PNG  IHDRX cHRMz&u0`:pQ<bKGD pHYsodtIME MeqIDATxw]Wug^Qd˶ 6`!N:!@xI~)%7%@Bh&`lnjVF29gΨ4E$|>cɚ{gk= %,a KX%,a KX%,a KX%,a KX%,a KX%,a KX%, b` ǟzeאfp]<!SJmɤY޲ڿ,%c ~ع9VH.!Ͳz&QynֺTkRR.BLHi٪:l;@(!MԴ=žI,:o&N'Kù\vRmJ雵֫AWic H@" !: Cé||]k-Ha oݜ:y F())u]aG7*JV@J415p=sZH!=!DRʯvɱh~V\}v/GKY$n]"X"}t@ xS76^[bw4dsce)2dU0 CkMa-U5tvLƀ~mlMwfGE/-]7XAƟ`׮g ewxwC4\[~7@O-Q( a*XGƒ{ ՟}$_y3tĐƤatgvێi|K=uVyrŲlLӪuܿzwk$m87k( `múcE)"@rK( z4$D; 2kW=Xb$V[Ru819קR~qloѱDyįݎ*mxw]y5e4K@ЃI0A D@"BDk_)N\8͜9dz"fK0zɿvM /.:2O{ Nb=M=7>??Zuo32 DLD@D| &+֎C #B8ַ`bOb $D#ͮҪtx]%`ES`Ru[=¾!@Od37LJ0!OIR4m]GZRJu$‡c=%~s@6SKy?CeIh:[vR@Lh | (BhAMy=݃  G"'wzn޺~8ԽSh ~T*A:xR[ܹ?X[uKL_=fDȊ؂p0}7=D$Ekq!/t.*2ʼnDbŞ}DijYaȲ(""6HA;:LzxQ‘(SQQ}*PL*fc\s `/d'QXW, e`#kPGZuŞuO{{wm[&NBTiiI0bukcA9<4@SӊH*؎4U/'2U5.(9JuDfrޱtycU%j(:RUbArLֺN)udA':uGQN"-"Is.*+k@ `Ojs@yU/ H:l;@yyTn}_yw!VkRJ4P)~y#)r,D =ě"Q]ci'%HI4ZL0"MJy 8A{ aN<8D"1#IJi >XjX֔#@>-{vN!8tRݻ^)N_╗FJEk]CT՟ YP:_|H1@ CBk]yKYp|og?*dGvzنzӴzjֺNkC~AbZƷ`.H)=!QͷVTT(| u78y֮}|[8-Vjp%2JPk[}ԉaH8Wpqhwr:vWª<}l77_~{s۴V+RCģ%WRZ\AqHifɤL36: #F:p]Bq/z{0CU6ݳEv_^k7'>sq*+kH%a`0ԣisqにtү04gVgW΂iJiS'3w.w}l6MC2uԯ|>JF5`fV5m`Y**Db1FKNttu]4ccsQNnex/87+}xaUW9y>ͯ骵G{䩓Գ3+vU}~jJ.NFRD7<aJDB1#ҳgSb,+CS?/ VG J?|?,2#M9}B)MiE+G`-wo߫V`fio(}S^4e~V4bHOYb"b#E)dda:'?}׮4繏`{7Z"uny-?ǹ;0MKx{:_pÚmFמ:F " .LFQLG)Q8qN q¯¯3wOvxDb\. BKD9_NN &L:4D{mm o^tֽ:q!ƥ}K+<"m78N< ywsard5+вz~mnG)=}lYݧNj'QJS{S :UYS-952?&O-:W}(!6Mk4+>A>j+i|<<|;ر^߉=HE|V#F)Emm#}/"y GII웻Jі94+v뾧xu~5C95~ūH>c@덉pʃ1/4-A2G%7>m;–Y,cyyaln" ?ƻ!ʪ<{~h~i y.zZB̃/,雋SiC/JFMmBH&&FAbϓO^tubbb_hZ{_QZ-sύodFgO(6]TJA˯#`۶ɟ( %$&+V'~hiYy>922 Wp74Zkq+Ovn錄c>8~GqܲcWꂎz@"1A.}T)uiW4="jJ2W7mU/N0gcqܗOO}?9/wìXžΏ0 >֩(V^Rh32!Hj5`;O28؇2#ݕf3 ?sJd8NJ@7O0 b־?lldщ̡&|9C.8RTWwxWy46ah嘦mh٤&l zCy!PY?: CJyв]dm4ǜҐR޻RլhX{FƯanшQI@x' ao(kUUuxW_Ñ줮[w8 FRJ(8˼)_mQ _!RJhm=!cVmm ?sFOnll6Qk}alY}; "baӌ~M0w,Ggw2W:G/k2%R,_=u`WU R.9T"v,<\Ik޽/2110Ӿxc0gyC&Ny޽JҢrV6N ``یeA16"J³+Rj*;BϜkZPJaÍ<Jyw:NP8/D$ 011z֊Ⱳ3ι֘k1V_"h!JPIΣ'ɜ* aEAd:ݺ>y<}Lp&PlRfTb1]o .2EW\ͮ]38؋rTJsǏP@芎sF\> P^+dYJLbJ C-xϐn> ι$nj,;Ǖa FU *择|h ~izť3ᤓ`K'-f tL7JK+vf2)V'-sFuB4i+m+@My=O҈0"|Yxoj,3]:cо3 $#uŘ%Y"y죯LebqtҢVzq¼X)~>4L׶m~[1_k?kxֺQ`\ |ٛY4Ѯr!)N9{56(iNq}O()Em]=F&u?$HypWUeB\k]JɩSع9 Zqg4ZĊo oMcjZBU]B\TUd34ݝ~:7ڶSUsB0Z3srx 7`:5xcx !qZA!;%͚7&P H<WL!džOb5kF)xor^aujƍ7 Ǡ8/p^(L>ὴ-B,{ۇWzֺ^k]3\EE@7>lYBȝR.oHnXO/}sB|.i@ɥDB4tcm,@ӣgdtJ!lH$_vN166L__'Z)y&kH;:,Y7=J 9cG) V\hjiE;gya~%ks_nC~Er er)muuMg2;֫R)Md) ,¶ 2-wr#F7<-BBn~_(o=KO㭇[Xv eN_SMgSҐ BS헃D%g_N:/pe -wkG*9yYSZS.9cREL !k}<4_Xs#FmҶ:7R$i,fi!~' # !6/S6y@kZkZcX)%5V4P]VGYq%H1!;e1MV<!ϐHO021Dp= HMs~~a)ަu7G^];git!Frl]H/L$=AeUvZE4P\.,xi {-~p?2b#amXAHq)MWǾI_r`S Hz&|{ +ʖ_= (YS(_g0a03M`I&'9vl?MM+m~}*xT۲(fY*V4x@29s{DaY"toGNTO+xCAO~4Ϳ;p`Ѫ:>Ҵ7K 3}+0 387x\)a"/E>qpWB=1 ¨"MP(\xp߫́A3+J] n[ʼnӼaTbZUWb={~2ooKױӰp(CS\S筐R*JغV&&"FA}J>G֐p1ٸbk7 ŘH$JoN <8s^yk_[;gy-;߉DV{c B yce% aJhDȶ 2IdйIB/^n0tNtџdcKj4϶v~- CBcgqx9= PJ) dMsjpYB] GD4RDWX +h{y`,3ꊕ$`zj*N^TP4L:Iz9~6s) Ga:?y*J~?OrMwP\](21sZUD ?ܟQ5Q%ggW6QdO+\@ ̪X'GxN @'4=ˋ+*VwN ne_|(/BDfj5(Dq<*tNt1х!MV.C0 32b#?n0pzj#!38}޴o1KovCJ`8ŗ_"]] rDUy޲@ Ȗ-;xџ'^Y`zEd?0„ DAL18IS]VGq\4o !swV7ˣι%4FѮ~}6)OgS[~Q vcYbL!wG3 7띸*E Pql8=jT\꘿I(z<[6OrR8ºC~ډ]=rNl[g|v TMTղb-o}OrP^Q]<98S¤!k)G(Vkwyqyr޽Nv`N/e p/~NAOk \I:G6]4+K;j$R:Mi #*[AȚT,ʰ,;N{HZTGMoּy) ]%dHء9Պ䠬|<45,\=[bƟ8QXeB3- &dҩ^{>/86bXmZ]]yޚN[(WAHL$YAgDKp=5GHjU&99v簪C0vygln*P)9^͞}lMuiH!̍#DoRBn9l@ xA/_v=ȺT{7Yt2N"4!YN`ae >Q<XMydEB`VU}u]嫇.%e^ánE87Mu\t`cP=AD/G)sI"@MP;)]%fH9'FNsj1pVhY&9=0pfuJ&gޤx+k:!r˭wkl03׼Ku C &ѓYt{.O.zҏ z}/tf_wEp2gvX)GN#I ݭ߽v/ .& и(ZF{e"=V!{zW`, ]+LGz"(UJp|j( #V4, 8B 0 9OkRrlɱl94)'VH9=9W|>PS['G(*I1==C<5"Pg+x'K5EMd؞Af8lG ?D FtoB[je?{k3zQ vZ;%Ɠ,]E>KZ+T/ EJxOZ1i #T<@ I}q9/t'zi(EMqw`mYkU6;[t4DPeckeM;H}_g pMww}k6#H㶏+b8雡Sxp)&C $@'b,fPߑt$RbJ'vznuS ~8='72_`{q纶|Q)Xk}cPz9p7O:'|G~8wx(a 0QCko|0ASD>Ip=4Q, d|F8RcU"/KM opKle M3#i0c%<7׿p&pZq[TR"BpqauIp$ 8~Ĩ!8Սx\ւdT>>Z40ks7 z2IQ}ItԀ<-%S⍤};zIb$I 5K}Q͙D8UguWE$Jh )cu4N tZl+[]M4k8֦Zeq֮M7uIqG 1==tLtR,ƜSrHYt&QP윯Lg' I,3@P'}'R˪e/%-Auv·ñ\> vDJzlӾNv5:|K/Jb6KI9)Zh*ZAi`?S {aiVDԲuy5W7pWeQJk֤#5&V<̺@/GH?^τZL|IJNvI:'P=Ϛt"¨=cud S Q.Ki0 !cJy;LJR;G{BJy޺[^8fK6)=yʊ+(k|&xQ2`L?Ȓ2@Mf 0C`6-%pKpm')c$׻K5[J*U[/#hH!6acB JA _|uMvDyk y)6OPYjœ50VT K}cǻP[ $:]4MEA.y)|B)cf-A?(e|lɉ#P9V)[9t.EiQPDѠ3ϴ;E:+Օ t ȥ~|_N2,ZJLt4! %ա]u {+=p.GhNcŞQI?Nd'yeh n7zi1DB)1S | S#ًZs2|Ɛy$F SxeX{7Vl.Src3E℃Q>b6G ўYCmtկ~=K0f(=LrAS GN'ɹ9<\!a`)֕y[uՍ[09` 9 +57ts6}b4{oqd+J5fa/,97J#6yν99mRWxJyѡyu_TJc`~W>l^q#Ts#2"nD1%fS)FU w{ܯ R{ ˎ󅃏џDsZSQS;LV;7 Od1&1n$ N /.q3~eNɪ]E#oM~}v֯FڦwyZ=<<>Xo稯lfMFV6p02|*=tV!c~]fa5Y^Q_WN|Vs 0ҘދU97OI'N2'8N֭fgg-}V%y]U4 峧p*91#9U kCac_AFңĪy뚇Y_AiuYyTTYЗ-(!JFLt›17uTozc. S;7A&&<ԋ5y;Ro+:' *eYJkWR[@F %SHWP 72k4 qLd'J "zB6{AC0ƁA6U.'F3:Ȅ(9ΜL;D]m8ڥ9}dU "v!;*13Rg^fJyShyy5auA?ɩGHRjo^]׽S)Fm\toy 4WQS@mE#%5ʈfFYDX ~D5Ϡ9tE9So_aU4?Ѽm%&c{n>.KW1Tlb}:j uGi(JgcYj0qn+>) %\!4{LaJso d||u//P_y7iRJ߬nHOy) l+@$($VFIQ9%EeKʈU. ia&FY̒mZ=)+qqoQn >L!qCiDB;Y<%} OgBxB!ØuG)WG9y(Ą{_yesuZmZZey'Wg#C~1Cev@0D $a@˲(.._GimA:uyw֬%;@!JkQVM_Ow:P.s\)ot- ˹"`B,e CRtaEUP<0'}r3[>?G8xU~Nqu;Wm8\RIkբ^5@k+5(By'L&'gBJ3ݶ!/㮻w҅ yqPWUg<e"Qy*167΃sJ\oz]T*UQ<\FԎ`HaNmڜ6DysCask8wP8y9``GJ9lF\G g's Nn͵MLN֪u$| /|7=]O)6s !ĴAKh]q_ap $HH'\1jB^s\|- W1:=6lJBqjY^LsPk""`]w)󭃈,(HC ?䔨Y$Sʣ{4Z+0NvQkhol6C.婧/u]FwiVjZka&%6\F*Ny#8O,22+|Db~d ~Çwc N:FuuCe&oZ(l;@ee-+Wn`44AMK➝2BRՈt7g*1gph9N) *"TF*R(#'88pm=}X]u[i7bEc|\~EMn}P瘊J)K.0i1M6=7'_\kaZ(Th{K*GJyytw"IO-PWJk)..axӝ47"89Cc7ĐBiZx 7m!fy|ϿF9CbȩV 9V-՛^pV̌ɄS#Bv4-@]Vxt-Z, &ֺ*diؠ2^VXbs֔Ìl.jQ]Y[47gj=幽ex)A0ip׳ W2[ᎇhuE^~q흙L} #-b۸oFJ_QP3r6jr+"nfzRJTUqoaۍ /$d8Mx'ݓ= OՃ| )$2mcM*cЙj}f };n YG w0Ia!1Q.oYfr]DyISaP}"dIӗթO67jqR ҊƐƈaɤGG|h;t]䗖oSv|iZqX)oalv;۩meEJ\!8=$4QU4Xo&VEĊ YS^E#d,yX_> ۘ-e\ "Wa6uLĜZi`aD9.% w~mB(02G[6y.773a7 /=o7D)$Z 66 $bY^\CuP. (x'"J60׿Y:Oi;F{w佩b+\Yi`TDWa~|VH)8q/=9!g߆2Y)?ND)%?Ǐ`k/sn:;O299yB=a[Ng 3˲N}vLNy;*?x?~L&=xyӴ~}q{qE*IQ^^ͧvü{Huu=R|>JyUlZV, B~/YF!Y\u_ݼF{_C)LD]m {H 0ihhadd nUkf3oٺCvE\)QJi+֥@tDJkB$1!Đr0XQ|q?d2) Ӣ_}qv-< FŊ߫%roppVBwü~JidY4:}L6M7f٬F "?71<2#?Jyy4뷢<_a7_=Q E=S1И/9{+93֮E{ǂw{))?maÆm(uLE#lïZ  ~d];+]h j?!|$F}*"4(v'8s<ŏUkm7^7no1w2ؗ}TrͿEk>p'8OB7d7R(A 9.*Mi^ͳ; eeUwS+C)uO@ =Sy]` }l8^ZzRXj[^iUɺ$tj))<sbDJfg=Pk_{xaKo1:-uyG0M ԃ\0Lvuy'ȱc2Ji AdyVgVh!{]/&}}ċJ#%d !+87<;qN޼Nفl|1N:8ya  8}k¾+-$4FiZYÔXk*I&'@iI99)HSh4+2G:tGhS^繿 Kتm0 вDk}֚+QT4;sC}rՅE,8CX-e~>G&'9xpW,%Fh,Ry56Y–hW-(v_,? ; qrBk4-V7HQ;ˇ^Gv1JVV%,ik;D_W!))+BoS4QsTM;gt+ndS-~:11Sgv!0qRVh!"Ȋ(̦Yl.]PQWgٳE'`%W1{ndΗBk|Ž7ʒR~,lnoa&:ü$ 3<a[CBݮwt"o\ePJ=Hz"_c^Z.#ˆ*x z̝grY]tdkP*:97YľXyBkD4N.C_[;F9`8& !AMO c `@BA& Ost\-\NX+Xp < !bj3C&QL+*&kAQ=04}cC!9~820G'PC9xa!w&bo_1 Sw"ܱ V )Yl3+ס2KoXOx]"`^WOy :3GO0g;%Yv㐫(R/r (s } u B &FeYZh0y> =2<Ϟc/ -u= c&׭,.0"g"7 6T!vl#sc>{u/Oh Bᾈ)۴74]x7 gMӒ"d]U)}" v4co[ ɡs 5Gg=XR14?5A}D "b{0$L .\4y{_fe:kVS\\O]c^W52LSBDM! C3Dhr̦RtArx4&agaN3Cf<Ԉp4~ B'"1@.b_/xQ} _߃҉/gٓ2Qkqp0շpZ2fԫYz< 4L.Cyυι1t@鎫Fe sYfsF}^ V}N<_`p)alٶ "(XEAVZ<)2},:Ir*#m_YӼ R%a||EƼIJ,,+f"96r/}0jE/)s)cjW#w'Sʯ5<66lj$a~3Kʛy 2:cZ:Yh))+a߭K::N,Q F'qB]={.]h85C9cr=}*rk?vwV렵ٸW Rs%}rNAkDv|uFLBkWY YkX מ|)1!$#3%y?pF<@<Rr0}: }\J [5FRxY<9"SQdE(Q*Qʻ)q1E0B_O24[U'],lOb ]~WjHޏTQ5Syu wq)xnw8~)c 쫬gٲߠ H% k5dƝk> kEj,0% b"vi2Wس_CuK)K{n|>t{P1򨾜j>'kEkƗBg*H%'_aY6Bn!TL&ɌOb{c`'d^{t\i^[uɐ[}q0lM˕G:‚4kb祔c^:?bpg… +37stH:0}en6x˟%/<]BL&* 5&fK9Mq)/iyqtA%kUe[ڛKN]Ě^,"`/ s[EQQm?|XJ߅92m]G.E΃ח U*Cn.j_)Tѧj̿30ڇ!A0=͜ar I3$C^-9#|pk!)?7.x9 @OO;WƝZBFU keZ75F6Tc6"ZȚs2y/1 ʵ:u4xa`C>6Rb/Yм)^=+~uRd`/|_8xbB0?Ft||Z\##|K 0>>zxv8۴吅q 8ĥ)"6>~\8:qM}#͚'ĉ#p\׶ l#bA?)|g g9|8jP(cr,BwV (WliVxxᡁ@0Okn;ɥh$_ckCgriv}>=wGzβ KkBɛ[˪ !J)h&k2%07δt}!d<9;I&0wV/ v 0<H}L&8ob%Hi|޶o&h1L|u֦y~󛱢8fٲUsւ)0oiFx2}X[zVYr_;N(w]_4B@OanC?gĦx>мgx>ΛToZoOMp>40>V Oy V9iq!4 LN,ˢu{jsz]|"R޻&'ƚ{53ўFu(<٪9:΋]B;)B>1::8;~)Yt|0(pw2N%&X,URBK)3\zz&}ax4;ǟ(tLNg{N|Ǽ\G#C9g$^\}p?556]/RP.90 k,U8/u776s ʪ_01چ|\N 0VV*3H鴃J7iI!wG_^ypl}r*jɤSR 5QN@ iZ#1ٰy;_\3\BQQ x:WJv츟ٯ$"@6 S#qe딇(/P( Dy~TOϻ<4:-+F`0||;Xl-"uw$Цi󼕝mKʩorz"mϺ$F:~E'ҐvD\y?Rr8_He@ e~O,T.(ފR*cY^m|cVR[8 JҡSm!ΆԨb)RHG{?MpqrmN>߶Y)\p,d#xۆWY*,l6]v0h15M˙MS8+EdI='LBJIH7_9{Caз*Lq,dt >+~ّeʏ?xԕ4bBAŚjﵫ!'\Ը$WNvKO}ӽmSşذqsOy?\[,d@'73'j%kOe`1.g2"e =YIzS2|zŐƄa\U,dP;jhhhaxǶ?КZ՚.q SE+XrbOu%\GتX(H,N^~]JyEZQKceTQ]VGYqnah;y$cQahT&QPZ*iZ8UQQM.qo/T\7X"u?Mttl2Xq(IoW{R^ ux*SYJ! 4S.Jy~ BROS[V|žKNɛP(L6V^|cR7i7nZW1Fd@ Ara{詑|(T*dN]Ko?s=@ |_EvF]׍kR)eBJc" MUUbY6`~V޴dJKß&~'d3i WWWWWW
Current Directory: /opt/saltstack/salt/lib/python3.10/site-packages/salt/channel
Viewing File: /opt/saltstack/salt/lib/python3.10/site-packages/salt/channel/client.py
""" Encapsulate the different transports available to Salt. This includes client side transport, for the ReqServer and the Publisher """ import logging import os import time import uuid import salt.crypt import salt.exceptions import salt.ext.tornado.gen import salt.ext.tornado.ioloop import salt.payload import salt.transport.frame import salt.utils.event import salt.utils.files import salt.utils.minions import salt.utils.stringutils import salt.utils.verify from salt.utils.asynchronous import SyncWrapper log = logging.getLogger(__name__) REQUEST_CHANNEL_TIMEOUT = 60 REQUEST_CHANNEL_TRIES = 3 class ReqChannel: """ Factory class to create a sychronous communication channels to the master's ReqServer. ReqChannels use transports to connect to the ReqServer. """ @staticmethod def factory(opts, **kwargs): return SyncWrapper( AsyncReqChannel.factory, (opts,), kwargs, loop_kwarg="io_loop", ) class PushChannel: """ Factory class to create Sync channel for push side of push/pull IPC """ @staticmethod def factory(opts, **kwargs): return SyncWrapper( AsyncPushChannel.factory, (opts,), kwargs, loop_kwarg="io_loop", ) class PullChannel: """ Factory class to create Sync channel for pull side of push/pull IPC """ @staticmethod def factory(opts, **kwargs): return SyncWrapper( AsyncPullChannel.factory, (opts,), kwargs, loop_kwarg="io_loop", ) class AsyncReqChannel: """ Factory class to create a asynchronous communication channels to the master's ReqServer. ReqChannels connect to the master's ReqServerChannel. """ async_methods = [ "crypted_transfer_decode_dictentry", "_crypted_transfer", "_uncrypted_transfer", "send", "connect", ] close_methods = [ "close", ] @classmethod def factory(cls, opts, **kwargs): # Default to ZeroMQ for now ttype = "zeromq" # determine the ttype if "transport" in opts: ttype = opts["transport"] elif "transport" in opts.get("pillar", {}).get("master", {}): ttype = opts["pillar"]["master"]["transport"] if "master_uri" not in opts and "master_uri" in kwargs: opts["master_uri"] = kwargs["master_uri"] io_loop = kwargs.get("io_loop") if io_loop is None: io_loop = salt.ext.tornado.ioloop.IOLoop.current() timeout = opts.get("request_channel_timeout", REQUEST_CHANNEL_TIMEOUT) tries = opts.get("request_channel_tries", REQUEST_CHANNEL_TRIES) crypt = kwargs.get("crypt", "aes") if crypt != "clear": # we don't need to worry about auth as a kwarg, since its a singleton auth = salt.crypt.AsyncAuth(opts, io_loop=io_loop) else: auth = None transport = salt.transport.request_client(opts, io_loop=io_loop) return cls(opts, transport, auth, tries=tries, timeout=timeout) def __init__( self, opts, transport, auth, timeout=REQUEST_CHANNEL_TIMEOUT, tries=REQUEST_CHANNEL_TRIES, **kwargs, ): self.opts = dict(opts) self.transport = transport self.auth = auth self.master_pubkey_path = None if self.auth: self.master_pubkey_path = os.path.join(self.opts["pki_dir"], self.auth.mpub) self._closing = False self.timeout = timeout self.tries = tries @property def crypt(self): if self.auth: return "aes" return "clear" @property def ttype(self): return self.transport.ttype def _package_load(self, load, nonce=None): """ Prepare the load to be sent over the wire. For aes channels add a nonce, timestamp and signed token to the load before encrypting it using our aes session key. Then wrap the encrypted load with some meta data. For 'clear' encryption, no extra feilds are added to the load. The unencyrpted load is wrapped with meta data. """ if self.crypt == "aes": if nonce is None: nonce = uuid.uuid4().hex try: load["nonce"] = nonce load["ts"] = int(time.time()) load["tok"] = self.auth.gen_token(b"salt") load["id"] = self.opts["id"] except TypeError: # Backwards compatability for non dict loads, let the load get # sent and fail to authenticate. log.warning( "Invalid load passed to request channel. Type is %s should be dict.", type(load), ) load = self.auth.session_crypticle.dumps(load) ret = { "enc": self.crypt, "load": load, "version": 3, } if self.crypt == "aes": ret["id"] = self.opts["id"] ret["enc_algo"] = self.opts["encryption_algorithm"] ret["sig_algo"] = self.opts["signing_algorithm"] return ret @salt.ext.tornado.gen.coroutine def _send_with_retry(self, load, tries, timeout): _try = 1 while True: try: ret = yield self.transport.send( load, timeout=timeout, ) break except Exception as exc: # pylint: disable=broad-except log.trace("Failed to send msg %r", exc) if _try >= tries: raise else: _try += 1 continue raise salt.ext.tornado.gen.Return(ret) @salt.ext.tornado.gen.coroutine def crypted_transfer_decode_dictentry( self, load, dictkey=None, timeout=None, tries=None, ): if timeout is None: timeout = self.timeout if tries is None: tries = self.tries if not self.auth.authenticated: yield self.auth.authenticate() nonce = uuid.uuid4().hex ret = yield self._send_with_retry( self._package_load(load, nonce), tries, timeout, ) key = self.auth.get_keys() if "key" not in ret: # Reauth in the case our key is deleted on the master side. yield self.auth.authenticate() ret = yield self._send_with_retry( self._package_load(load, nonce), tries, timeout, ) aes = key.decrypt(ret["key"], self.opts["encryption_algorithm"]) # Decrypt using the public key. pcrypt = salt.crypt.Crypticle(self.opts, aes) signed_msg = pcrypt.loads(ret[dictkey]) # Validate the master's signature. if not self.verify_signature(signed_msg["data"], signed_msg["sig"]): # Try to reauth on error yield self.auth.authenticate() if not self.verify_signature(signed_msg["data"], signed_msg["sig"]): raise salt.crypt.AuthenticationError( "Pillar payload signature failed to validate." ) # Make sure the signed key matches the key we used to decrypt the data. data = salt.payload.loads(signed_msg["data"]) if data["key"] != ret["key"]: raise salt.crypt.AuthenticationError("Key verification failed.") # Validate the nonce. if data["nonce"] != nonce: raise salt.crypt.AuthenticationError("Pillar nonce verification failed.") raise salt.ext.tornado.gen.Return(data["pillar"]) def verify_signature(self, data, sig): return salt.crypt.PublicKey(self.master_pubkey_path).verify( data, sig, self.opts["signing_algorithm"] ) @salt.ext.tornado.gen.coroutine def _crypted_transfer(self, load, timeout, raw=False): """ Send a load across the wire, with encryption In case of authentication errors, try to renegotiate authentication and retry the method. Indeed, we can fail too early in case of a master restart during a minion state execution call :param dict load: A load to send across the wire :param int timeout: The number of seconds on a response before failing """ @salt.ext.tornado.gen.coroutine def _do_transfer(): # Yield control to the caller. When send() completes, resume by populating data with the Future.result nonce = uuid.uuid4().hex data = yield self.transport.send( self._package_load(load, nonce), timeout=timeout, ) # we may not have always data # as for example for saltcall ret submission, this is a blind # communication, we do not subscribe to return events, we just # upload the results to the master if data: data = self.auth.session_crypticle.loads(data, raw, nonce=nonce) if not raw or self.ttype == "tcp": # XXX Why is this needed for tcp data = salt.transport.frame.decode_embedded_strs(data) raise salt.ext.tornado.gen.Return(data) if not self.auth.authenticated: # Return control back to the caller, resume when authentication succeeds yield self.auth.authenticate() try: # We did not get data back the first time. Retry. ret = yield _do_transfer() except salt.crypt.AuthenticationError: # If auth error, return control back to the caller, continue when authentication succeeds yield self.auth.authenticate() ret = yield _do_transfer() raise salt.ext.tornado.gen.Return(ret) @salt.ext.tornado.gen.coroutine def _uncrypted_transfer(self, load, timeout): """ Send a load across the wire in cleartext :param dict load: A load to send across the wire :param int timeout: The number of seconds on a response before failing """ ret = yield self.transport.send( self._package_load(load), timeout=timeout, ) raise salt.ext.tornado.gen.Return(ret) @salt.ext.tornado.gen.coroutine def connect(self): yield self.transport.connect() @salt.ext.tornado.gen.coroutine def send(self, load, tries=None, timeout=None, raw=False): """ Send a request, return a future which will complete when we send the message :param dict load: A load to send across the wire :param int tries: The number of times to make before failure :param int timeout: The number of seconds on a response before failing """ if timeout is None: timeout = self.timeout if tries is None: tries = self.tries _try = 1 while True: try: if self.crypt == "clear": log.trace("ReqChannel send clear load=%r", load) ret = yield self._uncrypted_transfer(load, timeout=timeout) else: log.trace("ReqChannel send crypt load=%r", load) ret = yield self._crypted_transfer(load, timeout=timeout, raw=raw) break except Exception as exc: # pylint: disable=broad-except log.trace("Failed to send msg %r", exc) if _try >= tries: raise else: _try += 1 continue raise salt.ext.tornado.gen.Return(ret) def close(self): """ Since the message_client creates sockets and assigns them to the IOLoop we have to specifically destroy them, since we aren't the only ones with references to the FDs """ if self._closing: return log.debug("Closing %s instance", self.__class__.__name__) self._closing = True self.transport.close() def __enter__(self): return self def __exit__(self, *args): self.close() class AsyncPubChannel: """ Factory class to create subscription channels to the master's Publisher """ async_methods = [ "connect", "_decode_payload", ] close_methods = [ "close", ] @classmethod def factory(cls, opts, **kwargs): # Default to ZeroMQ for now ttype = "zeromq" # determine the ttype if "transport" in opts: ttype = opts["transport"] elif "transport" in opts.get("pillar", {}).get("master", {}): ttype = opts["pillar"]["master"]["transport"] if "master_uri" not in opts and "master_uri" in kwargs: opts["master_uri"] = kwargs["master_uri"] # switch on available ttypes if ttype == "detect": opts["detect_mode"] = True log.info("Transport is set to detect; using %s", ttype) io_loop = kwargs.get("io_loop") if io_loop is None: io_loop = salt.ext.tornado.ioloop.IOLoop.current() auth = salt.crypt.AsyncAuth(opts, io_loop=io_loop) transport = salt.transport.publish_client(opts, io_loop) return cls(opts, transport, auth, io_loop) def __init__(self, opts, transport, auth, io_loop=None): self.opts = opts self.io_loop = io_loop self.auth = auth self.token = self.auth.gen_token(b"salt") self.transport = transport self._closing = False self._reconnected = False self.event = salt.utils.event.get_event("minion", opts=self.opts, listen=False) self.master_pubkey_path = os.path.join(self.opts["pki_dir"], self.auth.mpub) @property def crypt(self): return "aes" if self.auth else "clear" @salt.ext.tornado.gen.coroutine def connect(self): """ Return a future which completes when connected to the remote publisher """ try: if not self.auth.authenticated: yield self.auth.authenticate() # if this is changed from the default, we assume it was intentional if int(self.opts.get("publish_port", 4506)) != 4506: publish_port = self.opts.get("publish_port") # else take the relayed publish_port master reports else: publish_port = self.auth.creds["publish_port"] # TODO: The zeromq transport does not use connect_callback and # disconnect_callback. yield self.transport.connect( publish_port, self.connect_callback, self.disconnect_callback ) # TODO: better exception handling... except KeyboardInterrupt: # pylint: disable=try-except-raise raise except Exception as exc: # pylint: disable=broad-except if "-|RETRY|-" not in str(exc): raise salt.exceptions.SaltClientError( f"Unable to sign_in to master: {exc}" ) # TODO: better error message def close(self): """ Close the channel """ self.transport.close() if self.event is not None: self.event.destroy() self.event = None def on_recv(self, callback=None): """ When jobs are received pass them (decoded) to callback """ if callback is None: return self.transport.on_recv(None) @salt.ext.tornado.gen.coroutine def wrap_callback(messages): payload = yield self.transport._decode_messages(messages) decoded = yield self._decode_payload(payload) log.debug("PubChannel received: %r", decoded) if decoded is not None: callback(decoded) return self.transport.on_recv(wrap_callback) def _package_load(self, load): return { "enc": self.crypt, "load": load, "version": 3, } @salt.ext.tornado.gen.coroutine def send_id(self, tok, force_auth): """ Send the minion id to the master so that the master may better track the connection state of the minion. In case of authentication errors, try to renegotiate authentication and retry the method. """ load = {"id": self.opts["id"], "tok": tok} @salt.ext.tornado.gen.coroutine def _do_transfer(): msg = self._package_load(self.auth.crypticle.dumps(load)) package = salt.transport.frame.frame_msg(msg, header=None) yield self.transport.send(package) raise salt.ext.tornado.gen.Return(True) if force_auth or not self.auth.authenticated: count = 0 while ( count <= self.opts["tcp_authentication_retries"] or self.opts["tcp_authentication_retries"] < 0 ): try: yield self.auth.authenticate() break except salt.exceptions.SaltClientError as exc: log.debug(exc) count += 1 try: ret = yield _do_transfer() raise salt.ext.tornado.gen.Return(ret) except salt.crypt.AuthenticationError: yield self.auth.authenticate() ret = yield _do_transfer() raise salt.ext.tornado.gen.Return(ret) @salt.ext.tornado.gen.coroutine def connect_callback(self, result): if self._closing: return try: # Force re-auth on reconnect since the master # may have been restarted yield self.send_id(self.token, self._reconnected) self.connected = True self.event.fire_event({"master": self.opts["master"]}, "__master_connected") if self._reconnected: # On reconnects, fire a master event to notify that the minion is # available. if self.opts.get("__role") == "syndic": data = "Syndic {} started at {}".format( self.opts["id"], time.asctime() ) tag = salt.utils.event.tagify([self.opts["id"], "start"], "syndic") else: data = "Minion {} started at {}".format( self.opts["id"], time.asctime() ) tag = salt.utils.event.tagify([self.opts["id"], "start"], "minion") load = { "id": self.opts["id"], "cmd": "_minion_event", "pretag": None, "tok": self.token, "data": data, "tag": tag, } with AsyncReqChannel.factory(self.opts) as channel: try: yield channel.send(load, timeout=60) except salt.exceptions.SaltReqTimeoutError: log.info( "fire_master failed: master could not be contacted. Request timed" " out." ) except Exception: # pylint: disable=broad-except log.info("fire_master failed", exc_info=True) else: self._reconnected = True except Exception as exc: # pylint: disable=broad-except log.error( "Caught exception in PubChannel connect callback %r", exc, exc_info=True ) def disconnect_callback(self): if self._closing: return self.connected = False self.event.fire_event({"master": self.opts["master"]}, "__master_disconnected") def _verify_master_signature(self, payload): if self.opts.get("sign_pub_messages"): if not payload.get("sig", False): raise salt.crypt.AuthenticationError( "Message signing is enabled but the payload has no signature." ) # Verify that the signature is valid if not salt.crypt.verify_signature( self.master_pubkey_path, payload["load"], payload.get("sig"), algorithm=payload["sig_algo"], ): raise salt.crypt.AuthenticationError( "Message signature failed to validate." ) @salt.ext.tornado.gen.coroutine def _decode_payload(self, payload): # we need to decrypt it log.trace("Decoding payload: %s", payload) reauth = False if payload["enc"] == "aes": self._verify_master_signature(payload) try: payload["load"] = self.auth.crypticle.loads(payload["load"]) except salt.crypt.AuthenticationError: reauth = True if reauth: try: yield self.auth.authenticate() payload["load"] = self.auth.crypticle.loads(payload["load"]) except salt.crypt.AuthenticationError: log.error( "Payload decryption failed even after re-authenticating with master %s", self.opts["master_ip"], ) raise salt.ext.tornado.gen.Return(payload) def __enter__(self): return self def __exit__(self, *args): self.close() class AsyncPushChannel: """ Factory class to create IPC Push channels """ @staticmethod def factory(opts, **kwargs): """ If we have additional IPC transports other than UxD and TCP, add them here """ # FIXME for now, just UXD # Obviously, this makes the factory approach pointless, but we'll extend later import salt.transport.ipc return salt.transport.ipc.IPCMessageClient(opts, **kwargs) class AsyncPullChannel: """ Factory class to create IPC pull channels """ @staticmethod def factory(opts, **kwargs): """ If we have additional IPC transports other than UXD and TCP, add them here """ import salt.transport.ipc return salt.transport.ipc.IPCMessageServer(opts, **kwargs)