code stringlengths 3 6.57k |
|---|
os.path.isfile(path) |
binascii.a2b_base64(sig) |
format(os.path.basename(path) |
format(self.opts['master_sign_key_name'] + '.pub') |
log.debug('Failed to verify signature of public key') |
verify_signing_master(self, payload) |
format(self.opts['master']) |
os.path.join(self.opts['pki_dir'], self.mpub) |
salt.utils.get_uid(self.opts.get('user', None) |
salt.utils.fpopen(m_pub_fn, 'wb+', uid=uid) |
wfh.write(payload['pub_key']) |
format(self.opts['master']) |
log.error('There was an error while verifying the masters public-key signature') |
Exception(sign_exc) |
check_auth_deps(self, payload) |
sign (master) |
verify (minion) |
message. ('clear', 'pub', 'aes') |
extract_aes(self, payload, master_pub=True) |
message. ('clear', 'pub', etc) |
self.decrypt_aes(payload, master_pub) |
self.decrypt_aes(payload, master_pub) |
verify_master(self, payload) |
message. ('clear', 'pub', etc) |
os.path.join(self.opts['pki_dir'], self.mpub) |
os.path.isfile(m_pub_fn) |
salt.utils.fopen(m_pub_fn) |
read() |
replace('\n', '') |
replace('\r', '') |
local_master_pub.replace('\n', '') |
replace('\r', '') |
self.check_auth_deps(payload) |
self.verify_signing_master(payload) |
self.extract_aes(payload, master_pub=False) |
self.check_auth_deps(payload) |
self.verify_signing_master(payload) |
self.extract_aes(payload) |
format(self.opts['master_sign_key_name'] + '.pub') |
self.extract_aes(payload) |
self.check_auth_deps(payload) |
self.verify_signing_master(payload) |
self.extract_aes(payload, master_pub=False) |
salt.utils.fopen(m_pub_fn, 'wb+') |
write(payload['pub_key']) |
self.extract_aes(payload, master_pub=False) |
SAuth(AsyncAuth) |
weakref.WeakValueDictionary() |
__new__(cls, opts, io_loop=None) |
__key() |
cls.__key(opts) |
log.debug('Initializing new SAuth for {0}'.format(key) |
object.__new__(cls) |
new_auth.__singleton_init__(opts) |
log.debug('Re-using SAuth for {0}'.format(key) |
__key(cls, opts, io_loop=None) |
__init__(self, opts, io_loop=None) |
super(SAuth, self) |
__init__(opts, io_loop=io_loop) |
__singleton_init__(self, opts, io_loop=None) |
Crypticle.generate_key_string() |
salt.payload.Serial(self.opts) |
os.path.join(self.opts['pki_dir'], 'minion.pub') |
os.path.join(self.opts['pki_dir'], 'minion.pem') |
os.path.isfile(self.pub_path) |
self.get_keys() |
creds(self) |
hasattr(self, '_creds') |
self.authenticate() |
crypticle(self) |
hasattr(self, '_crypticle') |
self.authenticate() |
authenticate(self, _=None) |
self.sign_in() |
self.opts.get('caller') |
sys.exit(2) |
log.info('Waiting {0} seconds before retry.'.format(acceptance_wait_time) |
time.sleep(acceptance_wait_time) |
log.debug('Authentication wait time is {0}'.format(acceptance_wait_time) |
Crypticle(self.opts, creds['aes']) |
sign_in(self, timeout=60, safe=True, tries=1) |
self.opts.get('auth_timeout', None) |
self.opts.get('auth_safemode', None) |
self.opts.get('auth_tries', None) |
os.path.join(self.opts['pki_dir'], self.mpub) |
salt.transport.client.ReqChannel.factory(self.opts, crypt='clear') |
self.minion_sign_in_payload() |
log.warning('SaltReqTimeoutError: {0}'.format(e) |
SaltClientError('Attempt to authenticate with the salt master failed') |
sys.exit(salt.defaults.exitcodes.EX_OK) |
self.verify_master(payload) |
format(salt.version.__version__, m_pub_fn) |
sys.exit(42) |
self.opts.get('syndic_master', False) |
self.opts.get('syndic_finger', self.opts.get('master_finger', False) |
salt.utils.pem_finger(m_pub_fn, sum_type=self.opts['hash_type']) |
self._finger_fail(syndic_finger, m_pub_fn) |
self.opts.get('master_finger', False) |
salt.utils.pem_finger(m_pub_fn, sum_type=self.opts['hash_type']) |
self._finger_fail(self.opts['master_finger'], m_pub_fn) |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.