linsk/vm/ssh.go

167 lines
5 KiB
Go
Raw Normal View History

2023-09-02 20:03:44 +01:00
// Linsk - A utility to access Linux-native file systems on non-Linux operating systems.
// Copyright (c) 2023 The Linsk Authors.
//
// This program is free software: you can redistribute it and/or modify
// it under the terms of the GNU General Public License as published by
// the Free Software Foundation, either version 3 of the License, or
// (at your option) any later version.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License
// along with this program. If not, see <https://www.gnu.org/licenses/>.
2023-08-25 15:12:19 +01:00
package vm
import (
"bytes"
"encoding/base64"
"fmt"
"net"
2023-08-26 11:57:12 +01:00
"os"
2023-08-25 15:12:19 +01:00
"strings"
"time"
2023-08-29 14:24:18 +01:00
"github.com/AlexSSD7/linsk/sshutil"
2023-08-27 15:30:51 +01:00
"github.com/AlexSSD7/linsk/utils"
2023-08-25 15:12:19 +01:00
"github.com/alessio/shellescape"
"github.com/pkg/errors"
"golang.org/x/crypto/ssh"
)
func ParseSSHKeyScan(knownHosts []byte) (ssh.HostKeyCallback, error) {
knownKeysMap := make(map[string][]byte)
for _, line := range strings.Split(string(knownHosts), "\n") {
if len(line) == 0 {
continue
}
lineSplit := strings.Split(line, " ")
if want, have := 3, len(lineSplit); want != have {
return nil, fmt.Errorf("bad split ssh identity string length: want %v, have %v ('%v')", want, have, line)
}
b, err := base64.StdEncoding.DecodeString(lineSplit[2])
if err != nil {
return nil, errors.Wrap(err, "decode base64 public key")
}
knownKeysMap[lineSplit[1]] = b
}
return func(hostname string, remote net.Addr, key ssh.PublicKey) error {
knownKey, ok := knownKeysMap[key.Type()]
if !ok {
return fmt.Errorf("unknown key type '%v'", key.Type())
}
if !bytes.Equal(key.Marshal(), knownKey) {
return fmt.Errorf("public key mismatch")
}
return nil
}, nil
}
2023-08-27 13:44:57 +01:00
func (vm *VM) scanSSHIdentity() ([]byte, error) {
vm.resetSerialStdout()
2023-08-25 15:12:19 +01:00
2023-08-30 09:19:02 +01:00
err := vm.writeSerial([]byte(`ssh-keyscan -H 127.0.0.1 && echo "SERIAL STATUS: $?" && rm /root/.ash_history` + "\n"))
2023-08-25 15:12:19 +01:00
if err != nil {
return nil, errors.Wrap(err, "write keyscan command to serial")
}
deadline := time.Now().Add(time.Second * 5)
2023-08-30 09:19:02 +01:00
stdOutErrBuf := bytes.NewBuffer(nil)
ret := bytes.NewBuffer(nil)
2023-08-25 15:12:19 +01:00
for {
select {
2023-08-27 13:44:57 +01:00
case <-vm.ctx.Done():
return nil, vm.ctx.Err()
2023-08-25 15:12:19 +01:00
case <-time.After(time.Until(deadline)):
2023-08-30 09:19:02 +01:00
return nil, fmt.Errorf("keyscan command timed out %v", utils.GetLogErrMsg(stdOutErrBuf.String(), "stdout/stderr log"))
2023-08-27 13:44:57 +01:00
case data := <-vm.serialStdoutCh:
2023-08-25 15:12:19 +01:00
if len(data) == 0 {
continue
}
2023-08-30 09:19:02 +01:00
stdOutErrBuf.Write(data)
2023-08-29 14:24:18 +01:00
// This isn't clean at all, but there is no better
// way to achieve an exit status check like this.
2023-08-25 15:12:19 +01:00
prefix := []byte("SERIAL STATUS: ")
if bytes.HasPrefix(data, prefix) {
if len(data) == len(prefix) {
return nil, fmt.Errorf("keyscan command status code did not show up")
}
if data[len(prefix)] != '0' {
2023-08-30 09:19:02 +01:00
return nil, fmt.Errorf("non-zero keyscan command status code: '%v' %v", string(data[len(prefix)]), utils.GetLogErrMsg(stdOutErrBuf.String(), "stdout/stderr log"))
2023-08-25 15:12:19 +01:00
}
return ret.Bytes(), nil
} else if data[0] == '|' {
ret.Write(data)
}
}
}
}
2023-08-27 13:44:57 +01:00
func (vm *VM) sshSetup() (ssh.Signer, error) {
vm.resetSerialStdout()
2023-08-25 15:12:19 +01:00
2023-08-29 14:24:18 +01:00
sshSigner, sshPublicKey, err := sshutil.GenerateSSHKey()
2023-08-25 15:12:19 +01:00
if err != nil {
return nil, errors.Wrap(err, "generate ssh key")
}
2023-08-27 15:30:51 +01:00
installSSHDCmd := ""
if vm.installSSH {
2023-08-30 09:19:02 +01:00
installSSHDCmd = "apk add openssh; "
2023-08-27 15:30:51 +01:00
}
2023-08-30 09:19:02 +01:00
cmd := `do_setup () { sh -c "set -ex; ifconfig eth0 up && ifconfig lo up && udhcpc; ` + installSSHDCmd + `mkdir -p ~/.ssh; echo ` + shellescape.Quote(string(sshPublicKey)) + ` > ~/.ssh/authorized_keys; rc-update add sshd; rc-service sshd start"; echo "SERIAL"" ""STATUS: $?"; }; do_setup` + "\n"
2023-08-25 15:12:19 +01:00
2023-08-27 13:44:57 +01:00
err = vm.writeSerial([]byte(cmd))
2023-08-25 15:12:19 +01:00
if err != nil {
return nil, errors.Wrap(err, "write ssh setup serial command")
}
2023-08-27 15:30:51 +01:00
deadline := time.Now().Add(time.Second * 30)
2023-08-25 15:12:19 +01:00
stdOutErrBuf := bytes.NewBuffer(nil)
for {
select {
2023-08-27 13:44:57 +01:00
case <-vm.ctx.Done():
return nil, vm.ctx.Err()
2023-08-25 15:12:19 +01:00
case <-time.After(time.Until(deadline)):
2023-08-29 11:51:06 +01:00
return nil, fmt.Errorf("setup command timed out %v", utils.GetLogErrMsg(stdOutErrBuf.String(), "stdout/stderr log"))
2023-08-27 13:44:57 +01:00
case data := <-vm.serialStdoutCh:
2023-08-29 14:24:18 +01:00
// This isn't clean at all, but there is no better
// way to achieve an exit status check like this.
2023-08-25 15:12:19 +01:00
prefix := []byte("SERIAL STATUS: ")
2023-08-27 15:30:51 +01:00
stdOutErrBuf.WriteString(utils.ClearUnprintableChars(string(data), true))
2023-08-25 15:12:19 +01:00
if bytes.HasPrefix(data, prefix) {
if len(data) == len(prefix) {
return nil, fmt.Errorf("setup command status code did not show up")
}
if data[len(prefix)] != '0' {
2023-08-29 14:24:18 +01:00
// A non-pretty yet effective debug print to assist with debugging
// in case something ever goes wrong.
2023-08-26 11:57:12 +01:00
fmt.Fprintf(os.Stderr, "SSH SETUP FAILURE:\n%v", stdOutErrBuf.String())
2023-08-29 14:24:18 +01:00
2023-08-29 11:51:06 +01:00
return nil, fmt.Errorf("non-zero setup command status code: '%v' %v", string(data[len(prefix)]), utils.GetLogErrMsg(stdOutErrBuf.String(), "stdout/stderr log"))
2023-08-25 15:12:19 +01:00
}
return sshSigner, nil
}
}
}
}