Pluggable ephemeral software tunneling and delivery system
Project description
Heist creates network tunnels for distributing and managing agents. While it has been originally built to deploy and manage Salt Minions, it can be used to distribute and manage other agents or plugins if extended to do so.
Using Heist is very easy, Start by downloading Heist. Just install via pip:
pip install heist
Heist Manager
In order to run Heist you will need to specify a Heist manager. An example of a heist manager is salt.minion but this will require a user to install the heist-salt project:
pip install heist-salt
Making Your Roster
A Roster is a file used by Heist to map login information to the systems in your environment. This file can be very simple and just needs to tell Heist where your systems are and how to log into them via ssh. Open a file called roster.cfg and add the data needed to connect to a remote system via ssh:
system_name:
host: 192.168.4.4
username: fred
password: freds_password
The roster files typically all live inside of a roster directory. But to get started we will execute a single roster file with Heist using the salt.minion Heist manager:
heist salt.minion -R roster.cfg
Assuming your roster is correct, heist will now connect to the remote system and deploy the salt.minion binary.
Tear Down
Heist is able to automatically clean up as well! Just soft kill your heist application and it will reach out to all connections, tell them to remove the deployed artifacts from the target systems and stop the service! Like a proper heist these should be no evidence left behind!
Using Heist to Deploy Salt Minions
If you want to use Heist to deploy and manage Salt, you will need to install heist-salt.
Additional Documentation
If you want to read more about how to use Heist and its internals please take a look at Heist’s documentation here: https://heist.readthedocs.io/en/latest/
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
File details
Details for the file heist-7.0.2.tar.gz
.
File metadata
- Download URL: heist-7.0.2.tar.gz
- Upload date:
- Size: 25.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.8.0 pkginfo/1.9.6 readme-renderer/41.0 requests/2.31.0 requests-toolbelt/1.0.0 urllib3/2.0.5 tqdm/4.66.1 importlib-metadata/6.8.0 keyring/24.2.0 rfc3986/2.0.0 colorama/0.4.6 CPython/3.9.18
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | e778a2aa62753f2d55f7902212658b17104891d024793e6bef31e9b070cfd924 |
|
MD5 | d89bf00eee34a04691cb0f47a1a7503e |
|
BLAKE2b-256 | f187932622f90f9352834edbfe6903b4a13e71e642395caccff013795cfe7c98 |
File details
Details for the file heist-7.0.2-py3-none-any.whl
.
File metadata
- Download URL: heist-7.0.2-py3-none-any.whl
- Upload date:
- Size: 29.8 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.8.0 pkginfo/1.9.6 readme-renderer/41.0 requests/2.31.0 requests-toolbelt/1.0.0 urllib3/2.0.5 tqdm/4.66.1 importlib-metadata/6.8.0 keyring/24.2.0 rfc3986/2.0.0 colorama/0.4.6 CPython/3.9.18
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | 5a98e2be0b2c36a77718c4ab5bd240c6fc0b7ff0d2e3f74f075122836c2c5d79 |
|
MD5 | c4690aa845710253a6cad9d7bf4f81cd |
|
BLAKE2b-256 | 353b155c224bdeb1252c03927a474d7333041781ce66ca7ae6e79a85dc93e905 |