jumpserver/connect.py

799 lines
32 KiB
Python
Raw Normal View History

2015-04-20 02:12:11 +00:00
# coding: utf-8
import sys
reload(sys)
sys.setdefaultencoding('utf8')
import os
import re
import time
2015-11-04 09:04:25 +00:00
import datetime
2015-04-20 02:12:11 +00:00
import textwrap
import getpass
import readline
2015-06-08 15:46:40 +00:00
import django
2015-11-04 09:04:25 +00:00
import paramiko
2015-12-09 03:49:30 +00:00
import errno
import struct, fcntl, signal, socket, select
2015-11-28 13:13:44 +00:00
from io import open as copen
2015-12-02 05:35:06 +00:00
import uuid
2015-04-20 02:12:11 +00:00
os.environ['DJANGO_SETTINGS_MODULE'] = 'jumpserver.settings'
2015-06-08 15:46:40 +00:00
if django.get_version() != '1.6':
django.setup()
2015-11-23 07:34:28 +00:00
from django.contrib.sessions.models import Session
2015-12-08 03:32:27 +00:00
from jumpserver.api import ServerError, User, Asset, PermRole, AssetGroup, get_object, mkdir, get_asset_info
2015-12-02 05:35:06 +00:00
from jumpserver.api import logger, Log, TtyLog, get_role_key, CRYPTOR, bash, get_tmp_dir
2015-12-02 11:16:05 +00:00
from jperm.perm_api import gen_resource, get_group_asset_perm, get_group_user_perm, user_have_perm, PermRole
from jumpserver.settings import LOG_DIR
2015-12-08 03:32:27 +00:00
from jperm.ansible_api import MyRunner
2015-12-03 08:53:39 +00:00
# from jlog.log_api import escapeString
2015-12-03 15:24:34 +00:00
from jlog.models import ExecLog, FileLog
login_user = get_object(User, username=getpass.getuser())
2015-12-03 10:49:04 +00:00
remote_ip = os.popen("who -m | awk '{ print $5 }'").read().strip('()\n')
2015-04-24 10:19:43 +00:00
2015-11-04 09:04:25 +00:00
try:
import termios
import tty
except ImportError:
print '\033[1;31m仅支持类Unix系统 Only unix like supported.\033[0m'
time.sleep(3)
sys.exit()
2015-04-20 02:12:11 +00:00
2015-06-15 11:20:05 +00:00
def color_print(msg, color='red', exits=False):
2015-06-08 15:46:40 +00:00
"""
Print colorful string.
2015-08-26 15:31:32 +00:00
颜色打印字符或者退出
2015-06-08 15:46:40 +00:00
"""
2015-04-20 02:12:11 +00:00
color_msg = {'blue': '\033[1;36m%s\033[0m',
'green': '\033[1;32m%s\033[0m',
2015-12-08 15:19:39 +00:00
'yellow': '\033[1;33m%s\033[0m',
'red': '\033[1;31m%s\033[0m',
2015-12-09 03:49:30 +00:00
'title': '\033[30;42m%s\033[0m',
2015-12-08 15:19:39 +00:00
'info': '\033[32m%s\033[0m'}
msg = color_msg.get(color, 'red') % msg
2015-11-27 08:16:38 +00:00
print msg
2015-06-15 11:20:05 +00:00
if exits:
time.sleep(2)
sys.exit()
2015-11-27 08:16:38 +00:00
return msg
2015-06-15 11:20:05 +00:00
2015-11-27 09:53:11 +00:00
def write_log(f, msg):
msg = re.sub(r'[\r\n]', '\r\n', msg)
f.write(msg)
f.flush()
2015-11-07 05:38:50 +00:00
class Tty(object):
2015-11-04 09:04:25 +00:00
"""
A virtual tty class
2015-11-07 05:38:50 +00:00
一个虚拟终端类实现连接ssh和记录日志基类
2015-11-04 09:04:25 +00:00
"""
2015-12-08 15:19:39 +00:00
def __init__(self, user, asset, role, login_type='ssh'):
2015-11-21 11:20:11 +00:00
self.username = user.username
self.asset_name = asset.hostname
2015-11-07 05:38:50 +00:00
self.ip = None
self.port = 22
2015-12-09 08:42:48 +00:00
self.ssh = None
2015-11-07 05:38:50 +00:00
self.channel = None
2015-11-21 11:20:11 +00:00
self.asset = asset
self.user = user
self.role = role
2015-11-26 11:49:23 +00:00
self.remote_ip = ''
2015-12-08 15:19:39 +00:00
self.login_type = login_type
2015-11-22 12:45:48 +00:00
self.vim_flag = False
2015-11-22 13:59:07 +00:00
self.ps1_pattern = re.compile('\[.*@.*\][\$#]')
self.vim_data = ''
2015-11-26 09:42:03 +00:00
2015-11-04 09:04:25 +00:00
@staticmethod
2015-11-07 05:38:50 +00:00
def is_output(strings):
newline_char = ['\n', '\r', '\r\n']
for char in newline_char:
if char in strings:
return True
return False
2015-11-04 09:04:25 +00:00
2015-11-26 13:47:37 +00:00
@staticmethod
def remove_obstruct_char(cmd_str):
'''删除一些干扰的特殊符号'''
control_char = re.compile(r'\x07 | \x1b\[1P | \r ', re.X)
cmd_str = control_char.sub('',cmd_str.strip())
patch_char = re.compile('\x08\x1b\[C') #删除方向左右一起的按键
while patch_char.search(cmd_str):
cmd_str = patch_char.sub('', cmd_str.rstrip())
return cmd_str
2015-11-26 13:47:37 +00:00
2015-12-06 12:56:28 +00:00
@staticmethod
def deal_backspace(match_str, result_command, pattern_str, backspace_num):
'''
处理删除确认键
'''
if backspace_num > 0:
if backspace_num > len(result_command):
result_command += pattern_str
result_command = result_command[0:-backspace_num]
else:
result_command = result_command[0:-backspace_num]
result_command += pattern_str
del_len = len(match_str)-3
if del_len > 0:
result_command = result_command[0:-del_len]
return result_command, len(match_str)
@staticmethod
def deal_replace_char(match_str,result_command,backspace_num):
'''
处理替换命令
'''
str_lists = re.findall(r'(?<=\x1b\[1@)\w',match_str)
tmp_str =''.join(str_lists)
result_command_list = list(result_command)
if len(tmp_str) > 1:
result_command_list[-backspace_num:-(backspace_num-len(tmp_str))] = tmp_str
elif len(tmp_str) > 0:
if result_command_list[-backspace_num] == ' ':
result_command_list.insert(-backspace_num, tmp_str)
else:
result_command_list[-backspace_num] = tmp_str
result_command = ''.join(result_command_list)
return result_command, len(match_str)
2015-11-26 10:19:36 +00:00
def remove_control_char(self, result_command):
"""
处理日志特殊字符
"""
control_char = re.compile(r"""
\x1b[ #%()*+\-.\/]. |
\r | #匹配 回车符(CR)
(?:\x1b\[|\x9b) [ -?]* [@-~] | #匹配 控制顺序描述符(CSI)... Cmd
(?:\x1b\]|\x9d) .*? (?:\x1b\\|[\a\x9c]) | \x07 | #匹配 操作系统指令(OSC)...终止符或振铃符(ST|BEL)
(?:\x1b[P^_]|[\x90\x9e\x9f]) .*? (?:\x1b\\|\x9c) | #匹配 设备控制串或私讯或应用程序命令(DCS|PM|APC)...终止符(ST)
\x1b. #匹配 转义过后的字符
[\x80-\x9f] | (?:\x1b\]0.*) | \[.*@.*\][\$#] | (.*mysql>.*) #匹配 所有控制字符
""", re.X)
result_command = control_char.sub('', result_command.strip())
2015-11-26 10:19:36 +00:00
if not self.vim_flag:
if result_command.startswith('vi') or result_command.startswith('fg'):
2015-11-26 10:19:36 +00:00
self.vim_flag = True
return result_command.decode('utf8',"ignore")
else:
return ''
2015-11-22 12:45:48 +00:00
def deal_command(self, str_r):
2015-11-16 15:33:44 +00:00
"""
2015-11-22 12:45:48 +00:00
处理命令中特殊字符
2015-11-16 15:33:44 +00:00
"""
2015-12-06 12:56:28 +00:00
str_r = self.remove_obstruct_char(str_r)
2015-11-16 15:33:44 +00:00
2015-11-22 12:45:48 +00:00
result_command = '' # 最后的结果
backspace_num = 0 # 光标移动的个数
reach_backspace_flag = False # 没有检测到光标键则为true
pattern_str = ''
2015-11-16 15:33:44 +00:00
while str_r:
2015-11-22 11:15:58 +00:00
tmp = re.match(r'\s*\w+\s*', str_r)
2015-11-16 15:33:44 +00:00
if tmp:
2015-12-06 12:56:28 +00:00
str_r = str_r[len(str(tmp.group(0))):]
2015-11-22 12:45:48 +00:00
if reach_backspace_flag:
pattern_str += str(tmp.group(0))
2015-11-16 15:33:44 +00:00
continue
else:
result_command += str(tmp.group(0))
continue
2015-11-22 11:15:58 +00:00
2015-11-26 09:42:03 +00:00
tmp = re.match(r'\x1b\[K[\x08]*', str_r)
2015-11-16 15:33:44 +00:00
if tmp:
2015-12-06 12:56:28 +00:00
result_command, del_len = self.deal_backspace(str(tmp.group(0)), result_command, pattern_str, backspace_num)
2015-11-16 15:33:44 +00:00
reach_backspace_flag = False
2015-11-22 12:45:48 +00:00
backspace_num = 0
pattern_str = ''
2015-12-06 12:56:28 +00:00
str_r = str_r[del_len:]
2015-11-16 15:33:44 +00:00
continue
2015-11-22 11:15:58 +00:00
2015-11-26 09:42:03 +00:00
tmp = re.match(r'\x08+', str_r)
2015-11-16 15:33:44 +00:00
if tmp:
str_r = str_r[len(str(tmp.group(0))):]
2015-11-22 11:15:58 +00:00
if len(str_r) != 0:
if reach_backspace_flag:
2015-11-26 09:42:03 +00:00
result_command = result_command[0:-backspace_num] + pattern_str
2015-11-22 11:15:58 +00:00
pattern_str = ''
else:
reach_backspace_flag = True
backspace_num = len(str(tmp.group(0)))
continue
2015-11-16 15:33:44 +00:00
else:
2015-11-22 11:15:58 +00:00
break
2015-12-06 12:56:28 +00:00
tmp = re.match(r'(\x1b\[1@\w)+', str_r) #处理替换的命令
if tmp:
result_command,del_len = self.deal_replace_char(str(tmp.group(0)), result_command, backspace_num)
str_r = str_r[del_len:]
backspace_num = 0
continue
2015-11-26 09:42:03 +00:00
if reach_backspace_flag:
2015-11-22 12:45:48 +00:00
pattern_str += str_r[0]
else:
2015-11-16 15:33:44 +00:00
result_command += str_r[0]
str_r = str_r[1:]
2015-11-22 11:15:58 +00:00
2015-11-26 09:42:03 +00:00
if backspace_num > 0:
2015-11-22 11:15:58 +00:00
result_command = result_command[0:-backspace_num] + pattern_str
2015-11-16 15:33:44 +00:00
2015-12-06 12:56:28 +00:00
result_command = self.remove_control_char(result_command)
return result_command
2015-11-07 05:38:50 +00:00
def get_log(self):
2015-11-04 09:04:25 +00:00
"""
Logging user command and output.
记录用户的日志
"""
tty_log_dir = os.path.join(LOG_DIR, 'tty')
date_today = datetime.datetime.now()
date_start = date_today.strftime('%Y%m%d')
time_start = date_today.strftime('%H%M%S')
2015-11-04 09:04:25 +00:00
today_connect_log_dir = os.path.join(tty_log_dir, date_start)
2015-11-07 05:38:50 +00:00
log_file_path = os.path.join(today_connect_log_dir, '%s_%s_%s' % (self.username, self.asset_name, time_start))
2015-11-04 09:04:25 +00:00
try:
2015-11-18 07:15:08 +00:00
mkdir(os.path.dirname(today_connect_log_dir), mode=0777)
mkdir(today_connect_log_dir, mode=0777)
2015-11-04 09:04:25 +00:00
except OSError:
logger.debug('创建目录 %s 失败,请修改%s目录权限' % (today_connect_log_dir, tty_log_dir))
2015-12-08 15:19:39 +00:00
raise ServerError('创建目录 %s 失败,请修改%s目录权限' % (today_connect_log_dir, tty_log_dir))
2015-11-04 09:04:25 +00:00
try:
log_file_f = open(log_file_path + '.log', 'a')
log_time_f = open(log_file_path + '.time', 'a')
except IOError:
logger.debug('创建tty日志文件失败, 请修改目录%s权限' % today_connect_log_dir)
2015-12-08 15:19:39 +00:00
raise ServerError('创建tty日志文件失败, 请修改目录%s权限' % today_connect_log_dir)
2015-11-04 09:04:25 +00:00
if self.login_type == 'ssh': # 如果是ssh连接过来记录connect.py的pidweb terminal记录为日志的id
2015-11-07 07:27:49 +00:00
pid = os.getpid()
2015-12-08 15:19:39 +00:00
self.remote_ip = remote_ip # 获取远端IP
2015-11-07 07:27:49 +00:00
else:
2015-11-26 11:49:23 +00:00
pid = 0
log = Log(user=self.username, host=self.asset_name, remote_ip=self.remote_ip, login_type=self.login_type,
log_path=log_file_path, start_time=date_today, pid=pid)
2015-11-04 09:04:25 +00:00
log.save()
2015-11-26 11:49:23 +00:00
if self.login_type == 'web':
2015-12-08 15:19:39 +00:00
log.pid = log.id # 设置log id为websocket的id, 然后kill时干掉websocket
2015-11-26 11:49:23 +00:00
log.save()
2015-11-28 13:13:44 +00:00
log_file_f.write('Start at %s\r\n' % datetime.datetime.now())
2015-11-07 05:38:50 +00:00
return log_file_f, log_time_f, log
def get_connect_info(self):
"""
获取需要登陆的主机的信息和映射用户的账号密码
"""
2015-11-21 11:20:11 +00:00
asset_info = get_asset_info(self.asset)
2015-12-08 15:19:39 +00:00
role_key = get_role_key(self.user, self.role) # 获取角色的key因为ansible需要权限是600所以统一生成用户_角色key
2015-11-24 05:31:48 +00:00
role_pass = CRYPTOR.decrypt(self.role.password)
2015-12-08 15:19:39 +00:00
connect_info = {'user': self.user, 'asset': self.asset, 'ip': asset_info.get('ip'),
'port': int(asset_info.get('port')), 'role_name': self.role.name,
'role_pass': role_pass, 'role_key': role_key}
logger.debug(connect_info)
return connect_info
2015-11-04 09:04:25 +00:00
2015-11-07 05:38:50 +00:00
def get_connection(self):
"""
获取连接成功后的ssh
"""
connect_info = self.get_connect_info()
# 发起ssh连接请求 Make a ssh connection
ssh = paramiko.SSHClient()
ssh.load_system_host_keys()
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
try:
2015-11-24 05:37:36 +00:00
role_key = connect_info.get('role_key')
2015-11-20 10:42:44 +00:00
if role_key and os.path.isfile(role_key):
try:
ssh.connect(connect_info.get('ip'),
port=connect_info.get('port'),
username=connect_info.get('role_name'),
2015-12-08 15:19:39 +00:00
password=connect_info.get('role_pass'),
2015-11-20 10:42:44 +00:00
key_filename=role_key,
2015-12-09 08:42:48 +00:00
look_for_keys=False)
2015-11-20 10:42:44 +00:00
return ssh
2015-11-24 05:31:48 +00:00
except (paramiko.ssh_exception.AuthenticationException, paramiko.ssh_exception.SSHException):
2015-12-08 15:19:39 +00:00
logger.warning(u'使用ssh key %s 失败, 尝试只使用密码' % role_key)
2015-11-20 10:42:44 +00:00
pass
ssh.connect(connect_info.get('ip'),
port=connect_info.get('port'),
username=connect_info.get('role_name'),
password=connect_info.get('role_pass'),
2015-12-07 15:21:10 +00:00
allow_agent=False,
2015-11-20 10:42:44 +00:00
look_for_keys=False)
2015-11-07 05:38:50 +00:00
except paramiko.ssh_exception.AuthenticationException, paramiko.ssh_exception.SSHException:
raise ServerError('认证失败 Authentication Error.')
except socket.error:
raise ServerError('端口可能不对 Connect SSH Socket Port Error, Please Correct it.')
else:
2015-12-09 08:42:48 +00:00
self.ssh = ssh
2015-11-07 05:38:50 +00:00
return ssh
class SshTty(Tty):
"""
A virtual tty class
一个虚拟终端类实现连接ssh和记录日志
"""
@staticmethod
def get_win_size():
"""
This function use to get the size of the windows!
获得terminal窗口大小
"""
if 'TIOCGWINSZ' in dir(termios):
TIOCGWINSZ = termios.TIOCGWINSZ
else:
TIOCGWINSZ = 1074295912L
s = struct.pack('HHHH', 0, 0, 0, 0)
x = fcntl.ioctl(sys.stdout.fileno(), TIOCGWINSZ, s)
return struct.unpack('HHHH', x)[0:2]
def set_win_size(self, sig, data):
"""
This function use to set the window size of the terminal!
设置terminal窗口大小
"""
try:
win_size = self.get_win_size()
self.channel.resize_pty(height=win_size[0], width=win_size[1])
except Exception:
pass
def posix_shell(self):
2015-11-04 09:04:25 +00:00
"""
Use paramiko channel connect server interactive.
使用paramiko模块的channel连接后端进入交互式
"""
log_file_f, log_time_f, log = self.get_log()
2015-11-04 09:04:25 +00:00
old_tty = termios.tcgetattr(sys.stdin)
pre_timestamp = time.time()
data = ''
2015-11-04 09:04:25 +00:00
input_mode = False
try:
tty.setraw(sys.stdin.fileno())
tty.setcbreak(sys.stdin.fileno())
2015-11-07 05:38:50 +00:00
self.channel.settimeout(0.0)
2015-11-04 09:04:25 +00:00
while True:
try:
2015-11-07 05:38:50 +00:00
r, w, e = select.select([self.channel, sys.stdin], [], [])
2015-12-09 03:49:30 +00:00
flag = fcntl.fcntl(sys.stdin, fcntl.F_GETFL, 0)
fcntl.fcntl(sys.stdin.fileno(), fcntl.F_SETFL, flag|os.O_NONBLOCK)
2015-11-04 09:04:25 +00:00
except Exception:
pass
2015-11-07 05:38:50 +00:00
if self.channel in r:
2015-11-04 09:04:25 +00:00
try:
2015-12-09 03:49:30 +00:00
x = self.channel.recv(10240)
2015-11-04 09:04:25 +00:00
if len(x) == 0:
break
2015-11-22 12:45:48 +00:00
if self.vim_flag:
2015-11-22 13:59:07 +00:00
self.vim_data += x
2015-12-09 03:49:30 +00:00
index = 0
len_x = len(x)
while index < len_x:
try:
n = os.write(sys.stdout.fileno(), x[index:])
sys.stdout.flush()
index += n
except OSError as msg:
if msg.errno == errno.EAGAIN:
continue
#sys.stdout.write(x)
#sys.stdout.flush()
2015-11-04 09:04:25 +00:00
now_timestamp = time.time()
2015-11-28 13:13:44 +00:00
log_time_f.write('%s %s\n' % (round(now_timestamp-pre_timestamp, 4), len(x)))
log_time_f.flush()
2015-11-07 05:38:50 +00:00
log_file_f.write(x)
2015-11-28 13:13:44 +00:00
log_file_f.flush()
2015-11-04 09:04:25 +00:00
pre_timestamp = now_timestamp
log_file_f.flush()
2015-11-07 05:38:50 +00:00
if input_mode and not self.is_output(x):
data += x
2015-11-04 09:04:25 +00:00
except socket.timeout:
pass
if sys.stdin in r:
2015-12-09 03:49:30 +00:00
x = os.read(sys.stdin.fileno(), 4096)
input_mode = True
2015-11-04 09:04:25 +00:00
if str(x) in ['\r', '\n', '\r\n']:
2015-11-22 12:45:48 +00:00
if self.vim_flag:
2015-11-22 13:59:07 +00:00
match = self.ps1_pattern.search(self.vim_data)
2015-11-22 12:18:33 +00:00
if match:
2015-11-22 12:45:48 +00:00
self.vim_flag = False
2015-11-22 13:59:07 +00:00
data = self.deal_command(data)[0:200]
2015-11-22 12:18:33 +00:00
if len(data) > 0:
TtyLog(log=log, datetime=datetime.datetime.now(), cmd=data).save()
else:
2015-11-22 13:59:07 +00:00
data = self.deal_command(data)[0:200]
2015-11-22 12:18:33 +00:00
if len(data) > 0:
TtyLog(log=log, datetime=datetime.datetime.now(), cmd=data).save()
data = ''
2015-11-22 13:59:07 +00:00
self.vim_data = ''
2015-11-04 09:04:25 +00:00
input_mode = False
if len(x) == 0:
break
2015-11-07 05:38:50 +00:00
self.channel.send(x)
2015-11-04 09:04:25 +00:00
finally:
termios.tcsetattr(sys.stdin, termios.TCSADRAIN, old_tty)
log_file_f.write('End time is %s' % datetime.datetime.now())
log_file_f.close()
2015-11-25 10:59:12 +00:00
log_time_f.close()
2015-11-04 09:04:25 +00:00
log.is_finished = True
log.end_time = datetime.datetime.now()
log.save()
def connect(self):
"""
Connect server.
连接服务器
"""
# 发起ssh连接请求 Make a ssh connection
ssh = self.get_connection()
2015-12-08 03:44:42 +00:00
transport = ssh.get_transport()
transport.set_keepalive(30)
transport.use_compression(True)
2015-11-04 09:04:25 +00:00
# 获取连接的隧道并设置窗口大小 Make a channel and set windows size
global channel
win_size = self.get_win_size()
2015-12-08 03:44:42 +00:00
#self.channel = channel = ssh.invoke_shell(height=win_size[0], width=win_size[1], term='xterm')
self.channel = channel = transport.open_session()
2015-12-09 03:49:30 +00:00
channel.get_pty(term='xterm', height=win_size[0], width=win_size[1])
2015-12-08 03:44:42 +00:00
channel.invoke_shell()
2015-11-04 09:04:25 +00:00
try:
signal.signal(signal.SIGWINCH, self.set_win_size)
except:
pass
2015-12-08 03:44:42 +00:00
2015-11-07 05:38:50 +00:00
self.posix_shell()
2015-11-04 09:04:25 +00:00
# Shutdown channel socket
channel.close()
ssh.close()
2015-11-18 07:15:08 +00:00
class Nav(object):
2015-12-08 15:19:39 +00:00
"""
导航提示类
"""
2015-11-18 07:15:08 +00:00
def __init__(self, user):
self.user = user
self.search_result = {}
2015-11-21 11:20:11 +00:00
self.user_perm = {}
2015-11-18 07:15:08 +00:00
@staticmethod
def print_nav():
"""
Print prompt
打印提示导航
"""
2015-12-08 15:19:39 +00:00
msg = """\n\033[1;32m### 欢迎使用Jumpserver开源跳板机系统 ### \033[0m
2015-11-18 07:15:08 +00:00
1) 输入 \033[32mID\033[0m 直接登录.
2015-12-08 15:19:39 +00:00
2) 输入 \033[32m/\033[0m + \033[32mIP, 主机名 or 备注 \033[0m搜索.
2015-11-18 07:15:08 +00:00
3) 输入 \033[32mP/p\033[0m 显示您有权限的主机.
4) 输入 \033[32mG/g\033[0m 显示您有权限的主机组.
5) 输入 \033[32mG/g\033[0m\033[0m + \033[32m组ID\033[0m 显示该组下主机.
6) 输入 \033[32mE/e\033[0m 批量执行命令.
2015-12-02 05:35:06 +00:00
7) 输入 \033[32mU/u\033[0m 批量上传文件.
2015-12-05 09:55:45 +00:00
8) 输入 \033[32mD/d\033[0m 批量下载文件.
9) 输入 \033[32mQ/q\033[0m 退出.
2015-11-18 07:15:08 +00:00
"""
print textwrap.dedent(msg)
def search(self, str_r=''):
gid_pattern = re.compile(r'^g\d+$')
2015-11-22 12:20:32 +00:00
# 获取用户授权的所有主机信息
2015-11-21 11:20:11 +00:00
if not self.user_perm:
self.user_perm = get_group_user_perm(self.user)
user_asset_all = self.user_perm.get('asset').keys()
2015-11-22 12:20:32 +00:00
# 搜索结果保存
2015-11-18 07:15:08 +00:00
user_asset_search = []
if str_r:
2015-11-22 12:20:32 +00:00
# 资产组组id匹配
2015-11-18 07:15:08 +00:00
if gid_pattern.match(str_r):
2015-11-22 12:20:32 +00:00
gid = int(str_r.lstrip('g'))
# 获取资产组包含的资产
user_asset_search = get_object(AssetGroup, id=gid).asset_set.all()
2015-11-18 07:15:08 +00:00
else:
2015-11-22 12:20:32 +00:00
# 匹配 ip, hostname, 备注
2015-11-18 07:15:08 +00:00
for asset in user_asset_all:
2015-11-22 12:20:32 +00:00
if str_r in asset.ip or str_r in str(asset.hostname) or str_r in str(asset.comment):
2015-11-18 07:15:08 +00:00
user_asset_search.append(asset)
else:
2015-11-22 12:20:32 +00:00
# 如果没有输入就展现所有
2015-11-18 07:15:08 +00:00
user_asset_search = user_asset_all
self.search_result = dict(zip(range(len(user_asset_search)), user_asset_search))
2015-12-09 03:49:30 +00:00
color_print('[%-3s] %-12s %-15s %-5s %-10s %s' % ('ID', u'主机名', 'IP', u'端口', u'角色', u'备注'), 'title')
2015-11-18 07:15:08 +00:00
for index, asset in self.search_result.items():
2015-11-22 12:20:32 +00:00
# 获取该资产信息
2015-11-21 11:20:11 +00:00
asset_info = get_asset_info(asset)
2015-11-22 12:20:32 +00:00
# 获取该资产包含的角色
2015-11-21 11:20:11 +00:00
role = [str(role.name) for role in self.user_perm.get('asset').get(asset).get('role')]
2015-12-09 03:49:30 +00:00
print '[%-3s] %-15s %-15s %-5s %-10s %s' % (index, asset.hostname, asset.ip, asset_info.get('port'),
2015-12-08 15:19:39 +00:00
role, asset.comment)
2015-11-18 07:15:08 +00:00
print
2015-11-22 12:20:32 +00:00
def print_asset_group(self):
"""
打印用户授权的资产组
"""
user_asset_group_all = get_group_user_perm(self.user).get('asset_group', [])
2015-12-09 03:49:30 +00:00
color_print('[%-3s] %-20s %s' % ('ID', '组名', '备注'), 'title')
2015-11-18 07:15:08 +00:00
for asset_group in user_asset_group_all:
2015-12-09 03:49:30 +00:00
print '[%-3s] %-15s %s' % (asset_group.id, asset_group.name, asset_group.comment)
2015-11-18 07:15:08 +00:00
print
2015-04-20 02:12:11 +00:00
2015-11-20 10:42:44 +00:00
def exec_cmd(self):
2015-11-22 12:20:32 +00:00
"""
批量执行命令
"""
2015-11-20 10:42:44 +00:00
while True:
2015-11-27 04:20:08 +00:00
if not self.user_perm:
self.user_perm = get_group_user_perm(self.user)
2015-12-03 08:53:39 +00:00
2015-11-27 04:20:08 +00:00
roles = self.user_perm.get('role').keys()
2015-12-03 08:53:39 +00:00
if len(roles) > 1: # 授权角色数大于1
2015-12-08 15:19:39 +00:00
color_print('[%-2s] %-15s' % ('ID', '角色'), 'info')
2015-12-03 08:53:39 +00:00
role_check = dict(zip(range(len(roles)), roles))
2015-11-27 04:20:08 +00:00
2015-12-03 08:53:39 +00:00
for i, r in role_check.items():
print '[%-2s] %-15s' % (i, r.name)
print
print "请输入运行命令角色的ID, q退出"
2015-11-27 04:20:08 +00:00
2015-12-03 08:53:39 +00:00
try:
role_id = raw_input("\033[1;32mRole>:\033[0m ").strip()
if role_id == 'q':
break
except (IndexError, ValueError):
color_print('错误输入')
2015-11-20 10:42:44 +00:00
else:
2015-11-27 04:20:08 +00:00
role = role_check[int(role_id)]
2015-12-03 10:49:04 +00:00
elif len(roles) == 1: # 授权角色数为1
2015-12-03 08:53:39 +00:00
role = roles[0]
assets = list(self.user_perm.get('role', {}).get(role).get('asset')) # 获取该用户,角色授权主机
print "该角色有权限的所有主机"
for asset in assets:
print ' %s' % asset.hostname
print
2015-12-08 11:25:11 +00:00
print "请输入主机名、IP或ansile支持的pattern, 多个主机:分隔, q退出"
2015-12-03 08:53:39 +00:00
pattern = raw_input("\033[1;32mPattern>:\033[0m ").strip()
if pattern == 'q':
break
else:
res = gen_resource({'user': self.user, 'asset': assets, 'role': role}, perm=self.user_perm)
runner = MyRunner(res)
asset_name_str = ''
print "匹配主机:"
for inv in runner.inventory.get_hosts(pattern=pattern):
print ' %s' % inv.name
asset_name_str += '%s ' % inv.name
print
2015-11-27 08:16:38 +00:00
2015-12-03 08:53:39 +00:00
while True:
print "请输入执行的命令, 按q退出"
command = raw_input("\033[1;32mCmds>:\033[0m ").strip()
if command == 'q':
break
runner.run('shell', command, pattern=pattern)
2015-12-04 05:42:05 +00:00
ExecLog(host=asset_name_str, user=self.user.username, cmd=command, remote_ip=remote_ip,
result=runner.results).save()
2015-12-03 08:53:39 +00:00
for k, v in runner.results.items():
if k == 'ok':
for host, output in v.items():
color_print("%s => %s" % (host, 'Ok'), 'green')
print output
2015-11-20 10:42:44 +00:00
print
2015-12-03 08:53:39 +00:00
else:
for host, output in v.items():
color_print("%s => %s" % (host, k), 'red')
color_print(output, 'red')
print
print "~o~ Task finished ~o~"
print
2015-11-20 10:42:44 +00:00
2015-12-02 05:35:06 +00:00
def upload(self):
while True:
if not self.user_perm:
self.user_perm = get_group_user_perm(self.user)
try:
2015-12-03 08:53:39 +00:00
print "进入批量上传模式"
2015-12-08 11:25:11 +00:00
print "请输入主机名、IP或ansile支持的pattern, 多个主机:分隔 q退出"
2015-12-02 05:35:06 +00:00
pattern = raw_input("\033[1;32mPattern>:\033[0m ").strip()
if pattern == 'q':
break
else:
assets = self.user_perm.get('asset').keys()
res = gen_resource({'user': self.user, 'asset': assets}, perm=self.user_perm)
runner = MyRunner(res)
asset_name_str = ''
2015-12-08 15:19:39 +00:00
print "匹配主机:"
2015-12-02 05:35:06 +00:00
for inv in runner.inventory.get_hosts(pattern=pattern):
print inv.name
2015-12-03 15:24:34 +00:00
asset_name_str += '%s ' % inv.name
if not asset_name_str:
color_print('没有匹配主机')
continue
2015-12-02 05:35:06 +00:00
tmp_dir = get_tmp_dir()
logger.debug('Upload tmp dir: %s' % tmp_dir)
os.chdir(tmp_dir)
bash('rz')
2015-12-03 15:24:34 +00:00
filename_str = ' '.join(os.listdir(tmp_dir))
if not filename_str:
2015-12-04 05:42:05 +00:00
color_print("上传文件为空")
2015-12-02 07:41:39 +00:00
continue
2015-12-03 15:24:34 +00:00
logger.debug('上传文件: %s' % filename_str)
2015-12-04 05:42:05 +00:00
2015-12-02 05:35:06 +00:00
runner = MyRunner(res)
runner.run('copy', module_args='src=%s dest=%s directory_mode'
% (tmp_dir, tmp_dir), pattern=pattern)
2015-12-03 08:53:39 +00:00
ret = runner.results
2015-12-04 05:42:05 +00:00
FileLog(user=self.user.name, host=asset_name_str, filename=filename_str,
remote_ip=remote_ip, type='upload', result=ret).save()
2015-12-03 08:53:39 +00:00
logger.debug('Upload file: %s' % ret)
2015-12-02 05:35:06 +00:00
if ret.get('failed'):
error = '上传目录: %s \n上传失败: [ %s ] \n上传成功 [ %s ]' % (tmp_dir,
', '.join(ret.get('failed').keys()),
2015-12-03 08:53:39 +00:00
', '.join(ret.get('ok').keys()))
2015-12-02 05:35:06 +00:00
color_print(error)
else:
2015-12-03 08:53:39 +00:00
msg = '上传目录: %s \n传送成功 [ %s ]' % (tmp_dir, ', '.join(ret.get('ok').keys()))
2015-12-02 05:35:06 +00:00
color_print(msg, 'green')
print
except IndexError:
pass
def download(self):
while True:
if not self.user_perm:
self.user_perm = get_group_user_perm(self.user)
try:
print "进入批量下载模式"
2015-12-08 11:25:11 +00:00
print "请输入主机名、IP或ansile支持的pattern, 多个主机:分隔,q退出"
2015-12-02 05:35:06 +00:00
pattern = raw_input("\033[1;32mPattern>:\033[0m ").strip()
if pattern == 'q':
break
else:
assets = self.user_perm.get('asset').keys()
res = gen_resource({'user': self.user, 'asset': assets}, perm=self.user_perm)
runner = MyRunner(res)
2015-12-03 15:24:34 +00:00
asset_name_str = ''
2015-12-03 08:53:39 +00:00
print "匹配用户:\n"
2015-12-02 05:35:06 +00:00
for inv in runner.inventory.get_hosts(pattern=pattern):
2015-12-03 15:24:34 +00:00
asset_name_str += '%s ' % inv.name
print ' %s' % inv.name
if not asset_name_str:
color_print('没有匹配主机')
continue
2015-12-02 05:35:06 +00:00
print
while True:
2015-12-03 08:53:39 +00:00
tmp_dir = get_tmp_dir()
logger.debug('Download tmp dir: %s' % tmp_dir)
2015-12-02 05:35:06 +00:00
print "请输入文件路径(不支持目录)"
file_path = raw_input("\033[1;32mPath>:\033[0m ").strip()
if file_path == 'q':
break
runner.run('fetch', module_args='src=%s dest=%s' % (file_path, tmp_dir), pattern=pattern)
2015-12-03 08:53:39 +00:00
ret = runner.results
2015-12-04 05:42:05 +00:00
FileLog(user=self.user.name, host=asset_name_str, filename=file_path, type='download',
remote_ip=remote_ip, result=ret).save()
2015-12-03 08:53:39 +00:00
logger.debug('Download file result: %s' % ret)
2015-12-02 05:35:06 +00:00
os.chdir('/tmp')
tmp_dir_name = os.path.basename(tmp_dir)
2015-12-03 15:24:34 +00:00
if not os.listdir(tmp_dir):
color_print('下载全部失败')
continue
2015-12-03 08:53:39 +00:00
bash('tar czf %s.tar.gz %s && sz %s.tar.gz' % (tmp_dir, tmp_dir_name, tmp_dir))
2015-12-02 05:35:06 +00:00
if ret.get('failed'):
2015-12-03 15:24:34 +00:00
error = '文件名称: %s \n下载失败: [ %s ] \n下载成功 [ %s ]' % \
2015-12-03 08:53:39 +00:00
('%s.tar.gz' % tmp_dir_name, ', '.join(ret.get('failed').keys()), ', '.join(ret.get('ok').keys()))
2015-12-02 05:35:06 +00:00
color_print(error)
else:
2015-12-03 15:24:34 +00:00
msg = '文件名称: %s \n下载成功 [ %s ]' % ('%s.tar.gz' % tmp_dir_name, ', '.join(ret.get('ok').keys()))
2015-12-02 05:35:06 +00:00
color_print(msg, 'green')
print
except IndexError:
pass
2015-04-20 02:12:11 +00:00
2015-08-21 15:45:41 +00:00
def main():
2015-08-26 15:31:32 +00:00
"""
he he
主程序
"""
2015-08-21 15:45:41 +00:00
if not login_user: # 判断用户是否存在
color_print(u'没有该用户或许你是以root运行的 No that user.', exits=True)
2015-06-09 15:06:32 +00:00
gid_pattern = re.compile(r'^g\d+$')
2015-11-18 07:15:08 +00:00
nav = Nav(login_user)
nav.print_nav()
2015-08-21 15:45:41 +00:00
2015-04-20 02:12:11 +00:00
try:
while True:
try:
2015-11-18 07:15:08 +00:00
option = raw_input("\033[1;32mOpt or ID>:\033[0m ").strip()
2015-04-20 02:12:11 +00:00
except EOFError:
2015-11-18 07:15:08 +00:00
nav.print_nav()
2015-04-20 02:12:11 +00:00
continue
except KeyboardInterrupt:
sys.exit(0)
2015-11-18 07:15:08 +00:00
if option in ['P', 'p', '\n', '']:
nav.search()
2015-04-20 02:12:11 +00:00
continue
2015-11-18 07:15:08 +00:00
if option.startswith('/') or gid_pattern.match(option):
nav.search(option.lstrip('/'))
2015-04-20 02:12:11 +00:00
elif option in ['G', 'g']:
2015-11-18 07:15:08 +00:00
nav.print_asset_group()
2015-04-20 02:12:11 +00:00
continue
elif option in ['E', 'e']:
2015-11-20 10:42:44 +00:00
nav.exec_cmd()
continue
2015-12-02 05:35:06 +00:00
elif option in ['U', 'u']:
nav.upload()
elif option in ['D', 'd']:
nav.download()
2015-04-20 02:12:11 +00:00
elif option in ['Q', 'q', 'exit']:
sys.exit()
else:
try:
2015-11-18 07:15:08 +00:00
asset = nav.search_result[int(option)]
2015-12-07 15:21:10 +00:00
roles = nav.user_perm.get('asset').get(asset).get('role')
2015-11-21 11:20:11 +00:00
if len(roles) > 1:
role_check = dict(zip(range(len(roles)), roles))
2015-11-27 04:20:08 +00:00
print "\033[32m[ID] 角色\033[0m"
2015-11-21 11:20:11 +00:00
for index, role in role_check.items():
2015-11-27 04:20:08 +00:00
print "[%-2s] %s" % (index, role.name)
print
print "授权角色超过1个请输入角色ID, q退出"
2015-11-21 11:20:11 +00:00
try:
role_index = raw_input("\033[1;32mID>:\033[0m ").strip()
if role_index == 'q':
continue
else:
role = role_check[int(role_index)]
except IndexError:
color_print('请输入正确ID', 'red')
continue
elif len(roles) == 1:
2015-12-07 15:21:10 +00:00
role = list(roles)[0]
2015-11-21 11:20:11 +00:00
else:
color_print('没有映射用户', 'red')
continue
ssh_tty = SshTty(login_user, asset, role)
2015-11-18 07:15:08 +00:00
ssh_tty.connect()
except (KeyError, ValueError):
color_print('请输入正确ID', 'red')
2015-04-20 02:12:11 +00:00
except ServerError, e:
color_print(e, 'red')
except IndexError:
pass
2015-08-21 15:45:41 +00:00
if __name__ == '__main__':
main()