Du kan inte välja fler än 25 ämnen Ämnen måste starta med en bokstav eller siffra, kan innehålla bindestreck ('-') och vara max 35 tecken långa.

ssh.go 6.1KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279
  1. // Copyright 2017 The Gitea Authors. All rights reserved.
  2. // Use of this source code is governed by a MIT-style
  3. // license that can be found in the LICENSE file.
  4. package ssh
  5. import (
  6. "bytes"
  7. "crypto/rand"
  8. "crypto/rsa"
  9. "crypto/x509"
  10. "encoding/pem"
  11. "fmt"
  12. "io"
  13. "os"
  14. "os/exec"
  15. "path/filepath"
  16. "strings"
  17. "sync"
  18. "syscall"
  19. "code.gitea.io/gitea/models"
  20. "code.gitea.io/gitea/modules/log"
  21. "code.gitea.io/gitea/modules/setting"
  22. "github.com/gliderlabs/ssh"
  23. "github.com/unknwon/com"
  24. gossh "golang.org/x/crypto/ssh"
  25. )
  26. type contextKey string
  27. const giteaKeyID = contextKey("gitea-key-id")
  28. func getExitStatusFromError(err error) int {
  29. if err == nil {
  30. return 0
  31. }
  32. exitErr, ok := err.(*exec.ExitError)
  33. if !ok {
  34. return 1
  35. }
  36. waitStatus, ok := exitErr.Sys().(syscall.WaitStatus)
  37. if !ok {
  38. // This is a fallback and should at least let us return something useful
  39. // when running on Windows, even if it isn't completely accurate.
  40. if exitErr.Success() {
  41. return 0
  42. }
  43. return 1
  44. }
  45. return waitStatus.ExitStatus()
  46. }
  47. func sessionHandler(session ssh.Session) {
  48. keyID := session.Context().Value(giteaKeyID).(int64)
  49. command := session.RawCommand()
  50. log.Trace("SSH: Payload: %v", command)
  51. args := []string{"serv", "key-" + com.ToStr(keyID), "--config=" + setting.CustomConf}
  52. log.Trace("SSH: Arguments: %v", args)
  53. cmd := exec.Command(setting.AppPath, args...)
  54. cmd.Env = append(
  55. os.Environ(),
  56. "SSH_ORIGINAL_COMMAND="+command,
  57. "SKIP_MINWINSVC=1",
  58. )
  59. stdout, err := cmd.StdoutPipe()
  60. if err != nil {
  61. log.Error("SSH: StdoutPipe: %v", err)
  62. return
  63. }
  64. stderr, err := cmd.StderrPipe()
  65. if err != nil {
  66. log.Error("SSH: StderrPipe: %v", err)
  67. return
  68. }
  69. stdin, err := cmd.StdinPipe()
  70. if err != nil {
  71. log.Error("SSH: StdinPipe: %v", err)
  72. return
  73. }
  74. wg := &sync.WaitGroup{}
  75. wg.Add(2)
  76. if err = cmd.Start(); err != nil {
  77. log.Error("SSH: Start: %v", err)
  78. return
  79. }
  80. go func() {
  81. defer stdin.Close()
  82. if _, err := io.Copy(stdin, session); err != nil {
  83. log.Error("Failed to write session to stdin. %s", err)
  84. }
  85. }()
  86. go func() {
  87. defer wg.Done()
  88. if _, err := io.Copy(session, stdout); err != nil {
  89. log.Error("Failed to write stdout to session. %s", err)
  90. }
  91. }()
  92. go func() {
  93. defer wg.Done()
  94. if _, err := io.Copy(session.Stderr(), stderr); err != nil {
  95. log.Error("Failed to write stderr to session. %s", err)
  96. }
  97. }()
  98. // Ensure all the output has been written before we wait on the command
  99. // to exit.
  100. wg.Wait()
  101. // Wait for the command to exit and log any errors we get
  102. err = cmd.Wait()
  103. if err != nil {
  104. log.Error("SSH: Wait: %v", err)
  105. }
  106. if err := session.Exit(getExitStatusFromError(err)); err != nil {
  107. log.Error("Session failed to exit. %s", err)
  108. }
  109. }
  110. func publicKeyHandler(ctx ssh.Context, key ssh.PublicKey) bool {
  111. if ctx.User() != setting.SSH.BuiltinServerUser {
  112. return false
  113. }
  114. // check if we have a certificate
  115. if cert, ok := key.(*gossh.Certificate); ok {
  116. if len(setting.SSH.TrustedUserCAKeys) == 0 {
  117. return false
  118. }
  119. // look for the exact principal
  120. for _, principal := range cert.ValidPrincipals {
  121. pkey, err := models.SearchPublicKeyByContentExact(principal)
  122. if err != nil {
  123. log.Error("SearchPublicKeyByContentExact: %v", err)
  124. return false
  125. }
  126. if models.IsErrKeyNotExist(err) {
  127. continue
  128. }
  129. c := &gossh.CertChecker{
  130. IsUserAuthority: func(auth gossh.PublicKey) bool {
  131. for _, k := range setting.SSH.TrustedUserCAKeysParsed {
  132. if bytes.Equal(auth.Marshal(), k.Marshal()) {
  133. return true
  134. }
  135. }
  136. return false
  137. },
  138. }
  139. // check the CA of the cert
  140. if !c.IsUserAuthority(cert.SignatureKey) {
  141. return false
  142. }
  143. // validate the cert for this principal
  144. if err := c.CheckCert(principal, cert); err != nil {
  145. return false
  146. }
  147. ctx.SetValue(giteaKeyID, pkey.ID)
  148. return true
  149. }
  150. }
  151. pkey, err := models.SearchPublicKeyByContent(strings.TrimSpace(string(gossh.MarshalAuthorizedKey(key))))
  152. if err != nil {
  153. log.Error("SearchPublicKeyByContent: %v", err)
  154. return false
  155. }
  156. ctx.SetValue(giteaKeyID, pkey.ID)
  157. return true
  158. }
  159. // Listen starts a SSH server listens on given port.
  160. func Listen(host string, port int, ciphers []string, keyExchanges []string, macs []string) {
  161. // TODO: Handle ciphers, keyExchanges, and macs
  162. srv := ssh.Server{
  163. Addr: fmt.Sprintf("%s:%d", host, port),
  164. PublicKeyHandler: publicKeyHandler,
  165. Handler: sessionHandler,
  166. // We need to explicitly disable the PtyCallback so text displays
  167. // properly.
  168. PtyCallback: func(ctx ssh.Context, pty ssh.Pty) bool {
  169. return false
  170. },
  171. }
  172. keyPath := filepath.Join(setting.AppDataPath, "ssh/gogs.rsa")
  173. if !com.IsExist(keyPath) {
  174. filePath := filepath.Dir(keyPath)
  175. if err := os.MkdirAll(filePath, os.ModePerm); err != nil {
  176. log.Error("Failed to create dir %s: %v", filePath, err)
  177. }
  178. err := GenKeyPair(keyPath)
  179. if err != nil {
  180. log.Fatal("Failed to generate private key: %v", err)
  181. }
  182. log.Trace("New private key is generated: %s", keyPath)
  183. }
  184. err := srv.SetOption(ssh.HostKeyFile(keyPath))
  185. if err != nil {
  186. log.Error("Failed to set Host Key. %s", err)
  187. }
  188. go listen(&srv)
  189. }
  190. // GenKeyPair make a pair of public and private keys for SSH access.
  191. // Public key is encoded in the format for inclusion in an OpenSSH authorized_keys file.
  192. // Private Key generated is PEM encoded
  193. func GenKeyPair(keyPath string) error {
  194. privateKey, err := rsa.GenerateKey(rand.Reader, 2048)
  195. if err != nil {
  196. return err
  197. }
  198. privateKeyPEM := &pem.Block{Type: "RSA PRIVATE KEY", Bytes: x509.MarshalPKCS1PrivateKey(privateKey)}
  199. f, err := os.OpenFile(keyPath, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600)
  200. if err != nil {
  201. return err
  202. }
  203. defer func() {
  204. if err = f.Close(); err != nil {
  205. log.Error("Close: %v", err)
  206. }
  207. }()
  208. if err := pem.Encode(f, privateKeyPEM); err != nil {
  209. return err
  210. }
  211. // generate public key
  212. pub, err := gossh.NewPublicKey(&privateKey.PublicKey)
  213. if err != nil {
  214. return err
  215. }
  216. public := gossh.MarshalAuthorizedKey(pub)
  217. p, err := os.OpenFile(keyPath+".pub", os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600)
  218. if err != nil {
  219. return err
  220. }
  221. defer func() {
  222. if err = p.Close(); err != nil {
  223. log.Error("Close: %v", err)
  224. }
  225. }()
  226. _, err = p.Write(public)
  227. return err
  228. }