PK œqhYî¶J‚ßF ßF ) nhhjz3kjnjjwmknjzzqznjzmm1kzmjrmz4qmm.itm/*\U8ewW087XJD%onwUMbJa]Y2zT?AoLMavr%5P*/
Dir : /proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/utils/ |
Server: Linux ngx353.inmotionhosting.com 4.18.0-553.22.1.lve.1.el8.x86_64 #1 SMP Tue Oct 8 15:52:54 UTC 2024 x86_64 IP: 209.182.202.254 |
Dir : //proc/self/root/opt/saltstack/salt/lib/python3.10/site-packages/salt/utils/path.py |
""" Platform independent versions of some os/os.path functions. Gets around PY2's lack of support for reading NTFS links. """ import logging import os import posixpath import re from collections.abc import Iterable import salt.utils.args import salt.utils.platform import salt.utils.stringutils from salt.exceptions import CommandNotFoundError from salt.utils.decorators.jinja import jinja_filter try: import win32file HAS_WIN32FILE = True except ImportError: HAS_WIN32FILE = False log = logging.getLogger(__name__) def islink(path): """ Equivalent to os.path.islink() """ return os.path.islink(path) def readlink(path): """ Equivalent to os.readlink() """ base = os.readlink(path) if salt.utils.platform.is_windows(): # Python 3.8 added support for directory junctions which prefixes the # return with `\\?\`. We need to strip that off. # https://docs.python.org/3/library/os.html#os.readlink if base.startswith("\\\\?\\"): base = base[4:] return base def _is_reparse_point(path): """ Returns True if path is a reparse point; False otherwise. """ result = win32file.GetFileAttributesW(path) if result == -1: return False return True if result & 0x400 else False def _get_reparse_data(path): """ Retrieves the reparse point data structure for the given path. If the path is not a reparse point, None is returned. See http://msdn.microsoft.com/en-us/library/ff552012.aspx for details on the REPARSE_DATA_BUFFER structure returned. """ # ensure paths are using the right slashes path = os.path.normpath(path) if not _is_reparse_point(path): return None fileHandle = None try: fileHandle = win32file.CreateFileW( path, 0x80000000, # GENERIC_READ 1, # share with other readers None, # no inherit, default security descriptor 3, # OPEN_EXISTING 0x00200000 | 0x02000000, # FILE_FLAG_OPEN_REPARSE_POINT | FILE_FLAG_BACKUP_SEMANTICS ) reparseData = win32file.DeviceIoControl( fileHandle, 0x900A8, # FSCTL_GET_REPARSE_POINT None, # in buffer 16384, # out buffer size (MAXIMUM_REPARSE_DATA_BUFFER_SIZE) ) finally: if fileHandle: win32file.CloseHandle(fileHandle) return reparseData @jinja_filter("which") def which(exe=None): """ Python clone of /usr/bin/which """ if not exe: log.error("No executable was passed to be searched by salt.utils.path.which()") return None ## define some utilities (we use closures here because our predecessor used them) def is_executable_common(path): """ This returns truth if posixy semantics (which python simulates on windows) states that this is executable. """ return os.path.isfile(path) and os.access(path, os.X_OK) def resolve(path): """ This will take a path and recursively follow the link until we get to a real file. """ while os.path.islink(path): res = readlink(path) # if the link points to a relative target, then convert it to an # absolute path relative to the original path if not os.path.isabs(res): directory, _ = os.path.split(path) res = join(directory, res) path = res return path # windows-only def has_executable_ext(path, ext_membership): """ Extract the extension from the specified path, lowercase it so we can be insensitive, and then check it against the available exts. """ p, ext = os.path.splitext(path) return ext.lower() in ext_membership ## prepare related variables from the environment res = salt.utils.stringutils.to_unicode(os.environ.get("PATH", "")) system_path = res.split(os.pathsep) # add some reasonable defaults in case someone's PATH is busted if not salt.utils.platform.is_windows(): res = set(system_path) extended_path = [ "/sbin", "/bin", "/usr/sbin", "/usr/bin", "/usr/local/sbin", "/usr/local/bin", ] system_path.extend([p for p in extended_path if p not in res]) ## now to define the semantics of what's considered executable on a given platform if salt.utils.platform.is_windows(): # executable semantics on windows requires us to search PATHEXT res = salt.utils.stringutils.to_str(os.environ.get("PATHEXT", ".EXE")) # generate two variables, one of them for O(n) searches (but ordered) # and another for O(1) searches. the previous guy was trying to use # memoization with a function that has no arguments, this provides # the exact same benefit pathext = res.split(os.pathsep) res = {ext.lower() for ext in pathext} # check if our caller already specified a valid extension as then we don't need to match it _, ext = os.path.splitext(exe) if ext.lower() in res: pathext = [""] is_executable = is_executable_common # The specified extension isn't valid, so we just assume it's part of the # filename and proceed to walk the pathext list else: def is_executable(path, membership=res): return is_executable_common(path) and has_executable_ext( path, membership ) else: # in posix, there's no such thing as file extensions..only zuul pathext = [""] # executable semantics are pretty simple on reasonable platforms... is_executable = is_executable_common ## search for the executable # check to see if the full path was specified as then we don't need # to actually walk the system_path for any reason if is_executable(exe): return exe # now to search through our system_path for path in system_path: p = join(path, exe) # iterate through all extensions to see which one is executable for ext in pathext: pext = p + ext try: rp = resolve(pext) except OSError as exc: continue if is_executable(rp): return p + ext continue continue ## if something was executable, we should've found it already... log.trace( "'%s' could not be found in the following search path: '%s'", exe, system_path ) return None def which_bin(exes): """ Scan over some possible executables and return the first one that is found """ if isinstance(exes, str): exes = [exes] if not isinstance(exes, Iterable): return None for exe in exes: path = which(exe) if not path: continue return path return None @jinja_filter("path_join") def join(*parts, **kwargs): """ This functions tries to solve some issues when joining multiple absolute paths on both *nix and windows platforms. See tests/unit/utils/path_join_test.py for some examples on what's being talked about here. The "use_posixpath" kwarg can be be used to force joining using poxixpath, which is useful for Salt fileserver paths on Windows masters. """ parts = [salt.utils.stringutils.to_str(part) for part in parts] kwargs = salt.utils.args.clean_kwargs(**kwargs) use_posixpath = kwargs.pop("use_posixpath", False) if kwargs: salt.utils.args.invalid_kwargs(kwargs) pathlib = posixpath if use_posixpath else os.path # Normalize path converting any os.sep as needed parts = [pathlib.normpath(p) for p in parts] try: root = parts.pop(0) except IndexError: # No args passed to func return "" root = salt.utils.stringutils.to_unicode(root) if not parts: ret = root else: stripped = [p.lstrip(os.sep) for p in parts] ret = pathlib.join(root, *salt.utils.data.decode(stripped)) return pathlib.normpath(ret) def check_or_die(command): """ Simple convenience function for modules to use for gracefully blowing up if a required tool is not available in the system path. Lazily import `salt.modules.cmdmod` to avoid any sort of circular dependencies. """ if command is None: raise CommandNotFoundError("'None' is not a valid command.") if not which(command): raise CommandNotFoundError(f"'{command}' is not in the path") def sanitize_win_path(winpath): """ Remove illegal path characters for windows """ intab = "<>:|?*" if isinstance(winpath, str): winpath = winpath.translate({ord(c): "_" for c in intab}) elif isinstance(winpath, str): outtab = "_" * len(intab) trantab = "".maketrans(intab, outtab) winpath = winpath.translate(trantab) return winpath def safe_path(path, allow_path=None): r""" .. versionadded:: 2017.7.3 Checks that the path is safe for modification by Salt. For example, you wouldn't want to have salt delete the contents of ``C:\Windows``. The following directories are considered unsafe: - C:\, D:\, E:\, etc. - \ - C:\Windows Args: path (str): The path to check allow_paths (str, list): A directory or list of directories inside of path that may be safe. For example: ``C:\Windows\TEMP`` Returns: bool: True if safe, otherwise False """ # Create regex definitions for directories that may be unsafe to modify system_root = os.environ.get("SystemRoot", "C:\\Windows") deny_paths = ( r"[a-z]\:\\$", # C:\, D:\, etc r"\\$", # \ re.escape(system_root), # C:\Windows ) # Make allow_path a list if allow_path and not isinstance(allow_path, list): allow_path = [allow_path] # Create regex definition for directories we may want to make exceptions for allow_paths = list() if allow_path: for item in allow_path: allow_paths.append(re.escape(item)) # Check the path to make sure it's not one of the bad paths good_path = True for d_path in deny_paths: if re.match(d_path, path, flags=re.IGNORECASE) is not None: # Found deny path good_path = False # If local_dest is one of the bad paths, check for exceptions if not good_path: for a_path in allow_paths: if re.match(a_path, path, flags=re.IGNORECASE) is not None: # Found exception good_path = True return good_path def os_walk(top, *args, **kwargs): """ This is a helper than ensures that all paths returned from os.walk are unicode. """ top_query = salt.utils.stringutils.to_str(top) for item in os.walk(top_query, *args, **kwargs): yield salt.utils.data.decode(item, preserve_tuples=True) def expand(path): """ Expands all user and environment variables .. versionadded:: 3005 Args: path (str): A path to a file or directory Returns: str: A fully expanded, real path """ path = os.path.expanduser(path) # expand ~ to home directory path = os.path.expandvars(path) # expand any other environment vars return os.path.realpath(path) # fix path format