2015-04-20 02:12:11 +00:00
|
|
|
|
# coding: utf-8
|
|
|
|
|
|
|
|
|
|
import sys
|
|
|
|
|
|
|
|
|
|
reload(sys)
|
|
|
|
|
sys.setdefaultencoding('utf8')
|
|
|
|
|
|
|
|
|
|
import os
|
|
|
|
|
import re
|
|
|
|
|
import time
|
2015-11-04 09:04:25 +00:00
|
|
|
|
import datetime
|
2015-04-20 02:12:11 +00:00
|
|
|
|
import textwrap
|
|
|
|
|
import getpass
|
|
|
|
|
import readline
|
2015-06-08 15:46:40 +00:00
|
|
|
|
import django
|
2015-11-04 09:04:25 +00:00
|
|
|
|
import paramiko
|
2015-11-13 13:15:41 +00:00
|
|
|
|
import struct, fcntl, signal, socket, select
|
2015-04-20 02:12:11 +00:00
|
|
|
|
|
|
|
|
|
os.environ['DJANGO_SETTINGS_MODULE'] = 'jumpserver.settings'
|
2015-06-08 15:46:40 +00:00
|
|
|
|
if django.get_version() != '1.6':
|
|
|
|
|
django.setup()
|
2015-11-23 07:34:28 +00:00
|
|
|
|
from django.contrib.sessions.models import Session
|
2015-11-22 13:59:07 +00:00
|
|
|
|
from jumpserver.api import ServerError, User, Asset, PermRole, AssetGroup, get_object, mkdir, get_asset_info, get_role
|
2015-11-24 05:31:48 +00:00
|
|
|
|
from jumpserver.api import logger, Log, TtyLog, get_role_key, CRYPTOR
|
2015-11-23 07:34:28 +00:00
|
|
|
|
from jperm.perm_api import gen_resource, get_group_asset_perm, get_group_user_perm, user_have_perm
|
2015-11-13 13:15:41 +00:00
|
|
|
|
from jumpserver.settings import LOG_DIR
|
2015-11-20 10:42:44 +00:00
|
|
|
|
from jperm.ansible_api import Command
|
2015-11-13 13:15:41 +00:00
|
|
|
|
|
|
|
|
|
login_user = get_object(User, username=getpass.getuser())
|
2015-04-24 10:19:43 +00:00
|
|
|
|
|
2015-11-04 09:04:25 +00:00
|
|
|
|
try:
|
|
|
|
|
import termios
|
|
|
|
|
import tty
|
|
|
|
|
except ImportError:
|
|
|
|
|
print '\033[1;31m仅支持类Unix系统 Only unix like supported.\033[0m'
|
|
|
|
|
time.sleep(3)
|
|
|
|
|
sys.exit()
|
|
|
|
|
|
2015-04-20 02:12:11 +00:00
|
|
|
|
|
2015-06-15 11:20:05 +00:00
|
|
|
|
def color_print(msg, color='red', exits=False):
|
2015-06-08 15:46:40 +00:00
|
|
|
|
"""
|
|
|
|
|
Print colorful string.
|
2015-08-26 15:31:32 +00:00
|
|
|
|
颜色打印字符或者退出
|
2015-06-08 15:46:40 +00:00
|
|
|
|
"""
|
2015-04-20 02:12:11 +00:00
|
|
|
|
color_msg = {'blue': '\033[1;36m%s\033[0m',
|
|
|
|
|
'green': '\033[1;32m%s\033[0m',
|
|
|
|
|
'red': '\033[1;31m%s\033[0m'}
|
2015-11-27 08:16:38 +00:00
|
|
|
|
msg = color_msg.get(color, 'blue') % msg
|
|
|
|
|
print msg
|
2015-06-15 11:20:05 +00:00
|
|
|
|
if exits:
|
|
|
|
|
time.sleep(2)
|
|
|
|
|
sys.exit()
|
2015-11-27 08:16:38 +00:00
|
|
|
|
return msg
|
2015-06-15 11:20:05 +00:00
|
|
|
|
|
|
|
|
|
|
2015-11-27 09:53:11 +00:00
|
|
|
|
def write_log(f, msg):
|
|
|
|
|
msg = re.sub(r'[\r\n]', '\r\n', msg)
|
|
|
|
|
f.write(msg)
|
|
|
|
|
f.flush()
|
|
|
|
|
|
|
|
|
|
|
2015-11-07 05:38:50 +00:00
|
|
|
|
class Tty(object):
|
2015-11-04 09:04:25 +00:00
|
|
|
|
"""
|
|
|
|
|
A virtual tty class
|
2015-11-07 05:38:50 +00:00
|
|
|
|
一个虚拟终端类,实现连接ssh和记录日志,基类
|
2015-11-04 09:04:25 +00:00
|
|
|
|
"""
|
2015-11-21 11:20:11 +00:00
|
|
|
|
def __init__(self, user, asset, role):
|
|
|
|
|
self.username = user.username
|
|
|
|
|
self.asset_name = asset.hostname
|
2015-11-07 05:38:50 +00:00
|
|
|
|
self.ip = None
|
|
|
|
|
self.port = 22
|
|
|
|
|
self.channel = None
|
2015-11-21 11:20:11 +00:00
|
|
|
|
self.asset = asset
|
|
|
|
|
self.user = user
|
|
|
|
|
self.role = role
|
2015-11-07 05:38:50 +00:00
|
|
|
|
self.ssh = None
|
2015-11-26 11:49:23 +00:00
|
|
|
|
self.remote_ip = ''
|
2015-11-07 05:38:50 +00:00
|
|
|
|
self.connect_info = None
|
|
|
|
|
self.login_type = 'ssh'
|
2015-11-22 12:45:48 +00:00
|
|
|
|
self.vim_flag = False
|
2015-11-22 13:59:07 +00:00
|
|
|
|
self.ps1_pattern = re.compile('\[.*@.*\][\$#]')
|
|
|
|
|
self.vim_data = ''
|
2015-11-26 09:42:03 +00:00
|
|
|
|
|
2015-11-04 09:04:25 +00:00
|
|
|
|
@staticmethod
|
2015-11-07 05:38:50 +00:00
|
|
|
|
def is_output(strings):
|
|
|
|
|
newline_char = ['\n', '\r', '\r\n']
|
|
|
|
|
for char in newline_char:
|
|
|
|
|
if char in strings:
|
|
|
|
|
return True
|
|
|
|
|
return False
|
2015-11-04 09:04:25 +00:00
|
|
|
|
|
2015-11-26 13:47:37 +00:00
|
|
|
|
@staticmethod
|
|
|
|
|
def remove_obstruct_char(cmd_str):
|
2015-11-25 11:02:51 +00:00
|
|
|
|
'''删除一些干扰的特殊符号'''
|
|
|
|
|
control_char = re.compile(r'\x07 | \x1b\[1P | \r ', re.X)
|
|
|
|
|
cmd_str = control_char.sub('',cmd_str.strip())
|
|
|
|
|
patch_char = re.compile('\x08\x1b\[C') #删除方向左右一起的按键
|
|
|
|
|
while patch_char.search(cmd_str):
|
|
|
|
|
cmd_str = patch_char.sub('', cmd_str.rstrip())
|
|
|
|
|
return cmd_str
|
2015-11-26 13:47:37 +00:00
|
|
|
|
|
2015-11-26 10:19:36 +00:00
|
|
|
|
def remove_control_char(self, result_command):
|
2015-11-25 11:02:51 +00:00
|
|
|
|
"""
|
|
|
|
|
处理日志特殊字符
|
|
|
|
|
"""
|
|
|
|
|
control_char = re.compile(r"""
|
|
|
|
|
\x1b[ #%()*+\-.\/]. |
|
|
|
|
|
\r | #匹配 回车符(CR)
|
|
|
|
|
(?:\x1b\[|\x9b) [ -?]* [@-~] | #匹配 控制顺序描述符(CSI)... Cmd
|
|
|
|
|
(?:\x1b\]|\x9d) .*? (?:\x1b\\|[\a\x9c]) | \x07 | #匹配 操作系统指令(OSC)...终止符或振铃符(ST|BEL)
|
|
|
|
|
(?:\x1b[P^_]|[\x90\x9e\x9f]) .*? (?:\x1b\\|\x9c) | #匹配 设备控制串或私讯或应用程序命令(DCS|PM|APC)...终止符(ST)
|
|
|
|
|
\x1b. #匹配 转义过后的字符
|
|
|
|
|
[\x80-\x9f] | (?:\x1b\]0.*) | \[.*@.*\][\$#] | (.*mysql>.*) #匹配 所有控制字符
|
|
|
|
|
""", re.X)
|
|
|
|
|
result_command = control_char.sub('', result_command.strip())
|
2015-11-26 10:19:36 +00:00
|
|
|
|
|
|
|
|
|
if not self.vim_flag:
|
2015-11-25 11:02:51 +00:00
|
|
|
|
if result_command.startswith('vi') or result_command.startswith('fg'):
|
2015-11-26 10:19:36 +00:00
|
|
|
|
self.vim_flag = True
|
2015-11-25 11:02:51 +00:00
|
|
|
|
return result_command.decode('utf8',"ignore")
|
|
|
|
|
else:
|
|
|
|
|
return ''
|
|
|
|
|
|
2015-11-22 12:45:48 +00:00
|
|
|
|
def deal_command(self, str_r):
|
2015-11-16 15:33:44 +00:00
|
|
|
|
"""
|
2015-11-22 12:45:48 +00:00
|
|
|
|
处理命令中特殊字符
|
2015-11-16 15:33:44 +00:00
|
|
|
|
"""
|
2015-11-26 09:42:03 +00:00
|
|
|
|
str_r = re.sub('\x07', '', str_r) # 删除响铃
|
|
|
|
|
patch_char = re.compile('\x08\x1b\[C') # 删除方向左右一起的按键
|
|
|
|
|
while patch_char.search(str_r):
|
|
|
|
|
str_r = patch_char.sub('', str_r.rstrip())
|
2015-11-16 15:33:44 +00:00
|
|
|
|
|
2015-11-22 12:45:48 +00:00
|
|
|
|
result_command = '' # 最后的结果
|
|
|
|
|
backspace_num = 0 # 光标移动的个数
|
|
|
|
|
reach_backspace_flag = False # 没有检测到光标键则为true
|
|
|
|
|
pattern_str = ''
|
2015-11-16 15:33:44 +00:00
|
|
|
|
while str_r:
|
2015-11-22 11:15:58 +00:00
|
|
|
|
tmp = re.match(r'\s*\w+\s*', str_r)
|
2015-11-16 15:33:44 +00:00
|
|
|
|
if tmp:
|
2015-11-22 12:45:48 +00:00
|
|
|
|
if reach_backspace_flag:
|
|
|
|
|
pattern_str += str(tmp.group(0))
|
2015-11-26 09:42:03 +00:00
|
|
|
|
str_r = str_r[len(str(tmp.group(0))):]
|
2015-11-16 15:33:44 +00:00
|
|
|
|
continue
|
|
|
|
|
else:
|
|
|
|
|
result_command += str(tmp.group(0))
|
2015-11-26 09:42:03 +00:00
|
|
|
|
str_r = str_r[len(str(tmp.group(0))):]
|
2015-11-16 15:33:44 +00:00
|
|
|
|
continue
|
2015-11-22 11:15:58 +00:00
|
|
|
|
|
2015-11-26 09:42:03 +00:00
|
|
|
|
tmp = re.match(r'\x1b\[K[\x08]*', str_r)
|
2015-11-16 15:33:44 +00:00
|
|
|
|
if tmp:
|
|
|
|
|
if backspace_num > 0:
|
2015-11-22 12:45:48 +00:00
|
|
|
|
if backspace_num > len(result_command):
|
2015-11-16 15:33:44 +00:00
|
|
|
|
result_command += pattern_str
|
|
|
|
|
result_command = result_command[0:-backspace_num]
|
|
|
|
|
else:
|
|
|
|
|
result_command = result_command[0:-backspace_num]
|
|
|
|
|
result_command += pattern_str
|
|
|
|
|
del_len = len(str(tmp.group(0)))-3
|
|
|
|
|
if del_len > 0:
|
|
|
|
|
result_command = result_command[0:-del_len]
|
|
|
|
|
reach_backspace_flag = False
|
2015-11-22 12:45:48 +00:00
|
|
|
|
backspace_num = 0
|
|
|
|
|
pattern_str = ''
|
2015-11-16 15:33:44 +00:00
|
|
|
|
str_r = str_r[len(str(tmp.group(0))):]
|
|
|
|
|
continue
|
2015-11-22 11:15:58 +00:00
|
|
|
|
|
2015-11-26 09:42:03 +00:00
|
|
|
|
tmp = re.match(r'\x08+', str_r)
|
2015-11-16 15:33:44 +00:00
|
|
|
|
if tmp:
|
|
|
|
|
str_r = str_r[len(str(tmp.group(0))):]
|
2015-11-22 11:15:58 +00:00
|
|
|
|
if len(str_r) != 0:
|
|
|
|
|
if reach_backspace_flag:
|
2015-11-26 09:42:03 +00:00
|
|
|
|
result_command = result_command[0:-backspace_num] + pattern_str
|
2015-11-22 11:15:58 +00:00
|
|
|
|
pattern_str = ''
|
|
|
|
|
else:
|
|
|
|
|
reach_backspace_flag = True
|
|
|
|
|
backspace_num = len(str(tmp.group(0)))
|
|
|
|
|
continue
|
2015-11-16 15:33:44 +00:00
|
|
|
|
else:
|
2015-11-22 11:15:58 +00:00
|
|
|
|
break
|
|
|
|
|
|
2015-11-26 09:42:03 +00:00
|
|
|
|
if reach_backspace_flag:
|
2015-11-22 12:45:48 +00:00
|
|
|
|
pattern_str += str_r[0]
|
|
|
|
|
else:
|
2015-11-16 15:33:44 +00:00
|
|
|
|
result_command += str_r[0]
|
|
|
|
|
str_r = str_r[1:]
|
2015-11-22 11:15:58 +00:00
|
|
|
|
|
2015-11-26 09:42:03 +00:00
|
|
|
|
if backspace_num > 0:
|
2015-11-22 11:15:58 +00:00
|
|
|
|
result_command = result_command[0:-backspace_num] + pattern_str
|
2015-11-16 15:33:44 +00:00
|
|
|
|
|
2015-11-26 09:42:03 +00:00
|
|
|
|
control_char = re.compile(r"""
|
|
|
|
|
\x1b[ #%()*+\-.\/]. |
|
|
|
|
|
\r | #匹配 回车符(CR)
|
|
|
|
|
(?:\x1b\[|\x9b) [ -?]* [@-~] | #匹配 控制顺序描述符(CSI)... Cmd
|
|
|
|
|
(?:\x1b\]|\x9d) .*? (?:\x1b\\|[\a\x9c]) | \x07 | #匹配 操作系统指令(OSC)...终止符或振铃符(ST|BEL)
|
|
|
|
|
(?:\x1b[P^_]|[\x90\x9e\x9f]) .*? (?:\x1b\\|\x9c) | #匹配 设备控制串或私讯或应用程序命令(DCS|PM|APC)...终止符(ST)
|
|
|
|
|
\x1b. #匹配 转义过后的字符
|
|
|
|
|
[\x80-\x9f] | (?:\x1b\]0.*) | \[.*@.*\][\$#] | (.*mysql>.*) #匹配 所有控制字符
|
|
|
|
|
""", re.X)
|
|
|
|
|
result_command = control_char.sub('', result_command.strip())
|
|
|
|
|
if not self.vim_flag:
|
|
|
|
|
if result_command.startswith('vi') or result_command.startswith('fg'):
|
|
|
|
|
self.vim_flag = True
|
|
|
|
|
return result_command.decode('utf8', "ignore")
|
|
|
|
|
else:
|
|
|
|
|
return ''
|
2015-11-07 05:38:50 +00:00
|
|
|
|
|
2015-11-13 13:15:41 +00:00
|
|
|
|
def get_log(self):
|
2015-11-04 09:04:25 +00:00
|
|
|
|
"""
|
|
|
|
|
Logging user command and output.
|
|
|
|
|
记录用户的日志
|
|
|
|
|
"""
|
2015-11-13 13:15:41 +00:00
|
|
|
|
tty_log_dir = os.path.join(LOG_DIR, 'tty')
|
|
|
|
|
date_today = datetime.datetime.now()
|
|
|
|
|
date_start = date_today.strftime('%Y%m%d')
|
|
|
|
|
time_start = date_today.strftime('%H%M%S')
|
2015-11-04 09:04:25 +00:00
|
|
|
|
today_connect_log_dir = os.path.join(tty_log_dir, date_start)
|
2015-11-07 05:38:50 +00:00
|
|
|
|
log_file_path = os.path.join(today_connect_log_dir, '%s_%s_%s' % (self.username, self.asset_name, time_start))
|
|
|
|
|
|
2015-11-04 09:04:25 +00:00
|
|
|
|
try:
|
2015-11-18 07:15:08 +00:00
|
|
|
|
mkdir(os.path.dirname(today_connect_log_dir), mode=0777)
|
2015-11-13 13:15:41 +00:00
|
|
|
|
mkdir(today_connect_log_dir, mode=0777)
|
2015-11-04 09:04:25 +00:00
|
|
|
|
except OSError:
|
2015-11-13 13:15:41 +00:00
|
|
|
|
logger.debug('创建目录 %s 失败,请修改%s目录权限' % (today_connect_log_dir, tty_log_dir))
|
2015-11-04 09:04:25 +00:00
|
|
|
|
raise ServerError('Create %s failed, Please modify %s permission.' % (today_connect_log_dir, tty_log_dir))
|
|
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
log_file_f = open(log_file_path + '.log', 'a')
|
|
|
|
|
log_time_f = open(log_file_path + '.time', 'a')
|
|
|
|
|
except IOError:
|
2015-11-13 13:15:41 +00:00
|
|
|
|
logger.debug('创建tty日志文件失败, 请修改目录%s权限' % today_connect_log_dir)
|
2015-11-04 09:04:25 +00:00
|
|
|
|
raise ServerError('Create logfile failed, Please modify %s permission.' % today_connect_log_dir)
|
|
|
|
|
|
2015-11-13 13:15:41 +00:00
|
|
|
|
if self.login_type == 'ssh': # 如果是ssh连接过来,记录connect.py的pid,web terminal记录为日志的id
|
2015-11-07 07:27:49 +00:00
|
|
|
|
pid = os.getpid()
|
2015-11-26 11:49:23 +00:00
|
|
|
|
self.remote_ip = os.popen("who -m | awk '{ print $5 }'").read().strip('()\n') # 获取远端IP
|
2015-11-07 07:27:49 +00:00
|
|
|
|
else:
|
2015-11-26 11:49:23 +00:00
|
|
|
|
pid = 0
|
|
|
|
|
|
|
|
|
|
log = Log(user=self.username, host=self.asset_name, remote_ip=self.remote_ip, login_type=self.login_type,
|
|
|
|
|
log_path=log_file_path, start_time=date_today, pid=pid)
|
2015-11-07 07:27:49 +00:00
|
|
|
|
|
2015-11-04 09:04:25 +00:00
|
|
|
|
log.save()
|
2015-11-26 11:49:23 +00:00
|
|
|
|
if self.login_type == 'web':
|
|
|
|
|
log.pid = log.id
|
|
|
|
|
log.save()
|
|
|
|
|
|
2015-11-13 13:15:41 +00:00
|
|
|
|
log_file_f.write('Start at %s\n' % datetime.datetime.now())
|
2015-11-07 05:38:50 +00:00
|
|
|
|
return log_file_f, log_time_f, log
|
|
|
|
|
|
|
|
|
|
def get_connect_info(self):
|
|
|
|
|
"""
|
|
|
|
|
获取需要登陆的主机的信息和映射用户的账号密码
|
|
|
|
|
"""
|
2015-11-21 11:20:11 +00:00
|
|
|
|
asset_info = get_asset_info(self.asset)
|
2015-11-24 05:37:36 +00:00
|
|
|
|
role_key = get_role_key(self.user, self.role)
|
2015-11-24 05:31:48 +00:00
|
|
|
|
role_pass = CRYPTOR.decrypt(self.role.password)
|
2015-11-21 11:20:11 +00:00
|
|
|
|
self.connect_info = {'user': self.user, 'asset': self.asset, 'ip': asset_info.get('ip'),
|
|
|
|
|
'port': int(asset_info.get('port')), 'role_name': self.role.name,
|
2015-11-24 05:31:48 +00:00
|
|
|
|
'role_pass': role_pass, 'role_key': role_key}
|
|
|
|
|
logger.debug("Connect: Host: %s Port: %s User: %s Pass: %s Key: %s" % (asset_info.get('ip'),
|
|
|
|
|
asset_info.get('port'),
|
|
|
|
|
self.role.name,
|
|
|
|
|
role_pass,
|
|
|
|
|
role_key))
|
2015-11-07 05:38:50 +00:00
|
|
|
|
return self.connect_info
|
2015-11-04 09:04:25 +00:00
|
|
|
|
|
2015-11-07 05:38:50 +00:00
|
|
|
|
def get_connection(self):
|
|
|
|
|
"""
|
|
|
|
|
获取连接成功后的ssh
|
|
|
|
|
"""
|
|
|
|
|
connect_info = self.get_connect_info()
|
|
|
|
|
|
|
|
|
|
# 发起ssh连接请求 Make a ssh connection
|
|
|
|
|
ssh = paramiko.SSHClient()
|
|
|
|
|
ssh.load_system_host_keys()
|
|
|
|
|
ssh.set_missing_host_key_policy(paramiko.AutoAddPolicy())
|
|
|
|
|
try:
|
2015-11-24 05:37:36 +00:00
|
|
|
|
role_key = connect_info.get('role_key')
|
2015-11-20 10:42:44 +00:00
|
|
|
|
if role_key and os.path.isfile(role_key):
|
|
|
|
|
try:
|
|
|
|
|
ssh.connect(connect_info.get('ip'),
|
|
|
|
|
port=connect_info.get('port'),
|
|
|
|
|
username=connect_info.get('role_name'),
|
|
|
|
|
key_filename=role_key,
|
|
|
|
|
look_for_keys=False)
|
|
|
|
|
self.ssh = ssh
|
|
|
|
|
return ssh
|
2015-11-24 05:31:48 +00:00
|
|
|
|
except (paramiko.ssh_exception.AuthenticationException, paramiko.ssh_exception.SSHException):
|
2015-11-24 05:37:36 +00:00
|
|
|
|
logger.warning('Use ssh key %s Failed.' % role_key)
|
2015-11-20 10:42:44 +00:00
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
ssh.connect(connect_info.get('ip'),
|
|
|
|
|
port=connect_info.get('port'),
|
|
|
|
|
username=connect_info.get('role_name'),
|
|
|
|
|
password=connect_info.get('role_pass'),
|
|
|
|
|
look_for_keys=False)
|
2015-11-07 05:38:50 +00:00
|
|
|
|
|
|
|
|
|
except paramiko.ssh_exception.AuthenticationException, paramiko.ssh_exception.SSHException:
|
|
|
|
|
raise ServerError('认证失败 Authentication Error.')
|
|
|
|
|
except socket.error:
|
|
|
|
|
raise ServerError('端口可能不对 Connect SSH Socket Port Error, Please Correct it.')
|
|
|
|
|
else:
|
|
|
|
|
self.ssh = ssh
|
|
|
|
|
return ssh
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
class SshTty(Tty):
|
|
|
|
|
"""
|
|
|
|
|
A virtual tty class
|
|
|
|
|
一个虚拟终端类,实现连接ssh和记录日志
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def get_win_size():
|
|
|
|
|
"""
|
|
|
|
|
This function use to get the size of the windows!
|
|
|
|
|
获得terminal窗口大小
|
|
|
|
|
"""
|
|
|
|
|
if 'TIOCGWINSZ' in dir(termios):
|
|
|
|
|
TIOCGWINSZ = termios.TIOCGWINSZ
|
|
|
|
|
else:
|
|
|
|
|
TIOCGWINSZ = 1074295912L
|
|
|
|
|
s = struct.pack('HHHH', 0, 0, 0, 0)
|
|
|
|
|
x = fcntl.ioctl(sys.stdout.fileno(), TIOCGWINSZ, s)
|
|
|
|
|
return struct.unpack('HHHH', x)[0:2]
|
|
|
|
|
|
|
|
|
|
def set_win_size(self, sig, data):
|
|
|
|
|
"""
|
|
|
|
|
This function use to set the window size of the terminal!
|
|
|
|
|
设置terminal窗口大小
|
|
|
|
|
"""
|
|
|
|
|
try:
|
|
|
|
|
win_size = self.get_win_size()
|
|
|
|
|
self.channel.resize_pty(height=win_size[0], width=win_size[1])
|
|
|
|
|
except Exception:
|
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
def posix_shell(self):
|
2015-11-04 09:04:25 +00:00
|
|
|
|
"""
|
|
|
|
|
Use paramiko channel connect server interactive.
|
|
|
|
|
使用paramiko模块的channel,连接后端,进入交互式
|
|
|
|
|
"""
|
2015-11-13 13:15:41 +00:00
|
|
|
|
log_file_f, log_time_f, log = self.get_log()
|
2015-11-04 09:04:25 +00:00
|
|
|
|
old_tty = termios.tcgetattr(sys.stdin)
|
|
|
|
|
pre_timestamp = time.time()
|
2015-11-13 13:15:41 +00:00
|
|
|
|
data = ''
|
2015-11-04 09:04:25 +00:00
|
|
|
|
input_mode = False
|
|
|
|
|
try:
|
|
|
|
|
tty.setraw(sys.stdin.fileno())
|
|
|
|
|
tty.setcbreak(sys.stdin.fileno())
|
2015-11-07 05:38:50 +00:00
|
|
|
|
self.channel.settimeout(0.0)
|
2015-11-04 09:04:25 +00:00
|
|
|
|
|
|
|
|
|
while True:
|
|
|
|
|
try:
|
2015-11-07 05:38:50 +00:00
|
|
|
|
r, w, e = select.select([self.channel, sys.stdin], [], [])
|
2015-11-04 09:04:25 +00:00
|
|
|
|
except Exception:
|
|
|
|
|
pass
|
|
|
|
|
|
2015-11-07 05:38:50 +00:00
|
|
|
|
if self.channel in r:
|
2015-11-04 09:04:25 +00:00
|
|
|
|
try:
|
2015-11-07 05:38:50 +00:00
|
|
|
|
x = self.channel.recv(1024)
|
2015-11-04 09:04:25 +00:00
|
|
|
|
if len(x) == 0:
|
|
|
|
|
break
|
2015-11-22 12:45:48 +00:00
|
|
|
|
if self.vim_flag:
|
2015-11-22 13:59:07 +00:00
|
|
|
|
self.vim_data += x
|
2015-11-04 09:04:25 +00:00
|
|
|
|
sys.stdout.write(x)
|
|
|
|
|
sys.stdout.flush()
|
|
|
|
|
now_timestamp = time.time()
|
|
|
|
|
log_time_f.write('%s %s\n' % (round(now_timestamp-pre_timestamp, 4), len(x)))
|
2015-11-07 05:38:50 +00:00
|
|
|
|
log_file_f.write(x)
|
2015-11-04 09:04:25 +00:00
|
|
|
|
pre_timestamp = now_timestamp
|
|
|
|
|
log_file_f.flush()
|
|
|
|
|
log_time_f.flush()
|
|
|
|
|
|
2015-11-07 05:38:50 +00:00
|
|
|
|
if input_mode and not self.is_output(x):
|
2015-11-13 13:15:41 +00:00
|
|
|
|
data += x
|
2015-11-04 09:04:25 +00:00
|
|
|
|
|
|
|
|
|
except socket.timeout:
|
|
|
|
|
pass
|
|
|
|
|
|
|
|
|
|
if sys.stdin in r:
|
|
|
|
|
x = os.read(sys.stdin.fileno(), 1)
|
2015-11-13 13:15:41 +00:00
|
|
|
|
input_mode = True
|
2015-11-04 09:04:25 +00:00
|
|
|
|
if str(x) in ['\r', '\n', '\r\n']:
|
2015-11-22 12:45:48 +00:00
|
|
|
|
if self.vim_flag:
|
2015-11-22 13:59:07 +00:00
|
|
|
|
match = self.ps1_pattern.search(self.vim_data)
|
2015-11-22 12:18:33 +00:00
|
|
|
|
if match:
|
2015-11-22 12:45:48 +00:00
|
|
|
|
self.vim_flag = False
|
2015-11-22 13:59:07 +00:00
|
|
|
|
data = self.deal_command(data)[0:200]
|
2015-11-22 12:18:33 +00:00
|
|
|
|
if len(data) > 0:
|
|
|
|
|
TtyLog(log=log, datetime=datetime.datetime.now(), cmd=data).save()
|
|
|
|
|
else:
|
2015-11-22 13:59:07 +00:00
|
|
|
|
data = self.deal_command(data)[0:200]
|
2015-11-22 12:18:33 +00:00
|
|
|
|
if len(data) > 0:
|
|
|
|
|
TtyLog(log=log, datetime=datetime.datetime.now(), cmd=data).save()
|
2015-11-13 13:15:41 +00:00
|
|
|
|
data = ''
|
2015-11-22 13:59:07 +00:00
|
|
|
|
self.vim_data = ''
|
2015-11-04 09:04:25 +00:00
|
|
|
|
input_mode = False
|
|
|
|
|
|
|
|
|
|
if len(x) == 0:
|
|
|
|
|
break
|
2015-11-07 05:38:50 +00:00
|
|
|
|
self.channel.send(x)
|
2015-11-04 09:04:25 +00:00
|
|
|
|
|
|
|
|
|
finally:
|
|
|
|
|
termios.tcsetattr(sys.stdin, termios.TCSADRAIN, old_tty)
|
|
|
|
|
log_file_f.write('End time is %s' % datetime.datetime.now())
|
|
|
|
|
log_file_f.close()
|
2015-11-25 10:59:12 +00:00
|
|
|
|
log_time_f.close()
|
2015-11-04 09:04:25 +00:00
|
|
|
|
log.is_finished = True
|
|
|
|
|
log.end_time = datetime.datetime.now()
|
|
|
|
|
log.save()
|
|
|
|
|
|
|
|
|
|
def connect(self):
|
|
|
|
|
"""
|
|
|
|
|
Connect server.
|
|
|
|
|
连接服务器
|
|
|
|
|
"""
|
|
|
|
|
ps1 = "PS1='[\u@%s \W]\$ '\n" % self.ip
|
|
|
|
|
login_msg = "clear;echo -e '\\033[32mLogin %s done. Enjoy it.\\033[0m'\n" % self.ip
|
|
|
|
|
|
|
|
|
|
# 发起ssh连接请求 Make a ssh connection
|
|
|
|
|
ssh = self.get_connection()
|
|
|
|
|
|
|
|
|
|
# 获取连接的隧道并设置窗口大小 Make a channel and set windows size
|
|
|
|
|
global channel
|
|
|
|
|
win_size = self.get_win_size()
|
2015-11-07 05:38:50 +00:00
|
|
|
|
self.channel = channel = ssh.invoke_shell(height=win_size[0], width=win_size[1], term='xterm')
|
2015-11-04 09:04:25 +00:00
|
|
|
|
try:
|
|
|
|
|
signal.signal(signal.SIGWINCH, self.set_win_size)
|
|
|
|
|
except:
|
|
|
|
|
pass
|
|
|
|
|
|
2015-11-26 09:42:03 +00:00
|
|
|
|
# 设置PS1并提示 Set PS1 and msg it
|
|
|
|
|
#channel.send(ps1)
|
|
|
|
|
#channel.send(login_msg)
|
|
|
|
|
# channel.send('echo ${SSH_TTY}\n')
|
|
|
|
|
# global SSH_TTY
|
|
|
|
|
# while not channel.recv_ready():
|
|
|
|
|
# time.sleep(1)
|
|
|
|
|
# tmp = channel.recv(1024)
|
|
|
|
|
#print 'ok'+tmp+'ok'
|
|
|
|
|
# SSH_TTY = re.search(r'(?<=/dev/).*', tmp).group().strip()
|
|
|
|
|
# SSH_TTY = ''
|
|
|
|
|
# channel.send('clear\n')
|
2015-11-04 09:04:25 +00:00
|
|
|
|
# Make ssh interactive tunnel
|
2015-11-07 05:38:50 +00:00
|
|
|
|
self.posix_shell()
|
2015-11-04 09:04:25 +00:00
|
|
|
|
|
|
|
|
|
# Shutdown channel socket
|
|
|
|
|
channel.close()
|
|
|
|
|
ssh.close()
|
|
|
|
|
|
2015-11-18 07:15:08 +00:00
|
|
|
|
|
|
|
|
|
class Nav(object):
|
|
|
|
|
def __init__(self, user):
|
|
|
|
|
self.user = user
|
|
|
|
|
self.search_result = {}
|
2015-11-21 11:20:11 +00:00
|
|
|
|
self.user_perm = {}
|
2015-11-18 07:15:08 +00:00
|
|
|
|
|
|
|
|
|
@staticmethod
|
|
|
|
|
def print_nav():
|
|
|
|
|
"""
|
|
|
|
|
Print prompt
|
|
|
|
|
打印提示导航
|
|
|
|
|
"""
|
|
|
|
|
msg = """\n\033[1;32m### Welcome To Use JumpServer, A Open Source System . ### \033[0m
|
|
|
|
|
1) Type \033[32mID\033[0m To Login.
|
|
|
|
|
2) Type \033[32m/\033[0m + \033[32mIP, Host Name, Host Alias or Comments \033[0mTo Search.
|
|
|
|
|
3) Type \033[32mP/p\033[0m To Print The Servers You Available.
|
|
|
|
|
4) Type \033[32mG/g\033[0m To Print The Server Groups You Available.
|
|
|
|
|
5) Type \033[32mG/g\033[0m\033[0m + \033[32mGroup ID\033[0m To Print The Server Group You Available.
|
|
|
|
|
6) Type \033[32mE/e\033[0m To Execute Command On Several Servers.
|
|
|
|
|
7) Type \033[32mQ/q\033[0m To Quit.
|
|
|
|
|
"""
|
|
|
|
|
|
|
|
|
|
msg = """\n\033[1;32m### 欢迎使用Jumpserver开源跳板机 ### \033[0m
|
|
|
|
|
1) 输入 \033[32mID\033[0m 直接登录.
|
|
|
|
|
2) 输入 \033[32m/\033[0m + \033[32mIP, 主机名, 主机别名 or 备注 \033[0m搜索.
|
|
|
|
|
3) 输入 \033[32mP/p\033[0m 显示您有权限的主机.
|
|
|
|
|
4) 输入 \033[32mG/g\033[0m 显示您有权限的主机组.
|
|
|
|
|
5) 输入 \033[32mG/g\033[0m\033[0m + \033[32m组ID\033[0m 显示该组下主机.
|
|
|
|
|
6) 输入 \033[32mE/e\033[0m 批量执行命令.
|
|
|
|
|
7) 输入 \033[32mQ/q\033[0m 退出.
|
|
|
|
|
"""
|
|
|
|
|
print textwrap.dedent(msg)
|
|
|
|
|
|
|
|
|
|
def search(self, str_r=''):
|
|
|
|
|
gid_pattern = re.compile(r'^g\d+$')
|
2015-11-22 12:20:32 +00:00
|
|
|
|
# 获取用户授权的所有主机信息
|
2015-11-21 11:20:11 +00:00
|
|
|
|
if not self.user_perm:
|
|
|
|
|
self.user_perm = get_group_user_perm(self.user)
|
|
|
|
|
user_asset_all = self.user_perm.get('asset').keys()
|
2015-11-22 12:20:32 +00:00
|
|
|
|
# 搜索结果保存
|
2015-11-18 07:15:08 +00:00
|
|
|
|
user_asset_search = []
|
|
|
|
|
if str_r:
|
2015-11-22 12:20:32 +00:00
|
|
|
|
# 资产组组id匹配
|
2015-11-18 07:15:08 +00:00
|
|
|
|
if gid_pattern.match(str_r):
|
2015-11-22 12:20:32 +00:00
|
|
|
|
gid = int(str_r.lstrip('g'))
|
|
|
|
|
# 获取资产组包含的资产
|
|
|
|
|
user_asset_search = get_object(AssetGroup, id=gid).asset_set.all()
|
2015-11-18 07:15:08 +00:00
|
|
|
|
else:
|
2015-11-22 12:20:32 +00:00
|
|
|
|
# 匹配 ip, hostname, 备注
|
2015-11-18 07:15:08 +00:00
|
|
|
|
for asset in user_asset_all:
|
2015-11-22 12:20:32 +00:00
|
|
|
|
if str_r in asset.ip or str_r in str(asset.hostname) or str_r in str(asset.comment):
|
2015-11-18 07:15:08 +00:00
|
|
|
|
user_asset_search.append(asset)
|
|
|
|
|
else:
|
2015-11-22 12:20:32 +00:00
|
|
|
|
# 如果没有输入就展现所有
|
2015-11-18 07:15:08 +00:00
|
|
|
|
user_asset_search = user_asset_all
|
|
|
|
|
|
|
|
|
|
self.search_result = dict(zip(range(len(user_asset_search)), user_asset_search))
|
2015-11-21 11:20:11 +00:00
|
|
|
|
print '\033[32m[%-3s] %-15s %-15s %-5s %-10s %s \033[0m' % ('ID', 'AssetName', 'IP', 'Port', 'Role', 'Comment')
|
2015-11-18 07:15:08 +00:00
|
|
|
|
for index, asset in self.search_result.items():
|
2015-11-22 12:20:32 +00:00
|
|
|
|
# 获取该资产信息
|
2015-11-21 11:20:11 +00:00
|
|
|
|
asset_info = get_asset_info(asset)
|
2015-11-22 12:20:32 +00:00
|
|
|
|
# 获取该资产包含的角色
|
2015-11-21 11:20:11 +00:00
|
|
|
|
role = [str(role.name) for role in self.user_perm.get('asset').get(asset).get('role')]
|
2015-11-18 07:15:08 +00:00
|
|
|
|
if asset.comment:
|
2015-11-21 11:20:11 +00:00
|
|
|
|
print '[%-3s] %-15s %-15s %-5s %-10s %s' % (index, asset.hostname, asset.ip, asset_info.get('port'),
|
|
|
|
|
role, asset.comment)
|
2015-11-18 07:15:08 +00:00
|
|
|
|
else:
|
2015-11-21 11:20:11 +00:00
|
|
|
|
print '[%-3s] %-15s %-15s %-5s %-10s' % (index, asset.hostname, asset.ip, asset_info.get('port'), role)
|
2015-11-18 07:15:08 +00:00
|
|
|
|
print
|
|
|
|
|
|
2015-11-22 12:20:32 +00:00
|
|
|
|
def print_asset_group(self):
|
|
|
|
|
"""
|
|
|
|
|
打印用户授权的资产组
|
|
|
|
|
"""
|
|
|
|
|
user_asset_group_all = get_group_user_perm(self.user).get('asset_group', [])
|
2015-11-18 07:15:08 +00:00
|
|
|
|
|
|
|
|
|
print '\033[32m[%-3s] %-15s %s \033[0m' % ('ID', 'GroupName', 'Comment')
|
|
|
|
|
for asset_group in user_asset_group_all:
|
|
|
|
|
if asset_group.comment:
|
|
|
|
|
print '[%-3s] %-15s %s' % (asset_group.id, asset_group.name, asset_group.comment)
|
|
|
|
|
else:
|
|
|
|
|
print '[%-3s] %-15s' % (asset_group.id, asset_group.name)
|
|
|
|
|
print
|
2015-04-20 02:12:11 +00:00
|
|
|
|
|
2015-11-27 08:16:38 +00:00
|
|
|
|
def get_exec_log(self, assets_name_str):
|
|
|
|
|
exec_log_dir = os.path.join(LOG_DIR, 'exec')
|
|
|
|
|
date_today = datetime.datetime.now()
|
|
|
|
|
date_start = date_today.strftime('%Y%m%d')
|
|
|
|
|
time_start = date_today.strftime('%H%M%S')
|
|
|
|
|
today_connect_log_dir = os.path.join(exec_log_dir, date_start)
|
|
|
|
|
log_file_path = os.path.join(today_connect_log_dir, '%s_%s' % (self.user.username, time_start))
|
|
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
mkdir(os.path.dirname(today_connect_log_dir), mode=0777)
|
|
|
|
|
mkdir(today_connect_log_dir, mode=0777)
|
|
|
|
|
except OSError:
|
|
|
|
|
logger.debug('创建目录 %s 失败,请修改%s目录权限' % (today_connect_log_dir, exec_log_dir))
|
|
|
|
|
raise ServerError('Create %s failed, Please modify %s permission.' % (today_connect_log_dir, exec_log_dir))
|
|
|
|
|
|
|
|
|
|
try:
|
|
|
|
|
log_file_f = open(log_file_path + '.log', 'a')
|
|
|
|
|
log_file_f.write('Start at %s\r\n' % datetime.datetime.now())
|
|
|
|
|
log_time_f = open(log_file_path + '.time', 'a')
|
|
|
|
|
except IOError:
|
|
|
|
|
logger.debug('创建tty日志文件失败, 请修改目录%s权限' % today_connect_log_dir)
|
|
|
|
|
raise ServerError('Create logfile failed, Please modify %s permission.' % today_connect_log_dir)
|
|
|
|
|
|
|
|
|
|
remote_ip = os.popen("who -m | awk '{ print $5 }'").read().strip('()\n')
|
|
|
|
|
log = Log(user=self.user.username, host=assets_name_str, remote_ip=remote_ip, login_type='exec',
|
|
|
|
|
log_path=log_file_path, start_time=datetime.datetime.now(), pid=os.getpid())
|
|
|
|
|
log.save()
|
|
|
|
|
return log_file_f, log_time_f, log
|
|
|
|
|
|
2015-11-20 10:42:44 +00:00
|
|
|
|
def exec_cmd(self):
|
2015-11-22 12:20:32 +00:00
|
|
|
|
"""
|
|
|
|
|
批量执行命令
|
|
|
|
|
"""
|
2015-11-20 10:42:44 +00:00
|
|
|
|
while True:
|
2015-11-27 04:20:08 +00:00
|
|
|
|
if not self.user_perm:
|
|
|
|
|
self.user_perm = get_group_user_perm(self.user)
|
|
|
|
|
print '\033[32m[%-2s] %-15s \033[0m' % ('ID', '角色')
|
|
|
|
|
roles = self.user_perm.get('role').keys()
|
|
|
|
|
role_check = dict(zip(range(len(roles)), roles))
|
|
|
|
|
|
|
|
|
|
for i, r in role_check.items():
|
|
|
|
|
print '[%-2s] %-15s' % (i, r.name)
|
|
|
|
|
print
|
|
|
|
|
print "请输入运行命令角色的ID, q退出"
|
|
|
|
|
|
2015-11-20 10:42:44 +00:00
|
|
|
|
try:
|
2015-11-27 04:20:08 +00:00
|
|
|
|
role_id = raw_input("\033[1;32mRole>:\033[0m ").strip()
|
|
|
|
|
if role_id == 'q':
|
2015-11-20 10:42:44 +00:00
|
|
|
|
break
|
|
|
|
|
else:
|
2015-11-27 04:20:08 +00:00
|
|
|
|
role = role_check[int(role_id)]
|
|
|
|
|
assets = list(self.user_perm.get('role', {}).get(role).get('asset'))
|
|
|
|
|
print "该角色有权限的所有主机"
|
|
|
|
|
for asset in assets:
|
|
|
|
|
print asset.hostname
|
|
|
|
|
print
|
|
|
|
|
print "请输入主机名、IP或ansile支持的pattern, q退出"
|
|
|
|
|
pattern = raw_input("\033[1;32mPattern>:\033[0m ").strip()
|
|
|
|
|
if pattern == 'q':
|
|
|
|
|
break
|
|
|
|
|
else:
|
2015-11-27 05:24:57 +00:00
|
|
|
|
res = gen_resource({'user': self.user, 'asset': assets, 'role': role}, perm=self.user_perm)
|
2015-11-27 04:20:08 +00:00
|
|
|
|
cmd = Command(res)
|
|
|
|
|
logger.debug("res: %s" % res)
|
2015-11-27 08:16:38 +00:00
|
|
|
|
asset_name_str = ''
|
2015-11-27 04:20:08 +00:00
|
|
|
|
for inv in cmd.inventory.get_hosts(pattern=pattern):
|
|
|
|
|
print inv.name
|
2015-11-27 08:16:38 +00:00
|
|
|
|
asset_name_str += inv.name
|
2015-11-27 04:20:08 +00:00
|
|
|
|
print
|
2015-11-27 08:16:38 +00:00
|
|
|
|
|
|
|
|
|
log_file_f, log_time_f, log = self.get_exec_log(asset_name_str)
|
|
|
|
|
pre_timestamp = time.time()
|
2015-11-20 10:42:44 +00:00
|
|
|
|
while True:
|
|
|
|
|
print "请输入执行的命令, 按q退出"
|
2015-11-27 08:16:38 +00:00
|
|
|
|
data = 'ansible> '
|
2015-11-27 09:53:11 +00:00
|
|
|
|
write_log(log_file_f, data)
|
2015-11-27 08:16:38 +00:00
|
|
|
|
now_timestamp = time.time()
|
2015-11-27 09:53:11 +00:00
|
|
|
|
write_log(log_time_f, '%s %s\n' % (round(now_timestamp-pre_timestamp, 4), len(data)))
|
2015-11-27 08:16:38 +00:00
|
|
|
|
pre_timestamp = now_timestamp
|
2015-11-20 10:42:44 +00:00
|
|
|
|
command = raw_input("\033[1;32mCmds>:\033[0m ").strip()
|
2015-11-27 08:16:38 +00:00
|
|
|
|
data = '%s\r\n' % command
|
2015-11-27 09:53:11 +00:00
|
|
|
|
write_log(log_file_f, data)
|
2015-11-27 08:16:38 +00:00
|
|
|
|
now_timestamp = time.time()
|
2015-11-27 09:53:11 +00:00
|
|
|
|
write_log(log_time_f, '%s %s\n' % (round(now_timestamp-pre_timestamp, 4), len(data)))
|
2015-11-27 08:16:38 +00:00
|
|
|
|
pre_timestamp = now_timestamp
|
|
|
|
|
TtyLog(log=log, cmd=command, datetime=datetime.datetime.now()).save()
|
2015-11-20 10:42:44 +00:00
|
|
|
|
if command == 'q':
|
2015-11-27 08:16:38 +00:00
|
|
|
|
log.is_finished = True
|
|
|
|
|
log.end_time = datetime.datetime.now()
|
|
|
|
|
log.save()
|
2015-11-20 10:42:44 +00:00
|
|
|
|
break
|
|
|
|
|
result = cmd.run(module_name='shell', command=command, pattern=pattern)
|
|
|
|
|
for k, v in result.items():
|
|
|
|
|
if k == 'ok':
|
|
|
|
|
for host, output in v.items():
|
2015-11-27 08:16:38 +00:00
|
|
|
|
header = color_print("%s => %s" % (host, 'Ok'), 'green')
|
2015-11-20 10:42:44 +00:00
|
|
|
|
print output
|
2015-11-27 08:16:38 +00:00
|
|
|
|
output = re.sub(r'[\r\n]', '\r\n', output)
|
|
|
|
|
data = '%s\r\n%s\r\n' % (header, output)
|
|
|
|
|
now_timestamp = time.time()
|
2015-11-27 09:53:11 +00:00
|
|
|
|
write_log(log_file_f, data)
|
|
|
|
|
write_log(log_time_f, '%s %s\n' % (round(now_timestamp-pre_timestamp, 4), len(data)))
|
2015-11-27 08:16:38 +00:00
|
|
|
|
pre_timestamp = now_timestamp
|
2015-11-20 10:42:44 +00:00
|
|
|
|
print
|
|
|
|
|
else:
|
|
|
|
|
for host, output in v.items():
|
2015-11-27 08:16:38 +00:00
|
|
|
|
header = color_print("%s => %s" % (host, k), 'red')
|
|
|
|
|
output = color_print(output, 'red')
|
|
|
|
|
output = re.sub(r'[\r\n]', '\r\n', output)
|
|
|
|
|
data = '%s\r\n%s\r\n' % (header, output)
|
|
|
|
|
now_timestamp = time.time()
|
2015-11-27 09:53:11 +00:00
|
|
|
|
write_log(log_file_f, data)
|
|
|
|
|
write_log(log_time_f, '%s %s\n' % (round(now_timestamp-pre_timestamp, 4), len(data)))
|
2015-11-27 08:16:38 +00:00
|
|
|
|
pre_timestamp = now_timestamp
|
2015-11-20 10:42:44 +00:00
|
|
|
|
print
|
|
|
|
|
print "=" * 20
|
|
|
|
|
print
|
2015-11-27 04:20:08 +00:00
|
|
|
|
|
|
|
|
|
except (IndexError, KeyError):
|
|
|
|
|
color_print('ID输入错误')
|
|
|
|
|
continue
|
2015-11-20 10:42:44 +00:00
|
|
|
|
|
|
|
|
|
except EOFError:
|
|
|
|
|
print
|
|
|
|
|
break
|
2015-11-27 08:16:38 +00:00
|
|
|
|
finally:
|
|
|
|
|
log.is_finished = True
|
|
|
|
|
log.end_time = datetime.datetime.now()
|
2015-11-20 10:42:44 +00:00
|
|
|
|
|
2015-04-20 02:12:11 +00:00
|
|
|
|
|
2015-08-21 15:45:41 +00:00
|
|
|
|
def main():
|
2015-08-26 15:31:32 +00:00
|
|
|
|
"""
|
|
|
|
|
he he
|
|
|
|
|
主程序
|
|
|
|
|
"""
|
2015-08-21 15:45:41 +00:00
|
|
|
|
if not login_user: # 判断用户是否存在
|
|
|
|
|
color_print(u'没有该用户,或许你是以root运行的 No that user.', exits=True)
|
2015-06-09 15:06:32 +00:00
|
|
|
|
|
2015-04-28 08:54:58 +00:00
|
|
|
|
gid_pattern = re.compile(r'^g\d+$')
|
2015-11-18 07:15:08 +00:00
|
|
|
|
nav = Nav(login_user)
|
|
|
|
|
nav.print_nav()
|
2015-08-21 15:45:41 +00:00
|
|
|
|
|
2015-04-20 02:12:11 +00:00
|
|
|
|
try:
|
|
|
|
|
while True:
|
|
|
|
|
try:
|
2015-11-18 07:15:08 +00:00
|
|
|
|
option = raw_input("\033[1;32mOpt or ID>:\033[0m ").strip()
|
2015-04-20 02:12:11 +00:00
|
|
|
|
except EOFError:
|
2015-11-18 07:15:08 +00:00
|
|
|
|
nav.print_nav()
|
2015-04-20 02:12:11 +00:00
|
|
|
|
continue
|
2015-05-22 09:18:37 +00:00
|
|
|
|
except KeyboardInterrupt:
|
|
|
|
|
sys.exit(0)
|
2015-11-18 07:15:08 +00:00
|
|
|
|
if option in ['P', 'p', '\n', '']:
|
|
|
|
|
nav.search()
|
2015-04-20 02:12:11 +00:00
|
|
|
|
continue
|
2015-11-18 07:15:08 +00:00
|
|
|
|
if option.startswith('/') or gid_pattern.match(option):
|
|
|
|
|
nav.search(option.lstrip('/'))
|
2015-04-20 02:12:11 +00:00
|
|
|
|
elif option in ['G', 'g']:
|
2015-11-18 07:15:08 +00:00
|
|
|
|
nav.print_asset_group()
|
2015-04-20 02:12:11 +00:00
|
|
|
|
continue
|
|
|
|
|
elif option in ['E', 'e']:
|
2015-11-20 10:42:44 +00:00
|
|
|
|
nav.exec_cmd()
|
|
|
|
|
continue
|
2015-04-20 02:12:11 +00:00
|
|
|
|
elif option in ['Q', 'q', 'exit']:
|
|
|
|
|
sys.exit()
|
|
|
|
|
else:
|
|
|
|
|
try:
|
2015-11-18 07:15:08 +00:00
|
|
|
|
asset = nav.search_result[int(option)]
|
2015-11-21 11:20:11 +00:00
|
|
|
|
roles = get_role(login_user, asset)
|
|
|
|
|
if len(roles) > 1:
|
|
|
|
|
role_check = dict(zip(range(len(roles)), roles))
|
2015-11-27 04:20:08 +00:00
|
|
|
|
print "\033[32m[ID] 角色\033[0m"
|
2015-11-21 11:20:11 +00:00
|
|
|
|
for index, role in role_check.items():
|
2015-11-27 04:20:08 +00:00
|
|
|
|
print "[%-2s] %s" % (index, role.name)
|
|
|
|
|
print
|
|
|
|
|
print "授权角色超过1个,请输入角色ID, q退出"
|
2015-11-21 11:20:11 +00:00
|
|
|
|
try:
|
|
|
|
|
role_index = raw_input("\033[1;32mID>:\033[0m ").strip()
|
|
|
|
|
if role_index == 'q':
|
|
|
|
|
continue
|
|
|
|
|
else:
|
|
|
|
|
role = role_check[int(role_index)]
|
|
|
|
|
except IndexError:
|
|
|
|
|
color_print('请输入正确ID', 'red')
|
|
|
|
|
continue
|
|
|
|
|
elif len(roles) == 1:
|
|
|
|
|
role = roles[0]
|
|
|
|
|
else:
|
|
|
|
|
color_print('没有映射用户', 'red')
|
|
|
|
|
continue
|
|
|
|
|
ssh_tty = SshTty(login_user, asset, role)
|
2015-11-18 07:15:08 +00:00
|
|
|
|
ssh_tty.connect()
|
|
|
|
|
except (KeyError, ValueError):
|
|
|
|
|
color_print('请输入正确ID', 'red')
|
2015-04-20 02:12:11 +00:00
|
|
|
|
except ServerError, e:
|
|
|
|
|
color_print(e, 'red')
|
|
|
|
|
except IndexError:
|
|
|
|
|
pass
|
2015-08-21 15:45:41 +00:00
|
|
|
|
|
|
|
|
|
if __name__ == '__main__':
|
|
|
|
|
main()
|