula.py
(11.33 KB)
📄
napalm_mod.py
(59.3 KB)
📄
napalm_netacl.py
(28.59 KB)
📄
napalm_network.py
(93.24 KB)
📄
napalm_ntp.py
(10.22 KB)
📄
napalm_probes.py
(13.25 KB)
📄
napalm_route.py
(5.09 KB)
📄
napalm_snmp.py
(7.05 KB)
📄
napalm_users.py
(6.49 KB)
📄
napalm_yang_mod.py
(20.28 KB)
📄
netaddress.py
(1.6 KB)
📄
netbox.py
(32.22 KB)
📄
netbsd_sysctl.py
(3.97 KB)
📄
netbsdservice.py
(6.49 KB)
📄
netmiko_mod.py
(19.63 KB)
📄
netscaler.py
(27.02 KB)
📄
network.py
(62.75 KB)
📄
neutron.py
(44.93 KB)
📄
neutronng.py
(15.02 KB)
📄
nexus.py
(22.95 KB)
📄
nfs3.py
(3.9 KB)
📄
nftables.py
(33.58 KB)
📄
nginx.py
(3.83 KB)
📄
nilrt_ip.py
(36.18 KB)
📄
nix.py
(8.03 KB)
📄
nova.py
(19.61 KB)
📄
npm.py
(10.35 KB)
📄
nspawn.py
(41.35 KB)
📄
nxos.py
(24.67 KB)
📄
nxos_api.py
(14.66 KB)
📄
nxos_upgrade.py
(14.74 KB)
📄
omapi.py
(3.6 KB)
📄
openbsd_sysctl.py
(3.74 KB)
📄
openbsdpkg.py
(11 KB)
📄
openbsdrcctl_service.py
(6.25 KB)
📄
openbsdservice.py
(8.31 KB)
📄
openscap.py
(2.81 KB)
📄
openstack_config.py
(3.5 KB)
📄
openstack_mng.py
(2.71 KB)
📄
openvswitch.py
(11.75 KB)
📄
opkg.py
(49.72 KB)
📄
opsgenie.py
(3.29 KB)
📄
oracle.py
(5.83 KB)
📄
osquery.py
(24.93 KB)
📄
out.py
(2.53 KB)
📄
pacmanpkg.py
(31.99 KB)
📄
pagerduty.py
(4.7 KB)
📄
pagerduty_util.py
(13.49 KB)
📄
pam.py
(2.01 KB)
📄
panos.py
(61.05 KB)
📄
parallels.py
(19.85 KB)
📄
parted_partition.py
(21.53 KB)
📄
pcs.py
(14.11 KB)
📄
pdbedit.py
(10.72 KB)
📄
pecl.py
(3.79 KB)
📄
peeringdb.py
(8.39 KB)
📄
pf.py
(9.51 KB)
📄
philips_hue.py
(1.55 KB)
📄
pillar.py
(21.29 KB)
📄
pip.py
(51.76 KB)
📄
pkg_resource.py
(11.89 KB)
📄
pkgin.py
(17.35 KB)
📄
pkgng.py
(61.1 KB)
📄
pkgutil.py
(9.88 KB)
📄
portage_config.py
(22.77 KB)
📄
postfix.py
(16.24 KB)
📄
postgres.py
(88.31 KB)
📄
poudriere.py
(7.85 KB)
📄
powerpath.py
(2.57 KB)
📄
proxy.py
(11.49 KB)
📄
ps.py
(19.45 KB)
📄
publish.py
(10.22 KB)
📄
puppet.py
(11.69 KB)
📄
purefa.py
(33.03 KB)
📄
purefb.py
(13.65 KB)
📄
pushbullet.py
(1.88 KB)
📄
pushover_notify.py
(3.48 KB)
📄
pw_group.py
(4.4 KB)
📄
pw_user.py
(12.47 KB)
📄
pyenv.py
(6.93 KB)
📄
qemu_img.py
(1.53 KB)
📄
qemu_nbd.py
(3.28 KB)
📄
quota.py
(6.43 KB)
📄
rabbitmq.py
(38.44 KB)
📄
rallydev.py
(6.09 KB)
📄
random_org.py
(23.76 KB)
📄
rbac_solaris.py
(16.15 KB)
📄
rbenv.py
(10.75 KB)
📄
rdp.py
(6.08 KB)
📄
rebootmgr.py
(7.66 KB)
📄
redismod.py
(16.36 KB)
📄
reg.py
(16.36 KB)
📄
rest_pkg.py
(2.26 KB)
📄
rest_sample_utils.py
(558 B)
📄
rest_service.py
(3.63 KB)
📄
restartcheck.py
(24.1 KB)
📄
ret.py
(1.27 KB)
📄
rh_ip.py
(38.01 KB)
📄
rh_service.py
(16.61 KB)
📄
riak.py
(5.19 KB)
📄
rpm_lowpkg.py
(27.61 KB)
📄
rpmbuild_pkgbuild.py
(24.53 KB)
📄
rsync.py
(8.04 KB)
📄
runit.py
(17.14 KB)
📄
rvm.py
(11.1 KB)
📄
s3.py
(9.93 KB)
📄
s6.py
(3.62 KB)
📄
salt_proxy.py
(4.48 KB)
📄
salt_version.py
(4.29 KB)
📄
saltcheck.py
(46.11 KB)
📄
saltcloudmod.py
(954 B)
📄
saltutil.py
(56.5 KB)
📄
schedule.py
(43.35 KB)
📄
scp_mod.py
(6.22 KB)
📄
scsi.py
(2.66 KB)
📄
sdb.py
(2.45 KB)
📄
seed.py
(8.87 KB)
📄
selinux.py
(23.83 KB)
📄
sensehat.py
(7.79 KB)
📄
sensors.py
(1.3 KB)
📄
serverdensity_device.py
(8.1 KB)
📄
servicenow.py
(4.38 KB)
📄
slack_notify.py
(7.83 KB)
📄
slackware_service.py
(6.89 KB)
📄
slsutil.py
(19.05 KB)
📄
smartos_imgadm.py
(12.09 KB)
📄
smartos_nictagadm.py
(6.51 KB)
📄
smartos_virt.py
(5.21 KB)
📄
smartos_vmadm.py
(26.37 KB)
📄
smbios.py
(10.06 KB)
📄
smf_service.py
(8.52 KB)
📄
smtp.py
(5.41 KB)
📄
snapper.py
(27.14 KB)
📄
solaris_fmadm.py
(11.27 KB)
📄
solaris_group.py
(2.8 KB)
📄
solaris_shadow.py
(7.98 KB)
📄
solaris_system.py
(3.72 KB)
📄
solaris_user.py
(11.06 KB)
📄
solarisipspkg.py
(18.7 KB)
📄
solarispkg.py
(15.42 KB)
📄
solr.py
(45.54 KB)
📄
solrcloud.py
(14.63 KB)
📄
splunk.py
(8.15 KB)
📄
splunk_search.py
(8.76 KB)
📄
sqlite3.py
(2.54 KB)
📄
ssh.py
(43.15 KB)
📄
ssh_pkg.py
(1.08 KB)
📄
ssh_service.py
(3.39 KB)
📄
state.py
(78.55 KB)
📄
status.py
(57.34 KB)
📄
statuspage.py
(14.67 KB)
📄
supervisord.py
(11.15 KB)
📄
suse_apache.py
(2.45 KB)
📄
svn.py
(10.75 KB)
📄
swarm.py
(13.5 KB)
📄
swift.py
(5.55 KB)
📄
sysbench.py
(6.62 KB)
📄
sysfs.py
(6.61 KB)
📄
syslog_ng.py
(31.55 KB)
📄
sysmod.py
(22.59 KB)
📄
sysrc.py
(3.38 KB)
📄
system.py
(19.28 KB)
📄
system_profiler.py
(3.54 KB)
📄
systemd_service.py
(46.19 KB)
📄
telegram.py
(3.28 KB)
📄
telemetry.py
(12.9 KB)
📄
temp.py
(831 B)
📄
test.py
(14.71 KB)
📄
test_virtual.py
(194 B)
📄
testinframod.py
(9.92 KB)
📄
textfsm_mod.py
(16.22 KB)
📄
timezone.py
(19.89 KB)
📄
tls.py
(58.68 KB)
📄
tomcat.py
(18.59 KB)
📄
trafficserver.py
(10.44 KB)
📄
transactional_update.py
(42 KB)
📄
travisci.py
(2.08 KB)
📄
tuned.py
(2.34 KB)
📄
twilio_notify.py
(2.95 KB)
📄
udev.py
(3.72 KB)
📄
upstart_service.py
(16.92 KB)
📄
uptime.py
(3.23 KB)
📄
useradd.py
(22.3 KB)
📄
uwsgi.py
(996 B)
📄
vagrant.py
(20.4 KB)
📄
varnish.py
(3.08 KB)
📄
vault.py
(13.48 KB)
📄
vbox_guest.py
(10.55 KB)
📄
vboxmanage.py
(14.72 KB)
📄
vcenter.py
(455 B)
📄
victorops.py
(6.54 KB)
📄
virt.py
(290.11 KB)
📄
virtualenv_mod.py
(15.08 KB)
📄
vmctl.py
(9.6 KB)
📄
vsphere.py
(376.7 KB)
📄
webutil.py
(3.66 KB)
📄
win_auditpol.py
(4.74 KB)
📄
win_autoruns.py
(2.29 KB)
📄
win_certutil.py
(3.27 KB)
📄
win_dacl.py
(32.27 KB)
📄
win_disk.py
(1.8 KB)
📄
win_dism.py
(18.26 KB)
📄
win_dns_client.py
(4.19 KB)
📄
win_dsc.py
(26.56 KB)
📄
win_file.py
(59.46 KB)
📄
win_firewall.py
(20.15 KB)
📄
win_groupadd.py
(11.27 KB)
📄
win_iis.py
(68.76 KB)
📄
win_ip.py
(11.43 KB)
📄
win_lgpo.py
(491.78 KB)
📄
win_license.py
(2.72 KB)
📄
win_network.py
(14.02 KB)
📄
win_ntp.py
(1.8 KB)
📄
win_path.py
(11.12 KB)
📄
win_pkg.py
(84.64 KB)
📄
win_pki.py
(15.8 KB)
📄
win_powercfg.py
(9.85 KB)
📄
win_psget.py
(8.97 KB)
📄
win_servermanager.py
(14.33 KB)
📄
win_service.py
(32.7 KB)
📄
win_shadow.py
(3.03 KB)
📄
win_smtp_server.py
(17.67 KB)
📄
win_snmp.py
(13.38 KB)
📄
win_status.py
(17.04 KB)
📄
win_system.py
(40.62 KB)
📄
win_task.py
(78.46 KB)
📄
win_timezone.py
(13.27 KB)
📄
win_useradd.py
(27.53 KB)
📄
win_wua.py
(38.29 KB)
📄
win_wusa.py
(5.88 KB)
📄
winrepo.py
(6.3 KB)
📄
wordpress.py
(4.71 KB)
📄
x509.py
(62.22 KB)
📄
xapi_virt.py
(24.08 KB)
📄
xbpspkg.py
(15.89 KB)
📄
xfs.py
(15.33 KB)
📄
xml.py
(2.14 KB)
📄
xmpp.py
(5.28 KB)
📄
yumpkg.py
(112.71 KB)
📄
zabbix.py
(94.11 KB)
📄
zcbuildout.py
(28.19 KB)
📄
zenoss.py
(5.64 KB)
📄
zfs.py
(34.49 KB)
📄
zk_concurrency.py
(11.19 KB)
📄
znc.py
(2.26 KB)
📄
zoneadm.py
(15.11 KB)
📄
zonecfg.py
(21.91 KB)
📄
zookeeper.py
(14.72 KB)
📄
zpool.py
(44.02 KB)
📄
zypperpkg.py
(90.34 KB)
Editing: rh_ip.py
""" The networking module for RHEL/Fedora based distros """ import logging import os import jinja2 import jinja2.exceptions import salt.utils.files import salt.utils.json import salt.utils.stringutils import salt.utils.templates import salt.utils.validate.net from salt.exceptions import CommandExecutionError # Set up logging log = logging.getLogger(__name__) # Set up template environment JINJA = jinja2.Environment( loader=jinja2.FileSystemLoader( os.path.join(salt.utils.templates.TEMPLATE_DIRNAME, "rh_ip") ) ) # Define the module's virtual name __virtualname__ = "ip" # Default values for bonding _BOND_DEFAULTS = { # 803.ad aggregation selection logic # 0 for stable (default) # 1 for bandwidth # 2 for count "ad_select": "0", # Max number of transmit queues (default = 16) "tx_queues": "16", # lacp_rate 0: Slow - every 30 seconds # lacp_rate 1: Fast - every 1 second "lacp_rate": "0", # Max bonds for this driver "max_bonds": "1", # Used with miimon. # On: driver sends mii # Off: ethtool sends mii "use_carrier": "0", # Default. Don't change unless you know what you are doing. "xmit_hash_policy": "layer2", } _RH_NETWORK_SCRIPT_DIR = "/etc/sysconfig/network-scripts" _RH_NETWORK_FILE = "/etc/sysconfig/network" _CONFIG_TRUE = ("yes", "on", "true", "1", True) _CONFIG_FALSE = ("no", "off", "false", "0", False) _IFACE_TYPES = ( "eth", "bond", "team", "alias", "clone", "ipsec", "dialup", "bridge", "slave", "teamport", "vlan", "ipip", "ib", ) def __virtual__(): """ Confine this module to RHEL/Fedora based distros """ if __grains__["os_family"] == "RedHat": if __grains__["os"] == "Amazon": if __grains__["osmajorrelease"] >= 2: return __virtualname__ else: return __virtualname__ return ( False, "The rh_ip execution module cannot be loaded: this module is only available on" " RHEL/Fedora based distributions.", ) def _error_msg_iface(iface, option, expected): """ Build an appropriate error message from a given option and a list of expected values. """ if isinstance(expected, str): expected = (expected,) msg = "Invalid option -- Interface: {0}, Option: {1}, Expected: [{2}]" return msg.format(iface, option, "|".join(str(e) for e in expected)) def _error_msg_routes(iface, option, expected): """ Build an appropriate error message from a given option and a list of expected values. """ msg = "Invalid option -- Route interface: {0}, Option: {1}, Expected: [{2}]" return msg.format(iface, option, expected) def _log_default_iface(iface, opt, value): log.info( "Using default option -- Interface: %s Option: %s Value: %s", iface, opt, value ) def _error_msg_network(option, expected): """ Build an appropriate error message from a given option and a list of expected values. """ if isinstance(expected, str): expected = (expected,) msg = "Invalid network setting -- Setting: {0}, Expected: [{1}]" return msg.format(option, "|".join(str(e) for e in expected)) def _log_default_network(opt, value): log.info("Using existing setting -- Setting: %s Value: %s", opt, value) def _parse_rh_config(path): rh_config = _read_file(path) cv_rh_config = {} if rh_config: for line in rh_config: line = line.strip() if len(line) == 0 or line.startswith("!") or line.startswith("#"): continue pair = [p.rstrip() for p in line.split("=", 1)] if len(pair) != 2: continue name, value = pair cv_rh_config[name.upper()] = value return cv_rh_config def _parse_ethtool_opts(opts, iface): """ Filters given options and outputs valid settings for ETHTOOLS_OPTS If an option has a value that is not expected, this function will log what the Interface, Setting and what it was expecting. """ config = {} if "autoneg" in opts: if opts["autoneg"] in _CONFIG_TRUE: config.update({"autoneg": "on"}) elif opts["autoneg"] in _CONFIG_FALSE: config.update({"autoneg": "off"}) else: _raise_error_iface(iface, "autoneg", _CONFIG_TRUE + _CONFIG_FALSE) if "duplex" in opts: valid = ["full", "half"] if opts["duplex"] in valid: config.update({"duplex": opts["duplex"]}) else: _raise_error_iface(iface, "duplex", valid) if "speed" in opts: valid = ["10", "100", "1000", "10000"] if str(opts["speed"]) in valid: config.update({"speed": opts["speed"]}) else: _raise_error_iface(iface, opts["speed"], valid) if "advertise" in opts: valid = [ "0x001", "0x002", "0x004", "0x008", "0x010", "0x020", "0x20000", "0x8000", "0x1000", "0x40000", "0x80000", "0x200000", "0x400000", "0x800000", "0x1000000", "0x2000000", "0x4000000", ] if str(opts["advertise"]) in valid: config.update({"advertise": opts["advertise"]}) else: _raise_error_iface(iface, "advertise", valid) if "channels" in opts: channels_cmd = "-L {}".format(iface.strip()) channels_params = [] for option in ("rx", "tx", "other", "combined"): if option in opts["channels"]: valid = range(1, __grains__["num_cpus"] + 1) if opts["channels"][option] in valid: channels_params.append( "{} {}".format(option, opts["channels"][option]) ) else: _raise_error_iface(iface, opts["channels"][option], valid) if channels_params: config.update({channels_cmd: " ".join(channels_params)}) valid = _CONFIG_TRUE + _CONFIG_FALSE for option in ("rx", "tx", "sg", "tso", "ufo", "gso", "gro", "lro"): if option in opts: if opts[option] in _CONFIG_TRUE: config.update({option: "on"}) elif opts[option] in _CONFIG_FALSE: config.update({option: "off"}) else: _raise_error_iface(iface, option, valid) return config def _parse_settings_bond(opts, iface): """ Filters given options and outputs valid settings for requested operation. If an option has a value that is not expected, this function will log what the Interface, Setting and what it was expecting. """ if opts["mode"] in ("balance-rr", "0"): log.info("Device: %s Bonding Mode: load balancing (round-robin)", iface) return _parse_settings_bond_0(opts, iface) elif opts["mode"] in ("active-backup", "1"): log.info("Device: %s Bonding Mode: fault-tolerance (active-backup)", iface) return _parse_settings_bond_1(opts, iface) elif opts["mode"] in ("balance-xor", "2"): log.info("Device: %s Bonding Mode: load balancing (xor)", iface) return _parse_settings_bond_2(opts, iface) elif opts["mode"] in ("broadcast", "3"): log.info("Device: %s Bonding Mode: fault-tolerance (broadcast)", iface) return _parse_settings_bond_3(opts, iface) elif opts["mode"] in ("802.3ad", "4"): log.info( "Device: %s Bonding Mode: IEEE 802.3ad Dynamic link aggregation", iface ) return _parse_settings_bond_4(opts, iface) elif opts["mode"] in ("balance-tlb", "5"): log.info("Device: %s Bonding Mode: transmit load balancing", iface) return _parse_settings_bond_5(opts, iface) elif opts["mode"] in ("balance-alb", "6"): log.info("Device: %s Bonding Mode: adaptive load balancing", iface) return _parse_settings_bond_6(opts, iface) else: valid = ( "0", "1", "2", "3", "4", "5", "6", "balance-rr", "active-backup", "balance-xor", "broadcast", "802.3ad", "balance-tlb", "balance-alb", ) _raise_error_iface(iface, "mode", valid) def _parse_settings_miimon(opts, iface): """ Add shared settings for miimon support used by balance-rr, balance-xor bonding types. """ ret = {} for binding in ("miimon", "downdelay", "updelay"): if binding in opts: try: int(opts[binding]) ret.update({binding: opts[binding]}) except Exception: # pylint: disable=broad-except _raise_error_iface(iface, binding, "integer") if "miimon" in opts and "downdelay" not in opts: ret["downdelay"] = ret["miimon"] * 2 if "miimon" in opts: if not opts["miimon"]: _raise_error_iface(iface, "miimon", "nonzero integer") for binding in ("downdelay", "updelay"): if binding in ret: if ret[binding] % ret["miimon"]: _raise_error_iface( iface, binding, "0 or a multiple of miimon ({})".format(ret["miimon"]), ) if "use_carrier" in opts: if opts["use_carrier"] in _CONFIG_TRUE: ret.update({"use_carrier": "1"}) elif opts["use_carrier"] in _CONFIG_FALSE: ret.update({"use_carrier": "0"}) else: valid = _CONFIG_TRUE + _CONFIG_FALSE _raise_error_iface(iface, "use_carrier", valid) else: _log_default_iface(iface, "use_carrier", _BOND_DEFAULTS["use_carrier"]) ret.update({"use_carrier": _BOND_DEFAULTS["use_carrier"]}) return ret def _parse_settings_arp(opts, iface): """ Add shared settings for arp used by balance-rr, balance-xor bonding types. """ ret = {} if "arp_interval" in opts: try: int(opts["arp_interval"]) ret.update({"arp_interval": opts["arp_interval"]}) except Exception: # pylint: disable=broad-except _raise_error_iface(iface, "arp_interval", "integer") # ARP targets in n.n.n.n form valid = "list of ips (up to 16)" if "arp_ip_target" in opts: if isinstance(opts["arp_ip_target"], list): if 1 <= len(opts["arp_ip_target"]) <= 16: ret.update({"arp_ip_target": ",".join(opts["arp_ip_target"])}) else: _raise_error_iface(iface, "arp_ip_target", valid) else: _raise_error_iface(iface, "arp_ip_target", valid) else: _raise_error_iface(iface, "arp_ip_target", valid) return ret def _parse_settings_bond_0(opts, iface): """ Filters given options and outputs valid settings for bond0. If an option has a value that is not expected, this function will log what the Interface, Setting and what it was expecting. """ bond = {"mode": "0"} bond.update(_parse_settings_miimon(opts, iface)) bond.update(_parse_settings_arp(opts, iface)) if "miimon" not in opts and "arp_interval" not in opts: _raise_error_iface( iface, "miimon or arp_interval", "at least one of these is required" ) return bond def _parse_settings_bond_1(opts, iface): """ Filters given options and outputs valid settings for bond1. If an option has a value that is not expected, this function will log what the Interface, Setting and what it was expecting. """ bond = {"mode": "1"} bond.update(_parse_settings_miimon(opts, iface)) if "miimon" not in opts: _raise_error_iface(iface, "miimon", "integer") if "primary" in opts: bond.update({"primary": opts["primary"]}) return bond def _parse_settings_bond_2(opts, iface): """ Filters given options and outputs valid settings for bond2. If an option has a value that is not expected, this function will log what the Interface, Setting and what it was expecting. """ bond = {"mode": "2"} bond.update(_parse_settings_miimon(opts, iface)) bond.update(_parse_settings_arp(opts, iface)) if "miimon" not in opts and "arp_interval" not in opts: _raise_error_iface( iface, "miimon or arp_interval", "at least one of these is required" ) if "hashing-algorithm" in opts: valid = ("layer2", "layer2+3", "layer3+4") if opts["hashing-algorithm"] in valid: bond.update({"xmit_hash_policy": opts["hashing-algorithm"]}) else: _raise_error_iface(iface, "hashing-algorithm", valid) return bond def _parse_settings_bond_3(opts, iface): """ Filters given options and outputs valid settings for bond3. If an option has a value that is not expected, this function will log what the Interface, Setting and what it was expecting. """ bond = {"mode": "3"} bond.update(_parse_settings_miimon(opts, iface)) if "miimon" not in opts: _raise_error_iface(iface, "miimon", "integer") return bond def _parse_settings_bond_4(opts, iface): """ Filters given options and outputs valid settings for bond4. If an option has a value that is not expected, this function will log what the Interface, Setting and what it was expecting. """ bond = {"mode": "4"} bond.update(_parse_settings_miimon(opts, iface)) if "miimon" not in opts: _raise_error_iface(iface, "miimon", "integer") for binding in ("lacp_rate", "ad_select"): if binding in opts: if binding == "lacp_rate": valid = ("fast", "1", "slow", "0") if opts[binding] not in valid: _raise_error_iface(iface, binding, valid) if opts[binding] == "fast": opts.update({binding: "1"}) if opts[binding] == "slow": opts.update({binding: "0"}) else: valid = "integer" try: int(opts[binding]) bond.update({binding: opts[binding]}) except Exception: # pylint: disable=broad-except _raise_error_iface(iface, binding, valid) else: _log_default_iface(iface, binding, _BOND_DEFAULTS[binding]) bond.update({binding: _BOND_DEFAULTS[binding]}) if "hashing-algorithm" in opts: valid = ("layer2", "layer2+3", "layer3+4") if opts["hashing-algorithm"] in valid: bond.update({"xmit_hash_policy": opts["hashing-algorithm"]}) else: _raise_error_iface(iface, "hashing-algorithm", valid) return bond def _parse_settings_bond_5(opts, iface): """ Filters given options and outputs valid settings for bond5. If an option has a value that is not expected, this function will log what the Interface, Setting and what it was expecting. """ bond = {"mode": "5"} bond.update(_parse_settings_miimon(opts, iface)) if "miimon" not in opts: _raise_error_iface(iface, "miimon", "integer") if "primary" in opts: bond.update({"primary": opts["primary"]}) return bond def _parse_settings_bond_6(opts, iface): """ Filters given options and outputs valid settings for bond6. If an option has a value that is not expected, this function will log what the Interface, Setting and what it was expecting. """ bond = {"mode": "6"} bond.update(_parse_settings_miimon(opts, iface)) if "miimon" not in opts: _raise_error_iface(iface, "miimon", "integer") if "primary" in opts: bond.update({"primary": opts["primary"]}) return bond def _parse_settings_vlan(opts, iface): """ Filters given options and outputs valid settings for a vlan """ vlan = {} if "reorder_hdr" in opts: if opts["reorder_hdr"] in _CONFIG_TRUE + _CONFIG_FALSE: vlan.update({"reorder_hdr": opts["reorder_hdr"]}) else: valid = _CONFIG_TRUE + _CONFIG_FALSE _raise_error_iface(iface, "reorder_hdr", valid) if "vlan_id" in opts: if opts["vlan_id"] > 0: vlan.update({"vlan_id": opts["vlan_id"]}) else: _raise_error_iface(iface, "vlan_id", "Positive integer") if "phys_dev" in opts: if len(opts["phys_dev"]) > 0: vlan.update({"phys_dev": opts["phys_dev"]}) else: _raise_error_iface(iface, "phys_dev", "Non-empty string") return vlan def _parse_settings_eth(opts, iface_type, enabled, iface): """ Filters given options and outputs valid settings for a network interface. """ result = {"name": iface} if "proto" in opts: valid = ["none", "bootp", "dhcp"] if opts["proto"] in valid: result["proto"] = opts["proto"] else: _raise_error_iface(iface, opts["proto"], valid) if "dns" in opts: result["dns"] = opts["dns"] result["peerdns"] = "yes" if "mtu" in opts: try: result["mtu"] = int(opts["mtu"]) except ValueError: _raise_error_iface(iface, "mtu", ["integer"]) if "hwaddr" in opts and "macaddr" in opts: msg = "Cannot pass both hwaddr and macaddr. Must use either hwaddr or macaddr" log.error(msg) raise AttributeError(msg) if iface_type not in ("bridge",): ethtool = _parse_ethtool_opts(opts, iface) if ethtool: result["ethtool"] = " ".join( ["{} {}".format(x, y) for x, y in ethtool.items()] ) if iface_type == "slave": result["proto"] = "none" if iface_type == "team": result["devicetype"] = "Team" if "team_config" in opts: result["team_config"] = salt.utils.json.dumps(opts["team_config"]) if iface_type == "teamport": result["devicetype"] = "TeamPort" result["team_master"] = opts["team_master"] if "team_port_config" in opts: result["team_port_config"] = salt.utils.json.dumps(opts["team_port_config"]) if iface_type == "bond": if "mode" not in opts: msg = "Missing required option 'mode'" log.error("%s for bond interface '%s'", msg, iface) raise AttributeError(msg) bonding = _parse_settings_bond(opts, iface) if bonding: result["bonding"] = " ".join( ["{}={}".format(x, y) for x, y in bonding.items()] ) result["devtype"] = "Bond" if iface_type == "vlan": vlan = _parse_settings_vlan(opts, iface) if vlan: result["devtype"] = "Vlan" for opt in vlan: result[opt] = opts[opt] if iface_type not in ("bond", "team", "vlan", "bridge", "ipip"): auto_addr = False if "hwaddr" in opts: if salt.utils.validate.net.mac(opts["hwaddr"]): result["hwaddr"] = opts["hwaddr"] elif opts["hwaddr"] == "auto": auto_addr = True elif opts["hwaddr"] != "none": _raise_error_iface( iface, opts["hwaddr"], ("AA:BB:CC:DD:EE:FF", "auto", "none") ) else: auto_addr = True if auto_addr: # If interface type is slave for bond, not setting hwaddr if iface_type != "slave": ifaces = __salt__["network.interfaces"]() if iface in ifaces and "hwaddr" in ifaces[iface]: result["hwaddr"] = ifaces[iface]["hwaddr"] if iface_type == "eth": result["devtype"] = "Ethernet" if iface_type == "bridge": result["devtype"] = "Bridge" bypassfirewall = True valid = _CONFIG_TRUE + _CONFIG_FALSE for opt in ("bypassfirewall",): if opt in opts: if opts[opt] in _CONFIG_TRUE: bypassfirewall = True elif opts[opt] in _CONFIG_FALSE: bypassfirewall = False else: _raise_error_iface(iface, opts[opt], valid) bridgectls = [ "net.bridge.bridge-nf-call-ip6tables", "net.bridge.bridge-nf-call-iptables", "net.bridge.bridge-nf-call-arptables", ] if bypassfirewall: sysctl_value = 0 else: sysctl_value = 1 for sysctl in bridgectls: try: __salt__["sysctl.persist"](sysctl, sysctl_value) except CommandExecutionError: log.warning("Failed to set sysctl: %s", sysctl) else: if "bridge" in opts: result["bridge"] = opts["bridge"] if iface_type == "ipip": result["devtype"] = "IPIP" for opt in ("my_inner_ipaddr", "my_outer_ipaddr"): if opt not in opts: _raise_error_iface(iface, opt, "1.2.3.4") else: result[opt] = opts[opt] if iface_type == "ib": result["devtype"] = "InfiniBand" if "prefix" in opts: if "netmask" in opts: msg = "Cannot use prefix and netmask together" log.error(msg) raise AttributeError(msg) result["prefix"] = opts["prefix"] elif "netmask" in opts: result["netmask"] = opts["netmask"] for opt in ( "ipaddr", "master", "srcaddr", "delay", "domain", "gateway", "uuid", "nickname", "zone", ): if opt in opts: result[opt] = opts[opt] for opt in ("ipv6addr", "ipv6gateway"): if opt in opts: result[opt] = opts[opt] if "ipaddrs" in opts: result["ipaddrs"] = [] for opt in opts["ipaddrs"]: if salt.utils.validate.net.ipv4_addr(opt): ip, prefix = [i.strip() for i in opt.split("/")] result["ipaddrs"].append({"ipaddr": ip, "prefix": prefix}) else: msg = "ipv4 CIDR is invalid" log.error(msg) raise AttributeError(msg) if "ipv6addrs" in opts: for opt in opts["ipv6addrs"]: if not salt.utils.validate.net.ipv6_addr(opt): msg = "ipv6 CIDR is invalid" log.error(msg) raise AttributeError(msg) result["ipv6addrs"] = opts["ipv6addrs"] if "enable_ipv6" in opts: result["enable_ipv6"] = opts["enable_ipv6"] valid = _CONFIG_TRUE + _CONFIG_FALSE for opt in ( "onparent", "peerdns", "peerroutes", "slave", "vlan", "defroute", "stp", "ipv6_peerdns", "ipv6_defroute", "ipv6_peerroutes", "ipv6_autoconf", "ipv4_failure_fatal", "dhcpv6c", ): if opt in opts: if opts[opt] in _CONFIG_TRUE: result[opt] = "yes" elif opts[opt] in _CONFIG_FALSE: result[opt] = "no" else: _raise_error_iface(iface, opts[opt], valid) if "onboot" in opts: log.warning( "The 'onboot' option is controlled by the 'enabled' option. " "Interface: %s Enabled: %s", iface, enabled, ) if enabled: result["onboot"] = "yes" else: result["onboot"] = "no" # If the interface is defined then we want to always take # control away from non-root users; unless the administrator # wants to allow non-root users to control the device. if "userctl" in opts: if opts["userctl"] in _CONFIG_TRUE: result["userctl"] = "yes" elif opts["userctl"] in _CONFIG_FALSE: result["userctl"] = "no" else: _raise_error_iface(iface, opts["userctl"], valid) else: result["userctl"] = "no" # This vlan is in opts, and should be only used in range interface # will affect jinja template for interface generating if "vlan" in opts: if opts["vlan"] in _CONFIG_TRUE: result["vlan"] = "yes" elif opts["vlan"] in _CONFIG_FALSE: result["vlan"] = "no" else: _raise_error_iface(iface, opts["vlan"], valid) if "arpcheck" in opts: if opts["arpcheck"] in _CONFIG_FALSE: result["arpcheck"] = "no" if "ipaddr_start" in opts: result["ipaddr_start"] = opts["ipaddr_start"] if "ipaddr_end" in opts: result["ipaddr_end"] = opts["ipaddr_end"] if "clonenum_start" in opts: result["clonenum_start"] = opts["clonenum_start"] if "hwaddr" in opts: result["hwaddr"] = opts["hwaddr"] if "macaddr" in opts: result["macaddr"] = opts["macaddr"] # If NetworkManager is available, we can control whether we use # it or not if "nm_controlled" in opts: if opts["nm_controlled"] in _CONFIG_TRUE: result["nm_controlled"] = "yes" elif opts["nm_controlled"] in _CONFIG_FALSE: result["nm_controlled"] = "no" else: _raise_error_iface(iface, opts["nm_controlled"], valid) else: result["nm_controlled"] = "no" return result def _parse_routes(iface, opts): """ Filters given options and outputs valid settings for the route settings file. """ # Normalize keys opts = {k.lower(): v for (k, v) in opts.items()} result = {} if "routes" not in opts: _raise_error_routes(iface, "routes", "List of routes") for opt in opts: result[opt] = opts[opt] return result def _parse_network_settings(opts, current): """ Filters given options and outputs valid settings for the global network settings file. """ # Normalize keys opts = {k.lower(): v for (k, v) in opts.items()} current = {k.lower(): v for (k, v) in current.items()} # Check for supported parameters retain_settings = opts.get("retain_settings", False) result = current if retain_settings else {} # Default quote type is an empty string, which will not quote values quote_type = "" valid = _CONFIG_TRUE + _CONFIG_FALSE if "enabled" not in opts: try: opts["networking"] = current["networking"] # If networking option is quoted, use its quote type quote_type = salt.utils.stringutils.is_quoted(opts["networking"]) _log_default_network("networking", current["networking"]) except ValueError: _raise_error_network("networking", valid) else: opts["networking"] = opts["enabled"] true_val = "{0}yes{0}".format(quote_type) false_val = "{0}no{0}".format(quote_type) networking = salt.utils.stringutils.dequote(opts["networking"]) if networking in valid: if networking in _CONFIG_TRUE: result["networking"] = true_val elif networking in _CONFIG_FALSE: result["networking"] = false_val else: _raise_error_network("networking", valid) if "hostname" not in opts: try: opts["hostname"] = current["hostname"] _log_default_network("hostname", current["hostname"]) except Exception: # pylint: disable=broad-except _raise_error_network("hostname", ["server1.example.com"]) if opts["hostname"]: result["hostname"] = "{1}{0}{1}".format( salt.utils.stringutils.dequote(opts["hostname"]), quote_type ) else: _raise_error_network("hostname", ["server1.example.com"]) if "nozeroconf" in opts: nozeroconf = salt.utils.stringutils.dequote(opts["nozeroconf"]) if nozeroconf in valid: if nozeroconf in _CONFIG_TRUE: result["nozeroconf"] = true_val elif nozeroconf in _CONFIG_FALSE: result["nozeroconf"] = false_val else: _raise_error_network("nozeroconf", valid) for opt in opts: if opt not in ("networking", "hostname", "nozeroconf"): result[opt] = "{1}{0}{1}".format( salt.utils.stringutils.dequote(opts[opt]), quote_type ) return result def _raise_error_iface(iface, option, expected): """ Log and raise an error with a logical formatted message. """ msg = _error_msg_iface(iface, option, expected) log.error(msg) raise AttributeError(msg) def _raise_error_network(option, expected): """ Log and raise an error with a logical formatted message. """ msg = _error_msg_network(option, expected) log.error(msg) raise AttributeError(msg) def _raise_error_routes(iface, option, expected): """ Log and raise an error with a logical formatted message. """ msg = _error_msg_routes(iface, option, expected) log.error(msg) raise AttributeError(msg) def _read_file(path): """ Reads and returns the contents of a file """ try: with salt.utils.files.fopen(path, "rb") as rfh: lines = salt.utils.stringutils.to_unicode(rfh.read()).splitlines() try: lines.remove("") except ValueError: pass return lines except Exception: # pylint: disable=broad-except return [] # Return empty list for type consistency def _write_file_iface(iface, data, folder, pattern): """ Writes a file to disk """ filename = os.path.join(folder, pattern.format(iface)) if not os.path.exists(folder): msg = "{0} cannot be written. {1} does not exist" msg = msg.format(filename, folder) log.error(msg) raise AttributeError(msg) with salt.utils.files.fopen(filename, "w") as fp_: fp_.write(salt.utils.stringutils.to_str(data)) def _write_file_network(data, filename): """ Writes a file to disk """ with salt.utils.files.fopen(filename, "w") as fp_: fp_.write(salt.utils.stringutils.to_str(data)) def _read_temp(data): lines = data.splitlines() try: # Discard newlines if they exist lines.remove("") except ValueError: pass return lines def build_interface(iface, iface_type, enabled, **settings): """ Build an interface script for a network interface. CLI Example: .. code-block:: bash salt '*' ip.build_interface eth0 eth <settings> """ if __grains__["os"] == "Fedora": if __grains__["osmajorrelease"] >= 28: rh_major = "8" else: rh_major = "7" elif __grains__["os"] == "Amazon": rh_major = "7" else: rh_major = __grains__["osrelease"][:1] iface_type = iface_type.lower() if iface_type not in _IFACE_TYPES: _raise_error_iface(iface, iface_type, _IFACE_TYPES) if iface_type == "slave": settings["slave"] = "yes" if "master" not in settings: msg = "master is a required setting for slave interfaces" log.error(msg) raise AttributeError(msg) if iface_type == "bond": if "mode" not in settings: msg = "mode is required for bond interfaces" log.error(msg) raise AttributeError(msg) settings["mode"] = str(settings["mode"]) if iface_type == "teamport": # Validate that either a master or team_master is defined if "master" not in settings and "team_master" not in settings: msg = "master or team_master is a required setting for teamport interfaces" log.error(msg) raise AttributeError(msg) elif "master" in settings and "team_master" in settings: log.warning( "Both team_master (%s) and master (%s) were configured " "for teamport interface %s. Ignoring master in favor of " "team_master.", settings["team_master"], settings["master"], iface, ) del settings["master"] elif "master" in settings: settings["team_master"] = settings.pop("master") if iface_type == "vlan": settings["vlan"] = "yes" if iface_type == "bridge" and not __salt__["pkg.version"]("bridge-utils"): __salt__["pkg.install"]("bridge-utils") if iface_type == "team" and not __salt__["pkg.version"]("teamd"): __salt__["pkg.install"]("teamd") if iface_type in ( "eth", "bond", "team", "teamport", "bridge", "slave", "vlan", "ipip", "ib", "alias", ): opts = _parse_settings_eth(settings, iface_type, enabled, iface) try: template = JINJA.get_template("rh{}_eth.jinja".format(rh_major)) except jinja2.exceptions.TemplateNotFound: log.error("Could not load template rh%s_eth.jinja", rh_major) return "" ifcfg = template.render(opts) if settings.get("test"): return _read_temp(ifcfg) _write_file_iface(iface, ifcfg, _RH_NETWORK_SCRIPT_DIR, "ifcfg-{0}") path = os.path.join(_RH_NETWORK_SCRIPT_DIR, "ifcfg-{}".format(iface)) return _read_file(path) def build_routes(iface, **settings): """ Build a route script for a network interface. CLI Example: .. code-block:: bash salt '*' ip.build_routes eth0 <settings> """ template = "rh6_route_eth.jinja" try: if int(__grains__["osrelease"][0]) < 6: template = "route_eth.jinja" except ValueError: pass log.debug("Template name: %s", template) opts = _parse_routes(iface, settings) log.debug("Opts: \n %s", opts) try: template = JINJA.get_template(template) except jinja2.exceptions.TemplateNotFound: log.error("Could not load template %s", template) return "" opts6 = [] opts4 = [] for route in opts["routes"]: ipaddr = route["ipaddr"] if salt.utils.validate.net.ipv6_addr(ipaddr): opts6.append(route) else: opts4.append(route) log.debug("IPv4 routes:\n%s", opts4) log.debug("IPv6 routes:\n%s", opts6) routecfg = template.render(routes=opts4, iface=iface) routecfg6 = template.render(routes=opts6, iface=iface) if settings["test"]: routes = _read_temp(routecfg) routes.extend(_read_temp(routecfg6)) return routes _write_file_iface(iface, routecfg, _RH_NETWORK_SCRIPT_DIR, "route-{0}") _write_file_iface(iface, routecfg6, _RH_NETWORK_SCRIPT_DIR, "route6-{0}") path = os.path.join(_RH_NETWORK_SCRIPT_DIR, "route-{}".format(iface)) path6 = os.path.join(_RH_NETWORK_SCRIPT_DIR, "route6-{}".format(iface)) routes = _read_file(path) routes.extend(_read_file(path6)) return routes def down(iface, iface_type): """ Shutdown a network interface CLI Example: .. code-block:: bash salt '*' ip.down eth0 """ # Slave devices are controlled by the master. if iface_type.lower() not in ("slave", "teamport"): return __salt__["cmd.run"]("ifdown {}".format(iface)) return None def get_interface(iface): """ Return the contents of an interface script CLI Example: .. code-block:: bash salt '*' ip.get_interface eth0 """ path = os.path.join(_RH_NETWORK_SCRIPT_DIR, "ifcfg-{}".format(iface)) return _read_file(path) def up(iface, iface_type): # pylint: disable=C0103 """ Start up a network interface CLI Example: .. code-block:: bash salt '*' ip.up eth0 """ # Slave devices are controlled by the master. if iface_type.lower() not in ("slave", "teamport"): return __salt__["cmd.run"]("ifup {}".format(iface)) return None def get_routes(iface): """ Return the contents of the interface routes script. CLI Example: .. code-block:: bash salt '*' ip.get_routes eth0 """ path = os.path.join(_RH_NETWORK_SCRIPT_DIR, "route-{}".format(iface)) path6 = os.path.join(_RH_NETWORK_SCRIPT_DIR, "route6-{}".format(iface)) routes = _read_file(path) routes.extend(_read_file(path6)) return routes def get_network_settings(): """ Return the contents of the global network script. CLI Example: .. code-block:: bash salt '*' ip.get_network_settings """ return _read_file(_RH_NETWORK_FILE) def apply_network_settings(**settings): """ Apply global network configuration. CLI Example: .. code-block:: bash salt '*' ip.apply_network_settings """ if "require_reboot" not in settings: settings["require_reboot"] = False if "apply_hostname" not in settings: settings["apply_hostname"] = False hostname_res = True if settings["apply_hostname"] in _CONFIG_TRUE: if "hostname" in settings: hostname_res = __salt__["network.mod_hostname"](settings["hostname"]) else: log.warning( "The network state sls is trying to apply hostname " "changes but no hostname is defined." ) hostname_res = False res = True if settings["require_reboot"] in _CONFIG_TRUE: log.warning( "The network state sls is requiring a reboot of the system to " "properly apply network configuration." ) res = True else: res = __salt__["service.restart"]("network") return hostname_res and res def build_network_settings(**settings): """ Build the global network script. CLI Example: .. code-block:: bash salt '*' ip.build_network_settings <settings> """ # Read current configuration and store default values current_network_settings = _parse_rh_config(_RH_NETWORK_FILE) # Build settings opts = _parse_network_settings(settings, current_network_settings) try: template = JINJA.get_template("network.jinja") except jinja2.exceptions.TemplateNotFound: log.error("Could not load template network.jinja") return "" network = template.render(opts) if settings["test"]: return _read_temp(network) # Write settings _write_file_network(network, _RH_NETWORK_FILE) return _read_file(_RH_NETWORK_FILE)
Upload File
Create Folder