teleport/tool/tsh/config.go

194 lines
5.5 KiB
Go

/*
Copyright 2021 Gravitational, Inc.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package main
import (
"fmt"
"net"
"os"
"os/exec"
"runtime"
"strings"
"text/template"
"github.com/gravitational/trace"
"github.com/gravitational/teleport/api/constants"
"github.com/gravitational/teleport/api/profile"
"github.com/gravitational/teleport/api/utils/keypaths"
)
const sshConfigTemplate = `
# Common flags for all {{ .ClusterName }} hosts
Host *.{{ .ClusterName }} {{ .ProxyHost }}
UserKnownHostsFile "{{ .KnownHostsPath }}"
IdentityFile "{{ .IdentityFilePath }}"
CertificateFile "{{ .CertificateFilePath }}"
# Flags for all {{ .ClusterName }} hosts except the proxy
Host *.{{ .ClusterName }} !{{ .ProxyHost }}
Port 3022
ProxyCommand "{{ .TSHPath }}" proxy ssh --cluster={{ .ClusterName }} --proxy={{ .ProxyHost }} %r@%h:%p
`
type hostConfigParameters struct {
ClusterName string
KnownHostsPath string
IdentityFilePath string
CertificateFilePath string
ProxyHost string
TSHPath string
}
// getSSHPath returns a sane `ssh` path for the current platform.
func getSSHPath() (string, error) {
if runtime.GOOS == constants.WindowsOS {
return exec.LookPath("ssh.exe")
}
return exec.LookPath("ssh")
}
// writeSSHConfig generates an OpenSSH config block from the `sshConfigTemplate`
// template string.
func writeSSHConfig(sb *strings.Builder, params hostConfigParameters) error {
t, err := template.New("ssh-config").Parse(sshConfigTemplate)
if err != nil {
return trace.Wrap(err)
}
err = t.Execute(sb, params)
if err != nil {
return trace.WrapWithMessage(err, "error generating SSH configuration from template")
}
return nil
}
// onConfig handles the `tsh config` command
func onConfig(cf *CLIConf) error {
tc, err := makeClient(cf, true)
if err != nil {
return trace.Wrap(err)
}
// Note: TeleportClient.connectToProxy() overrides the proxy address when
// JumpHosts are in use, which this does not currently implement.
proxyHost, _, err := net.SplitHostPort(tc.Config.SSHProxyAddr)
if err != nil {
return trace.Wrap(err)
}
// Note: We explicitly opt not to use RetryWithRelogin here as it will write
// its prompt to stdout. If the user pipes this command's output, the
// destination (possibly their ssh config file) may get polluted with
// invalid output. Instead, rely on the normal error messages (which are
// sent to stderr) and expect the user to log in manually.
proxyClient, err := tc.ConnectToProxy(cf.Context)
if err != nil {
return trace.Wrap(err)
}
defer proxyClient.Close()
rootClusterName, rootErr := proxyClient.RootClusterName()
leafClusters, leafErr := proxyClient.GetLeafClusters(cf.Context)
if err := trace.NewAggregate(rootErr, leafErr); err != nil {
return trace.Wrap(err)
}
keysDir := profile.FullProfilePath(tc.Config.KeysDir)
knownHostsPath := keypaths.KnownHostsPath(keysDir)
identityFilePath := keypaths.UserKeyPath(keysDir, proxyHost, tc.Config.Username)
var sb strings.Builder
// Start with a newline in case an existing config file does not end with
// one.
fmt.Fprintln(&sb)
fmt.Fprintf(&sb, "#\n# Begin generated Teleport configuration for %s from `tsh config`\n#\n", tc.Config.WebProxyAddr)
err = writeSSHConfig(&sb, hostConfigParameters{
ClusterName: rootClusterName,
KnownHostsPath: knownHostsPath,
IdentityFilePath: identityFilePath,
CertificateFilePath: keypaths.SSHCertPath(keysDir, proxyHost, tc.Config.Username, rootClusterName),
ProxyHost: proxyHost,
TSHPath: cf.executablePath,
})
if err != nil {
return trace.Wrap(err)
}
for _, leafCluster := range leafClusters {
err = writeSSHConfig(&sb, hostConfigParameters{
ClusterName: leafCluster.GetName(),
KnownHostsPath: knownHostsPath,
IdentityFilePath: identityFilePath,
CertificateFilePath: keypaths.SSHCertPath(keysDir, proxyHost, tc.Config.Username, rootClusterName),
ProxyHost: proxyHost,
TSHPath: cf.executablePath,
})
if err != nil {
return trace.Wrap(err)
}
}
fmt.Fprintf(&sb, "\n# End generated Teleport configuration\n")
fmt.Print(sb.String())
return nil
}
func onConfigProxy(cf *CLIConf) error {
proxyHost, proxyPort, err := net.SplitHostPort(cf.Proxy)
if err != nil {
return trace.Wrap(err)
}
targetHost, targetPort, err := net.SplitHostPort(cf.ConfigProxyTarget)
if err != nil {
return trace.Wrap(err)
}
// If the node is suffixed by either the root or leaf cluster name, remove it.
targetHost = strings.TrimSuffix(targetHost, "."+proxyHost)
targetHost = strings.TrimSuffix(targetHost, "."+cf.SiteName)
// NOTE: This should eventually make use of `tsh proxy ssh`.
sshPath, err := getSSHPath()
if err != nil {
return trace.Wrap(err)
}
args := []string{
"-p",
proxyPort,
proxyHost,
"-s",
fmt.Sprintf("proxy:%s:%s@%s", targetHost, targetPort, cf.SiteName),
}
if cf.NodeLogin != "" {
args = append([]string{"-l", cf.NodeLogin}, args...)
}
child := exec.Command(sshPath, args...)
child.Stdin = os.Stdin
child.Stdout = os.Stdout
child.Stderr = os.Stderr
return child.Run()
}