__  __    __   __  _____      _            _          _____ _          _ _ 
 |  \/  |   \ \ / / |  __ \    (_)          | |        / ____| |        | | |
 | \  / |_ __\ V /  | |__) | __ ___   ____ _| |_ ___  | (___ | |__   ___| | |
 | |\/| | '__|> <   |  ___/ '__| \ \ / / _` | __/ _ \  \___ \| '_ \ / _ \ | |
 | |  | | |_ / . \  | |   | |  | |\ V / (_| | ||  __/  ____) | | | |  __/ | |
 |_|  |_|_(_)_/ \_\ |_|   |_|  |_| \_/ \__,_|\__\___| |_____/|_| |_|\___V 2.1
 if you need WebShell for Seo everyday contact me on Telegram
 Telegram Address : @jackleet
        
        
For_More_Tools: Telegram: @jackleet | Bulk Smtp support mail sender | Business Mail Collector | Mail Bouncer All Mail | Bulk Office Mail Validator | Html Letter private



Upload:

Command:

[email protected]: ~ $
# Author: Fabian Lichtenegger-Lukas <[email protected]>
# Author: Josef Tschiggerl <[email protected]>
# This file is part of cloud-init. See LICENSE file for license information.
"""Wireguard"""

import logging
import re

from cloudinit import subp, util
from cloudinit.cloud import Cloud
from cloudinit.config import Config
from cloudinit.config.schema import MetaSchema
from cloudinit.settings import PER_INSTANCE

meta: MetaSchema = {
    "id": "cc_wireguard",
    "distros": ["ubuntu"],
    "frequency": PER_INSTANCE,
    "activate_by_schema_keys": ["wireguard"],
}

LOG = logging.getLogger(__name__)

REQUIRED_WG_INT_KEYS = frozenset(["name", "config_path", "content"])
WG_CONFIG_FILE_MODE = 0o600
NL = "\n"
MIN_KERNEL_VERSION = (5, 6)


def supplemental_schema_validation(wg_int: dict):
    """Validate user-provided wg:interfaces option values.

    This function supplements flexible jsonschema validation with specific
    value checks to aid in triage of invalid user-provided configuration.

    @param wg_int: Dict of configuration value under 'wg:interfaces'.

    @raises: ValueError describing invalid values provided.
    """
    errors = []
    missing = REQUIRED_WG_INT_KEYS.difference(set(wg_int.keys()))
    if missing:
        keys = ", ".join(sorted(missing))
        errors.append(f"Missing required wg:interfaces keys: {keys}")

    for key, value in sorted(wg_int.items()):
        if key == "name" or key == "config_path" or key == "content":
            if not isinstance(value, str):
                errors.append(
                    f"Expected a string for wg:interfaces:{key}. Found {value}"
                )

    if errors:
        raise ValueError(
            f"Invalid wireguard interface configuration:{NL}{NL.join(errors)}"
        )


def write_config(wg_int: dict):
    """Writing user-provided configuration into Wireguard
    interface configuration file.

    @param wg_int: Dict of configuration value under 'wg:interfaces'.

    @raises: RuntimeError for issues writing of configuration file.
    """
    LOG.debug("Configuring Wireguard interface %s", wg_int["name"])
    try:
        LOG.debug("Writing wireguard config to file %s", wg_int["config_path"])
        util.write_file(
            wg_int["config_path"], wg_int["content"], mode=WG_CONFIG_FILE_MODE
        )
    except Exception as e:
        raise RuntimeError(
            "Failure writing Wireguard configuration file"
            f' {wg_int["config_path"]}:{NL}{str(e)}'
        ) from e


def enable_wg(wg_int: dict, cloud: Cloud):
    """Enable and start Wireguard interface

    @param wg_int: Dict of configuration value under 'wg:interfaces'.

    @raises: RuntimeError for issues enabling WG interface.
    """
    try:
        LOG.debug("Enabling wg-quick@%s at boot", wg_int["name"])
        cloud.distro.manage_service("enable", f'wg-quick@{wg_int["name"]}')
        LOG.debug("Bringing up interface wg-quick@%s", wg_int["name"])
        cloud.distro.manage_service("restart", f'wg-quick@{wg_int["name"]}')
    except subp.ProcessExecutionError as e:
        raise RuntimeError(
            f"Failed enabling/starting Wireguard interface(s):{NL}{str(e)}"
        ) from e


def readinessprobe_command_validation(wg_readinessprobes: list):
    """Basic validation of user-provided probes

    @param wg_readinessprobes: List of readinessprobe probe(s).

    @raises: ValueError of wrong datatype provided for probes.
    """
    errors = []
    pos = 0
    for c in wg_readinessprobes:
        if not isinstance(c, str):
            errors.append(
                f"Expected a string for readinessprobe at {pos}. Found {c}"
            )
            pos += 1

    if errors:
        raise ValueError(
            f"Invalid readinessProbe commands:{NL}{NL.join(errors)}"
        )


def readinessprobe(wg_readinessprobes: list):
    """Execute provided readiness probe(s)

    @param wg_readinessprobes: List of readinessprobe probe(s).

    @raises: ProcessExecutionError for issues during execution of probes.
    """
    errors = []
    for c in wg_readinessprobes:
        try:
            LOG.debug("Running readinessprobe: '%s'", str(c))
            subp.subp(c, capture=True, shell=True)
        except subp.ProcessExecutionError as e:
            errors.append(f"{c}: {e}")

    if errors:
        raise RuntimeError(
            f"Failed running readinessprobe command:{NL}{NL.join(errors)}"
        )


def maybe_install_wireguard_packages(cloud: Cloud):
    """Install wireguard packages and tools

    @param cloud: Cloud object

    @raises: Exception for issues during package
    installation.
    """

    packages = ["wireguard-tools"]

    if subp.which("wg"):
        return

    # Install DKMS when Kernel Version lower 5.6
    if util.kernel_version() < MIN_KERNEL_VERSION:
        packages.append("wireguard")

    try:
        cloud.distro.update_package_sources()
    except Exception:
        util.logexc(LOG, "Package update failed")
        raise
    try:
        cloud.distro.install_packages(packages)
    except Exception:
        util.logexc(LOG, "Failed to install wireguard-tools")
        raise


def load_wireguard_kernel_module():
    """Load wireguard kernel module

    @raises: ProcessExecutionError for issues modprobe
    """
    try:
        out = subp.subp("lsmod", capture=True, shell=True)
        if not re.search("wireguard", out.stdout.strip()):
            LOG.debug("Loading wireguard kernel module")
            subp.subp("modprobe wireguard", capture=True, shell=True)
    except subp.ProcessExecutionError as e:
        util.logexc(LOG, f"Could not load wireguard module:{NL}{str(e)}")
        raise


def handle(name: str, cfg: Config, cloud: Cloud, args: list) -> None:
    wg_section = None

    if "wireguard" in cfg:
        LOG.debug("Found Wireguard section in config")
        wg_section = cfg["wireguard"]
    else:
        LOG.debug(
            "Skipping module named %s, no 'wireguard' configuration found",
            name,
        )
        return

    # install wireguard tools, enable kernel module
    maybe_install_wireguard_packages(cloud)
    load_wireguard_kernel_module()

    for wg_int in wg_section["interfaces"]:
        # check schema
        supplemental_schema_validation(wg_int)

        # write wg config files
        write_config(wg_int)

        # enable wg interfaces
        enable_wg(wg_int, cloud)

    # parse and run readinessprobe parameters
    if (
        "readinessprobe" in wg_section
        and wg_section["readinessprobe"] is not None
    ):
        wg_readinessprobes = wg_section["readinessprobe"]
        readinessprobe_command_validation(wg_readinessprobes)
        readinessprobe(wg_readinessprobes)
    else:
        LOG.debug("Skipping readinessprobe - no checks defined")

Filemanager

Name Type Size Permission Actions
__pycache__ Folder 0755
schemas Folder 0755
__init__.py File 40 B 0644
cc_ansible.py File 8.17 KB 0644
cc_apk_configure.py File 4.23 KB 0644
cc_apt_configure.py File 38.23 KB 0644
cc_apt_pipelining.py File 1.85 KB 0644
cc_bootcmd.py File 1.75 KB 0644
cc_byobu.py File 2.72 KB 0644
cc_ca_certs.py File 8.67 KB 0644
cc_chef.py File 13.19 KB 0644
cc_disable_ec2_metadata.py File 1.6 KB 0644
cc_disk_setup.py File 29.6 KB 0644
cc_fan.py File 1.95 KB 0644
cc_final_message.py File 2.5 KB 0644
cc_growpart.py File 18.37 KB 0644
cc_grub_dpkg.py File 5.42 KB 0644
cc_install_hotplug.py File 3.19 KB 0644
cc_keyboard.py File 1.49 KB 0644
cc_keys_to_console.py File 2.09 KB 0644
cc_landscape.py File 3.06 KB 0644
cc_locale.py File 1.18 KB 0644
cc_lxd.py File 13.47 KB 0644
cc_mcollective.py File 4.11 KB 0644
cc_mounts.py File 18.08 KB 0644
cc_ntp.py File 18.91 KB 0644
cc_package_update_upgrade_install.py File 3.99 KB 0644
cc_phone_home.py File 3.74 KB 0644
cc_power_state_change.py File 6.15 KB 0644
cc_puppet.py File 10.72 KB 0644
cc_reset_rmc.py File 4.33 KB 0644
cc_resizefs.py File 10.63 KB 0644
cc_resolv_conf.py File 3.13 KB 0644
cc_rh_subscription.py File 15.19 KB 0644
cc_rsyslog.py File 11.47 KB 0644
cc_runcmd.py File 1.6 KB 0644
cc_salt_minion.py File 3.96 KB 0644
cc_scripts_per_boot.py File 1.27 KB 0644
cc_scripts_per_instance.py File 1.26 KB 0644
cc_scripts_per_once.py File 1.24 KB 0644
cc_scripts_user.py File 1.25 KB 0644
cc_scripts_vendor.py File 1.26 KB 0644
cc_seed_random.py File 3 KB 0644
cc_set_hostname.py File 3.4 KB 0644
cc_set_passwords.py File 10.32 KB 0644
cc_snap.py File 3.36 KB 0644
cc_spacewalk.py File 2.64 KB 0644
cc_ssh.py File 10.96 KB 0644
cc_ssh_authkey_fingerprints.py File 3.76 KB 0644
cc_ssh_import_id.py File 5.42 KB 0644
cc_timezone.py File 1.13 KB 0644
cc_ubuntu_autoinstall.py File 1.27 KB 0644
cc_ubuntu_drivers.py File 4.08 KB 0644
cc_ubuntu_pro.py File 13.64 KB 0644
cc_update_etc_hosts.py File 2.46 KB 0644
cc_update_hostname.py File 2.18 KB 0644
cc_users_groups.py File 2.86 KB 0644
cc_wireguard.py File 6.67 KB 0644
cc_write_files.py File 6 KB 0644
cc_write_files_deferred.py File 1.28 KB 0644
cc_yum_add_repo.py File 4.53 KB 0644
cc_zypper_add_repo.py File 4.93 KB 0644
modules.py File 13.32 KB 0644
schema.py File 50.77 KB 0644
Filemanager