Skip to main content

PowerShell Python Citrix Tricks.

Project description

PSytricks

PyPI PyPI - License pdoc black

PowerShell Python Citrix Tricks - pun intended.

logo

This package provides an abstraction layer allowing Python code to interact with a Citrix Virtual Apps and Desktops (CVAD) stack, i.e. to fetch status information and trigger actions on machines and sessions. Since CVAD only provides a PowerShell Snap-In to do so, a core component written in Windows PowerShell (note: not PowerShell Core as snap-ins are not supported there) is required.

PSyTricks ships with two options for the PowerShell layer:

  • A wrapper script that is launched as a suprocess from the Python code. It doesn't require any further setup beyond the package installation but performance, well, slow.
  • A (zero-authentication) REST (see the note below on this) service providing several GET and POST endpoints to request status information or perform actions. Performance is much better compared to the wrapper script, but obviously this requires the code to be running as a service in an appropriate permission context.

NOTE: this RESTful claim is actually not entirely true. Or basically not at all, it would be better called an HTTP-JSON-RPC-API. We'll still be using the term REST for it as this is basically what people nowadays think of when they are coming across this label. Sorry, Roy T. Fielding.

🤯 Are you serious?

Calling PowerShell as a subprocess from within Python? 😳

To convert results to JSON and pass them back, just to parse it again in Python. Really? 🧐

Or, not sure if that's any better, implementing an HTTP REST API in plain PowerShell?!? 🫣

✅ Yes. We. Are

And the package name was chosen to reflect this.

To be very clear: performance of the wrapper script is abysmal, but this is not at all an issue for us. Abysmal, as in: for every wrapped call a full (new) PowerShell process needs to be instantiated, usually taking something like 1-2 seconds. ⏳

The REST interface provides a much better performance, at the cost of some additional setup. If you're happy to take on this approach, the package offers a very smooth ride. 🎢🎡

🛠🚧 Installation

Prerequisites

As mentioned above, the Citrix Broker PowerShell Snap-In is required to be installed on the machine that will run the wrapper script, since its commands are being used to communicate with the CVAD stack. This is also the reason why this package will work on Windows PowerShell only as snap-ins are not supported on other PowerShell editions. Please note this also implies that the latest usable PowerShell version is 5.1 as newer ones have dropped support for snap-ins (but that's a different problem that Citrix will have to solve at some point).

To install the snap-in, look for an MSI package like this in the Delivery Controller or XenDesktop installation media and install it as usual:

  • Broker_PowerShellSnapIn_x64.msi

Installing the 🐍 package

In case you're planning to use psytricks via the subprocess approach (discouraged but less components to set up), you will have to install the package itself on the Windows machine having the above mentioned Snap-In installed. For the REST approach (recommended) only the PowerShell service described in the section below has to run on that machine - the Python package can be installed on any computer that is able to talk to the REST service.

For installing psytricks please create and activate a venv, then run:

pip install psytricks

NOTE: this will also register the psytricks CLI tool although that one is mostly meant for testing and demonstration purposes, otherwise the *-Broker* commands provided by the PowerShell snap-in could be used directly.

Setting up the REST service

The easiest way for installing the REST service is to use WinSW (Windows Service Wrapper) but you may choose anything you like to launch the server process like NSSM, Scheduled Tasks 📅, homegrown dark magic 🪄🔮 or others.

To go with WinSW simply download the bundled version provided with each PSyTricks release. Just look for the .zip asset having REST and WinSW in its name.

Unzip the downloaded file to the desired target location, e.g. %PROGRAMDATA%\PSyTricks, then copy / rename restricks-server.example.xml to restricks-server.xml and open it in an editor.

Adapt the entries in the <serviceaccount> section to match your requirements and make sure to update the hostname passed via the -AdminAddress parameter in the <startarguments> section. It needs to point to your Citrix Delivery Controller, just in case that's not obvious.

Next step is to install and start the service:

cd C:\ProgramData\PSyTricks
restricks-server.exe isntall
Start-Service RESTricksServer

In case the service doesn't start up, check the Windows Event Log and the .log files created by WinSW in the service directory.

Once the service has started, you can monitor its actions by live-watching the log file:

Get-Content -Wait C:\ProgramData\PSyTricks\restricks-server.log

Tada! That's it, the service is now ready to take HTTP requests (from localhost)! 🎉

Please be aware that the REST interface doesn't do any authentication on purpose, meaning everything / everyone that can access it will be able to run all requests! We're using it in combination with an SSH tunnel but essentially anything that controls who / what can access the service will do the job.

🎪 What does it provide?

To interact with CVAD, a wrapper object needs to be instantiated and instructed how to communicate with the stack.

Using the REST service - recommended

After setting up the REST service as described above and making sure to be able to connect to it (firewall rules, ssh tunnel, ...), a psytricks.wrapper.ResTricksWrapper object can be used while passing the URL under which the REST service is reachable, e.g.

from psytricks.wrapper import ResTricksWrapper

wrapper = ResTricksWrapper(base_url="http://localhost:8080/")

Using the subprocess wrapper - use with caution

(This is only recommended for testing or if for some reason you don't want / can't set up the REST service.)

To create a wrapper object using the subprocess variant, a psytricks.wrapper.PSyTricksWrapper with the address of the Delivery Controller to connect to has to be instantiated, for example:

from psytricks.wrapper import PSyTricksWrapper

wrapper = PSyTricksWrapper(deliverycontroller="cdc01.vdi.example.xy")

Fetching status information

The wrapper object can then be used to e.g. retrieve information on the machines controlled ("brokered") by Citrix:

machines = wrapper.get_machine_status()

for machine in machines:
    print(f"[{machine["DNSName"]}] is in power state '{machine["PowerState"]}'")
print(f"Got status details on {len(machines)} machines.")

Performing actions

To restart a machine, use something like this:

wrapper.perform_poweraction(machine="vm23.vdi.example.xy", action="restart")

For placing a machine in Maintenance Mode use:

wrapper.set_maintenance(machine="vm42.vdi.example.xy", disable=False)

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

psytricks-2.1.6.tar.gz (39.0 kB view details)

Uploaded Source

Built Distribution

psytricks-2.1.6-py3-none-any.whl (40.1 kB view details)

Uploaded Python 3

File details

Details for the file psytricks-2.1.6.tar.gz.

File metadata

  • Download URL: psytricks-2.1.6.tar.gz
  • Upload date:
  • Size: 39.0 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.5.1 CPython/3.10.4 Linux/5.15.0-77-generic

File hashes

Hashes for psytricks-2.1.6.tar.gz
Algorithm Hash digest
SHA256 d87cf82751469c4ef41d318466b2a6aa3ec0aa2c66b26f349e69c6ada208a85f
MD5 598829c4f9d568dcbd350c7666bba31a
BLAKE2b-256 75c644de2a09cf4cbdfbbf373e7d66624dd11c7163d2a246fdf88b0b09b8d585

See more details on using hashes here.

File details

Details for the file psytricks-2.1.6-py3-none-any.whl.

File metadata

  • Download URL: psytricks-2.1.6-py3-none-any.whl
  • Upload date:
  • Size: 40.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.5.1 CPython/3.10.4 Linux/5.15.0-77-generic

File hashes

Hashes for psytricks-2.1.6-py3-none-any.whl
Algorithm Hash digest
SHA256 5d46c20735e19a43dd8ff62de46aa107ae35aacf259d1e4fad404befe30009f7
MD5 3f1499ae50bea0e33becd98ba9da1a31
BLAKE2b-256 72c048a970fbf3b46b3df7387ec21ce6c8a0c9fadd54a0054ba3f497c04456fc

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page