You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
boundary/internal/cmd/commands/connect/ssh.go

213 lines
6.9 KiB

// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: BUSL-1.1
package connect
import (
"errors"
"fmt"
"os"
"strings"
apiproxy "github.com/hashicorp/boundary/api/proxy"
"github.com/hashicorp/boundary/internal/cmd/base"
"github.com/hashicorp/boundary/internal/target"
"github.com/posener/complete"
)
const (
sshSynopsis = "Authorize a session against a target and invoke an SSH client to connect"
)
func sshOptions(c *Command, set *base.FlagSets) {
f := set.NewFlagSet("SSH Options")
f.StringVar(&base.StringVar{
Name: "style",
Target: &c.flagSshStyle,
EnvVar: "BOUNDARY_CONNECT_SSH_STYLE",
Completion: complete.PredictSet("ssh", "putty", "sshpass"),
Default: "ssh",
Usage: `Specifies how the CLI will attempt to invoke an SSH client. This will also set a suitable default for -exec if a value was not specified. Currently-understood values are "ssh" and "putty".`,
})
f.StringVar(&base.StringVar{
Name: "remote-command",
Target: &c.flagRemoteCommand,
Usage: `Specifies a command that will be executed on the remote host. A complete command line may be specified as command, or it may have additional arguments. If supplied, the arguments will be appended to the command, separated by spaces.`,
})
f.StringVar(&base.StringVar{
Name: "username",
Target: &c.flagUsername,
EnvVar: "BOUNDARY_CONNECT_USERNAME",
Completion: complete.PredictNothing,
Usage: `Specifies the username to pass through to the client`,
})
}
type sshFlags struct {
flagSshStyle string
flagRemoteCommand string
}
func (s *sshFlags) defaultExec() string {
return strings.ToLower(s.flagSshStyle)
}
func (s *sshFlags) buildArgs(c *Command, port, ip, _ string, creds apiproxy.Credentials) (args, envs []string, retCreds apiproxy.Credentials, retErr error) {
var username string
retCreds = creds
var tryConsume bool
switch string(target.SubtypeFromId(c.sessInfo.TargetId)) {
case "tcp":
tryConsume = true
}
switch strings.ToLower(s.flagSshStyle) {
case "ssh":
// Might want -t for ssh or -tt but seems fine without it for now...
if port != "" {
args = append(args, "-p", port)
}
switch c.sessInfo.Type {
case "tcp":
// SSH detects a host key change when the localhost proxy port changes
// This uses the host ID instead of 'localhost:port'.
if len(c.sessInfo.HostId) > 0 {
args = append(args, "-o", fmt.Sprintf("HostKeyAlias=%s", c.sessInfo.HostId))
} else {
// In cases where the Target has no host sources and has an
// address directly attached to it, we have no Host Id. Use
// Target Id instead. Only one address can ever be present on a
// target, and no other host sources may be present at the same
// time, so this is a reasonable alternative.
args = append(args, "-o", fmt.Sprintf("HostKeyAlias=%s", c.sessInfo.TargetId))
}
case "ssh":
args = append(args, "-o", "NoHostAuthenticationForLocalhost=yes")
}
case "sshpass":
if !tryConsume {
return nil, nil, apiproxy.Credentials{}, errors.New("Credentials must be consumed when using sshpass")
}
var password string
if len(retCreds.UsernamePassword) > 0 {
// For now just grab the first username password credential brokered
// Mark credential as consumed so that it is not printed to user
retCreds.UsernamePassword[0].Consumed = true
username = retCreds.UsernamePassword[0].Username
password = retCreds.UsernamePassword[0].Password
}
if password == "" {
return nil, nil, apiproxy.Credentials{}, errors.New("Password is required when using sshpass")
}
// sshpass requires that the password is passed as env-var "SSHPASS"
// when the using env-vars.
envs = append(envs, fmt.Sprintf("SSHPASS=%s", password))
args = append(args, "-e", "ssh")
if port != "" {
args = append(args, "-p", port)
}
// sshpass cannot handle host key checking, disable localhost key verification
// to avoid error: 'SSHPASS detected host authentication prompt. Exiting.'
args = append(args, "-o", "NoHostAuthenticationForLocalhost=yes")
case "putty":
if port != "" {
args = append(args, "-P", port)
}
}
// Check if we got credentials to attempt to use for ssh or putty,
// sshpass style has already been handled above as username password.
switch strings.ToLower(s.flagSshStyle) {
case "putty", "ssh":
switch {
// First check if we want to try and consume credentials
case !tryConsume:
// Do nothing
// If we want to consume check if we have a private key available first
case len(creds.SshPrivateKey) > 0:
// For now just grab the first ssh private key credential brokered
cred := retCreds.SshPrivateKey[0]
username = cred.Username
privateKey := cred.PrivateKey
cred.Consumed = true
if cred.Passphrase != "" {
// Don't re-print everything, but print the passphrase they'll need
cred.Consumed = false
delete(cred.Raw.Credential, "username")
delete(cred.Raw.Credential, "private_key")
}
retCreds.SshPrivateKey[0] = cred
pkFile, err := os.CreateTemp("", "*")
if err != nil {
return nil, nil, apiproxy.Credentials{}, fmt.Errorf("Error saving ssh private key to tmp file: %w", err)
}
c.cleanupFuncs = append(c.cleanupFuncs, func() error {
if err := os.Remove(pkFile.Name()); err != nil {
return fmt.Errorf("Error removing temporary ssh private key file; consider removing %s manually: %w", pkFile.Name(), err)
}
return nil
})
// SSH requires the private key file to end with a newline.
// When ingesting an ssh_private_key from a file:// Boundary calls strings.TrimSpace
// which will also trim newlines.
if !strings.HasSuffix(privateKey, "\n") {
privateKey = fmt.Sprintln(privateKey)
}
_, err = pkFile.WriteString(privateKey)
if err != nil {
return nil, nil, apiproxy.Credentials{}, fmt.Errorf("Error writing private key file to %s: %w", pkFile.Name(), err)
}
if err := pkFile.Close(); err != nil {
return nil, nil, apiproxy.Credentials{}, fmt.Errorf("Error closing private key file after writing to %s: %w", pkFile.Name(), err)
}
args = append(args, "-i", pkFile.Name())
// Next check if we have a username password credential
case len(creds.UsernamePassword) > 0:
// We cannot use the password of the credential outside of sshpass, but we
// can use the username.
// N.B. Do not mark credential as consumed, as user will still need enter
// the password when prompted.
if c.flagUsername == "" {
// If the user did not actively provide a username flag set the
// username to that of the first credential we got.
username = retCreds.UsernamePassword[0].Username
}
}
}
switch {
case username != "":
args = append(args, "-l", username)
case c.flagUsername != "":
args = append(args, "-l", c.flagUsername)
}
// Add destination
args = append(args, ip)
// Add optional command to run on remote host
if s.flagRemoteCommand != "" {
cmdArgs := strings.Split(s.flagRemoteCommand, " ")
args = append(args, cmdArgs...)
}
return args, envs, retCreds, nil
}