code
stringlengths
3
6.57k
os.path.isfile(path)
binascii.a2b_base64(sig)
format(os.path.basename(path)
format(self.opts['master_sign_key_name'] + '.pub')
log.debug('Failed to verify signature of public key')
verify_signing_master(self, payload)
format(self.opts['master'])
os.path.join(self.opts['pki_dir'], self.mpub)
salt.utils.get_uid(self.opts.get('user', None)
salt.utils.fpopen(m_pub_fn, 'wb+', uid=uid)
wfh.write(payload['pub_key'])
format(self.opts['master'])
log.error('There was an error while verifying the masters public-key signature')
Exception(sign_exc)
check_auth_deps(self, payload)
sign (master)
verify (minion)
message. ('clear', 'pub', 'aes')
extract_aes(self, payload, master_pub=True)
message. ('clear', 'pub', etc)
self.decrypt_aes(payload, master_pub)
self.decrypt_aes(payload, master_pub)
verify_master(self, payload)
message. ('clear', 'pub', etc)
os.path.join(self.opts['pki_dir'], self.mpub)
os.path.isfile(m_pub_fn)
salt.utils.fopen(m_pub_fn)
read()
replace('\n', '')
replace('\r', '')
local_master_pub.replace('\n', '')
replace('\r', '')
self.check_auth_deps(payload)
self.verify_signing_master(payload)
self.extract_aes(payload, master_pub=False)
self.check_auth_deps(payload)
self.verify_signing_master(payload)
self.extract_aes(payload)
format(self.opts['master_sign_key_name'] + '.pub')
self.extract_aes(payload)
self.check_auth_deps(payload)
self.verify_signing_master(payload)
self.extract_aes(payload, master_pub=False)
salt.utils.fopen(m_pub_fn, 'wb+')
write(payload['pub_key'])
self.extract_aes(payload, master_pub=False)
SAuth(AsyncAuth)
weakref.WeakValueDictionary()
__new__(cls, opts, io_loop=None)
__key()
cls.__key(opts)
log.debug('Initializing new SAuth for {0}'.format(key)
object.__new__(cls)
new_auth.__singleton_init__(opts)
log.debug('Re-using SAuth for {0}'.format(key)
__key(cls, opts, io_loop=None)
__init__(self, opts, io_loop=None)
super(SAuth, self)
__init__(opts, io_loop=io_loop)
__singleton_init__(self, opts, io_loop=None)
Crypticle.generate_key_string()
salt.payload.Serial(self.opts)
os.path.join(self.opts['pki_dir'], 'minion.pub')
os.path.join(self.opts['pki_dir'], 'minion.pem')
os.path.isfile(self.pub_path)
self.get_keys()
creds(self)
hasattr(self, '_creds')
self.authenticate()
crypticle(self)
hasattr(self, '_crypticle')
self.authenticate()
authenticate(self, _=None)
self.sign_in()
self.opts.get('caller')
sys.exit(2)
log.info('Waiting {0} seconds before retry.'.format(acceptance_wait_time)
time.sleep(acceptance_wait_time)
log.debug('Authentication wait time is {0}'.format(acceptance_wait_time)
Crypticle(self.opts, creds['aes'])
sign_in(self, timeout=60, safe=True, tries=1)
self.opts.get('auth_timeout', None)
self.opts.get('auth_safemode', None)
self.opts.get('auth_tries', None)
os.path.join(self.opts['pki_dir'], self.mpub)
salt.transport.client.ReqChannel.factory(self.opts, crypt='clear')
self.minion_sign_in_payload()
log.warning('SaltReqTimeoutError: {0}'.format(e)
SaltClientError('Attempt to authenticate with the salt master failed')
sys.exit(salt.defaults.exitcodes.EX_OK)
self.verify_master(payload)
format(salt.version.__version__, m_pub_fn)
sys.exit(42)
self.opts.get('syndic_master', False)
self.opts.get('syndic_finger', self.opts.get('master_finger', False)
salt.utils.pem_finger(m_pub_fn, sum_type=self.opts['hash_type'])
self._finger_fail(syndic_finger, m_pub_fn)
self.opts.get('master_finger', False)
salt.utils.pem_finger(m_pub_fn, sum_type=self.opts['hash_type'])
self._finger_fail(self.opts['master_finger'], m_pub_fn)