Source code for insights.parsers.ssh_client_config

"""
SshConfig - file for ``ssh client config``
==========================================

This module contains parsers that check the ssh client config files.

Parsers provided by this module are:

EtcSshConfig - file ``/etc/ssh/ssh_config``
-------------------------------------------

EtcSshConfigD - files ``/etc/ssh/ssh_config.d/*``
-------------------------------------------------

ForemanSshConfig - file ``/usr/share/foreman/.ssh/ssh_config``
--------------------------------------------------------------

ForemanProxySshConfig - file ``/usr/share/foreman-proxy/.ssh/ssh_config``
-------------------------------------------------------------------------

"""
from collections import namedtuple

from insights.core import Parser
from insights.core.exceptions import SkipComponent
from insights.core.plugins import parser
from insights.parsers import get_active_lines
from insights.specs import Specs


[docs] class SshClientConfig(Parser): """ Base class for ssh client configuration file. Sample output:: # This is the ssh client system-wide configuration file. See # ssh_config(5) for more information. This file provides defaults for # users, and the values can be changed in per-user configuration files # or on the command line. ProxyCommand ssh -q -W %h:%p gateway.example.com Host * GSSAPIAuthentication yes # If this option is set to yes then remote X11 clients will have full access # to the original X11 display. As virtually no X11 client supports the untrusted # mode correctly we set this to yes. ForwardX11Trusted yes # Send locale-related environment variables SendEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES SendEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT SendEnv LC_IDENTIFICATION LC_ALL LANGUAGE SendEnv XMODIFIERS Host proxytest HostName 192.168.122.2 Attributes: global_lines (list): The list of site-wide configuration, as namedtuple('KeyValue', ['keyword', 'value', 'line']). host_lines (dict): The dict of all host-specific definitions, as {'Host_name': [namedtuple('KeyValue', ['keyword', 'value', 'line'])]} Examples: >>> len(sshconfig.global_lines) 1 >>> sshconfig.global_lines[0].keyword 'ProxyCommand' >>> sshconfig.global_lines[0].value 'ssh -q -W %h:%p gateway.example.com' >>> 'Host_*' in sshconfig.host_lines True >>> sshconfig.host_lines['Host_proxytest'][0].keyword 'HostName' >>> sshconfig.host_lines['Host_proxytest'][0].value '192.168.122.2' Raises: SkipComponent: When input content is empty. Not found any parse results. """ KeyValue = namedtuple('KeyValue', ['keyword', 'value', 'line'])
[docs] def parse_content(self, content): self.global_lines = [] self.host_lines = {} _content = get_active_lines(content) if not _content: raise SkipComponent("Empty content.") index_list = [i for i, l in enumerate(_content) if l.startswith('Host ')] index = index_list[0] if index_list else len(_content) for line in _content[:index]: line_splits = [s.strip() for s in line.split(None, 1)] kw, val = line_splits[0], line_splits[1] if len(line_splits) == 2 else '' self.global_lines.append(self.KeyValue(kw, val, line)) hostbit = '' for line in _content[index:]: line_splits = [s.strip() for s in line.split(None, 1)] kw, val = line_splits[0], line_splits[1] if len(line_splits) == 2 else '' if kw == 'Host': hostbit = kw + '_' + val self.host_lines[hostbit] = [] else: self.host_lines[hostbit].append(self.KeyValue(kw, val, line)) if not (self.host_lines or self.global_lines): raise SkipComponent("Nothing parsed.")
[docs] @parser(Specs.ssh_config) class EtcSshConfig(SshClientConfig): """ This parser reads the file ``/etc/ssh/ssh_config`` Sample output:: # ProxyCommand ssh -q -W %h:%p gateway.example.com # RekeyLimit 1G 1h # # Uncomment this if you want to use .local domain # Host *.local # CheckHostIP no ProxyCommand ssh -q -W %h:%p gateway.example.com Host * GSSAPIAuthentication yes # If this option is set to yes then remote X11 clients will have full access # to the original X11 display. As virtually no X11 client supports the untrusted # mode correctly we set this to yes. ForwardX11Trusted yes # Send locale-related environment variables SendEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES SendEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT SendEnv LC_IDENTIFICATION LC_ALL LANGUAGE SendEnv XMODIFIERS Host proxytest HostName 192.168.122.2 Attributes: global_lines (list): The list of site-wide configuration, as namedtuple('KeyValue', ['keyword', 'value', 'line']). host_lines (dict): The dict of all host-specific definitions, as {'Host_name': [namedtuple('KeyValue', ['keyword', 'value', 'line'])]} Examples: >>> len(etcsshconfig.global_lines) 1 >>> etcsshconfig.global_lines[0].keyword 'ProxyCommand' >>> etcsshconfig.global_lines[0].value 'ssh -q -W %h:%p gateway.example.com' >>> 'Host_*' in etcsshconfig.host_lines True >>> etcsshconfig.host_lines['Host_*'][0].keyword 'GSSAPIAuthentication' >>> etcsshconfig.host_lines['Host_*'][0].value 'yes' >>> etcsshconfig.host_lines['Host_*'][1].keyword 'ForwardX11Trusted' >>> etcsshconfig.host_lines['Host_*'][1].value 'yes' >>> etcsshconfig.host_lines['Host_proxytest'][0].keyword 'HostName' >>> etcsshconfig.host_lines['Host_proxytest'][0].value '192.168.122.2' """ pass
[docs] @parser(Specs.ssh_config_d) class EtcSshConfigD(SshClientConfig): """ This Parser reads the files ``/etc/ssh/ssh_config.d/*`` Sample output:: # The options here are in the "Match final block" to be applied as the last # options and could be potentially overwritten by the user configuration Match final all # Follow system-wide Crypto Policy, if defined: Include /etc/crypto-policies/back-ends/openssh.config GSSAPIAuthentication yes # If this option is set to yes then remote X11 clients will have full access # to the original X11 display. As virtually no X11 client supports the untrusted # mode correctly we set this to yes. ForwardX11Trusted yes # Send locale-related environment variables SendEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES SendEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT SendEnv LC_IDENTIFICATION LC_ALL LANGUAGE SendEnv XMODIFIERS # Uncomment this if you want to use .local domain # Host *.local Attributes: global_lines (list): The list of site-wide configuration, as namedtuple('KeyValue', ['keyword', 'value', 'line']). host_lines (dict): The dict of all host-specific definitions, as {'Host_name': [namedtuple('KeyValue', ['keyword', 'value', 'line'])]} Examples: >>> etcsshconfigd.global_lines[1].keyword 'Include' >>> etcsshconfigd.global_lines[1].value '/etc/crypto-policies/back-ends/openssh.config' """ pass
[docs] @parser(Specs.ssh_foreman_config) class ForemanSshConfig(SshClientConfig): """ This parser reads the file ``/usr/share/foreman/.ssh/ssh_config`` Sample output:: # ProxyCommand ssh -q -W %h:%p gateway.example.com # RekeyLimit 1G 1h # # Uncomment this if you want to use .local domain # Host *.local # CheckHostIP no ProxyCommand ssh -q -W %h:%p gateway.example.com Host * GSSAPIAuthentication yes # If this option is set to yes then remote X11 clients will have full access # to the original X11 display. As virtually no X11 client supports the untrusted # mode correctly we set this to yes. ForwardX11Trusted yes # Send locale-related environment variables SendEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES SendEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT SendEnv LC_IDENTIFICATION LC_ALL LANGUAGE SendEnv XMODIFIERS Host proxytest HostName 192.168.122.2 Attributes: global_lines (list): The list of site-wide configuration, as namedtuple('KeyValue', ['keyword', 'value', 'line']). host_lines (dict): The dict of all host-specific definitions, as {'Host_name': [namedtuple('KeyValue', ['keyword', 'value', 'line'])]} Examples: >>> len(foremansshconfig.global_lines) 1 >>> foremansshconfig.global_lines[0].keyword 'ProxyCommand' >>> foremansshconfig.global_lines[0].value 'ssh -q -W %h:%p gateway.example.com' >>> 'Host_*' in foremansshconfig.host_lines True >>> foremansshconfig.host_lines['Host_*'][0].keyword 'GSSAPIAuthentication' >>> foremansshconfig.host_lines['Host_*'][0].value 'yes' >>> foremansshconfig.host_lines['Host_*'][1].keyword 'ForwardX11Trusted' >>> foremansshconfig.host_lines['Host_*'][1].value 'yes' >>> foremansshconfig.host_lines['Host_proxytest'][0].keyword 'HostName' >>> foremansshconfig.host_lines['Host_proxytest'][0].value '192.168.122.2' """ pass
[docs] @parser(Specs.ssh_foreman_proxy_config) class ForemanProxySshConfig(SshClientConfig): """ This parser reads the file ``/usr/share/foreman-proxy/.ssh/ssh_config`` Sample output:: # ProxyCommand ssh -q -W %h:%p gateway.example.com # RekeyLimit 1G 1h # # Uncomment this if you want to use .local domain # Host *.local # CheckHostIP no ProxyCommand ssh -q -W %h:%p gateway.example.com Host * GSSAPIAuthentication yes # If this option is set to yes then remote X11 clients will have full access # to the original X11 display. As virtually no X11 client supports the untrusted # mode correctly we set this to yes. ForwardX11Trusted yes # Send locale-related environment variables SendEnv LANG LC_CTYPE LC_NUMERIC LC_TIME LC_COLLATE LC_MONETARY LC_MESSAGES SendEnv LC_PAPER LC_NAME LC_ADDRESS LC_TELEPHONE LC_MEASUREMENT SendEnv LC_IDENTIFICATION LC_ALL LANGUAGE SendEnv XMODIFIERS Host proxytest HostName 192.168.122.2 Attributes: global_lines (list): The list of site-wide configuration, as namedtuple('KeyValue', ['keyword', 'value', 'line']). host_lines (dict): The dict of all host-specific definitions, as {'Host_name': [namedtuple('KeyValue', ['keyword', 'value', 'line'])]} Examples: >>> len(foreman_proxy_ssh_config.global_lines) 1 >>> foreman_proxy_ssh_config.global_lines[0].keyword 'ProxyCommand' >>> foreman_proxy_ssh_config.global_lines[0].value 'ssh -q -W %h:%p gateway.example.com' >>> 'Host_*' in foreman_proxy_ssh_config.host_lines True >>> foreman_proxy_ssh_config.host_lines['Host_*'][0].keyword 'GSSAPIAuthentication' >>> foreman_proxy_ssh_config.host_lines['Host_*'][0].value 'yes' >>> foreman_proxy_ssh_config.host_lines['Host_*'][1].keyword 'ForwardX11Trusted' >>> foreman_proxy_ssh_config.host_lines['Host_*'][1].value 'yes' >>> foreman_proxy_ssh_config.host_lines['Host_proxytest'][0].keyword 'HostName' >>> foreman_proxy_ssh_config.host_lines['Host_proxytest'][0].value '192.168.122.2' """ pass