io.vertx.ext.shell.term.impl.SSHServer Maven / Gradle / Ivy
/*
* Copyright 2015 Red Hat, Inc.
*
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* and Apache License v2.0 which accompanies this distribution.
*
* The Eclipse Public License is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* The Apache License v2.0 is available at
* http://www.opensource.org/licenses/apache2.0.php
*
* You may elect to redistribute this code under either of these licenses.
*
*
* Copyright (c) 2015 The original author or authors
* ------------------------------------------------------
* All rights reserved. This program and the accompanying materials
* are made available under the terms of the Eclipse Public License v1.0
* and Apache License v2.0 which accompanies this distribution.
*
* The Eclipse Public License is available at
* http://www.eclipse.org/legal/epl-v10.html
*
* The Apache License v2.0 is available at
* http://www.opensource.org/licenses/apache2.0.php
*
* You may elect to redistribute this code under either of these licenses.
*
*/
package io.vertx.ext.shell.term.impl;
import io.termd.core.readline.Keymap;
import io.termd.core.ssh.TtyCommand;
import io.termd.core.ssh.netty.AsyncAuth;
import io.termd.core.ssh.netty.AsyncUserAuthServiceFactory;
import io.termd.core.ssh.netty.NettyIoServiceFactoryFactory;
import io.vertx.core.AsyncResult;
import io.vertx.core.Future;
import io.vertx.core.Handler;
import io.vertx.core.Vertx;
import io.vertx.core.VertxException;
import io.vertx.core.buffer.Buffer;
import io.vertx.core.impl.ContextInternal;
import io.vertx.core.json.JsonObject;
import io.vertx.core.net.JksOptions;
import io.vertx.core.net.KeyCertOptions;
import io.vertx.core.net.KeyStoreOptionsBase;
import io.vertx.core.net.PemKeyCertOptions;
import io.vertx.core.net.PfxOptions;
import io.vertx.ext.auth.AuthProvider;
import io.vertx.ext.auth.authentication.AuthenticationProvider;
import io.vertx.ext.shell.impl.ShellAuth;
import io.vertx.ext.shell.term.SSHTermOptions;
import io.vertx.ext.shell.term.TermServer;
import io.vertx.ext.shell.term.Term;
import org.apache.sshd.common.keyprovider.AbstractKeyPairProvider;
import org.apache.sshd.common.keyprovider.KeyPairProvider;
import org.apache.sshd.server.SshServer;
import org.apache.sshd.server.session.ServerConnectionServiceFactory;
import java.io.ByteArrayInputStream;
import java.nio.charset.Charset;
import java.security.Key;
import java.security.KeyPair;
import java.security.KeyStore;
import java.security.PrivateKey;
import java.security.PublicKey;
import java.security.cert.Certificate;
import java.util.ArrayList;
import java.util.Arrays;
import java.util.Enumeration;
import java.util.List;
import java.util.concurrent.atomic.AtomicInteger;
/**
* Encapsulate the SSH server setup.
*
* @author Julien Viet
*/
public class SSHServer implements TermServer {
private static final int STATUS_STOPPED = 0, STATUS_STARTING = 1, STATUS_STARTED = 2, STATUS_STOPPING = 3;
private final Vertx vertx;
private final SSHTermOptions options;
private Handler termHandler;
private SshServer nativeServer;
private final AtomicInteger status = new AtomicInteger(STATUS_STOPPED);
private ContextInternal listenContext;
private AuthenticationProvider authProvider;
private Handler execHandler;
public SSHServer(Vertx vertx, SSHTermOptions options) {
this.vertx = vertx;
this.options = new SSHTermOptions(options);
}
public SSHTermOptions getOptions() {
return options;
}
/**
* @return the underlying native server
*/
public SshServer getNativeServer() {
return nativeServer;
}
public Handler getExecHandler() {
return execHandler;
}
public TermServer setExecHandler(Handler execHandler) {
this.execHandler = execHandler;
return this;
}
@Override
public TermServer termHandler(Handler handler) {
termHandler = handler;
return this;
}
@Override
public TermServer authenticationProvider(AuthenticationProvider provider) {
authProvider = provider;
return this;
}
public SSHServer listen(Handler> listenHandler) {
if (!status.compareAndSet(STATUS_STOPPED, STATUS_STARTING)) {
listenHandler.handle(Future.failedFuture("Invalid state:" + status.get()));
return this;
}
if (options.getAuthOptions() != null) {
authProvider = ShellAuth.load(vertx, options.getAuthOptions());
}
Charset defaultCharset = Charset.forName(options.getDefaultCharset());
listenContext = (ContextInternal) vertx.getOrCreateContext();
vertx.executeBlocking(fut -> {
try {
KeyCertOptions ksOptions = options.getKeyPairOptions();
KeyStore ks;
if (ksOptions instanceof KeyStoreOptionsBase) {
ks = ((KeyStoreOptionsBase)ksOptions).loadKeyStore(vertx);
} else if (ksOptions instanceof PemKeyCertOptions) {
ks = ((PemKeyCertOptions)ksOptions).loadKeyStore(vertx);
} else {
ks = null;
}
if (ks == null) {
throw new VertxException("No key pair store configured");
}
String kpPassword = "";
if (ksOptions instanceof JksOptions) {
kpPassword = ((JksOptions) ksOptions).getPassword();
} else if (ksOptions instanceof PfxOptions) {
kpPassword = ((PfxOptions) ksOptions).getPassword();
}
List keyPairs = new ArrayList<>();
for (Enumeration it = ks.aliases(); it.hasMoreElements(); ) {
String alias = it.nextElement();
Key key = ks.getKey(alias, kpPassword.toCharArray());
if (key instanceof PrivateKey) {
Certificate cert = ks.getCertificate(alias);
PublicKey publicKey = cert.getPublicKey();
keyPairs.add(new KeyPair(publicKey, (PrivateKey) key));
}
}
KeyPairProvider provider = new AbstractKeyPairProvider() {
@Override
public Iterable loadKeys() {
return keyPairs;
}
};
Buffer inputrc = Helper.loadResource(vertx.fileSystem(), options.getIntputrc());
if (inputrc == null) {
throw new VertxException("Could not load inputrc from " + options.getIntputrc());
}
Keymap keymap = new Keymap(new ByteArrayInputStream(inputrc.getBytes()));
TermConnectionHandler connectionHandler = new TermConnectionHandler(vertx, keymap, termHandler);
nativeServer = SshServer.setUpDefaultServer();
nativeServer.setShellFactory(() -> new TtyCommand(defaultCharset, connectionHandler::handle));
Handler execHandler = this.execHandler;
if (execHandler != null) {
nativeServer.setCommandFactory(command -> new TtyCommand(defaultCharset, conn -> {
execHandler.handle(new SSHExec(command, conn));
}));
}
nativeServer.setHost(options.getHost());
nativeServer.setPort(options.getPort());
nativeServer.setKeyPairProvider(provider);
nativeServer.setIoServiceFactoryFactory(new NettyIoServiceFactoryFactory(listenContext.nettyEventLoop(), new VertxIoHandlerBridge(listenContext)));
nativeServer.setServiceFactories(Arrays.asList(ServerConnectionServiceFactory.INSTANCE, AsyncUserAuthServiceFactory.INSTANCE));
//
if (authProvider == null) {
throw new VertxException("No authenticator");
}
nativeServer.setPasswordAuthenticator((username, userpass, session) -> {
AsyncAuth auth = new AsyncAuth();
listenContext.runOnContext(v -> {
authProvider.authenticate(new JsonObject().put("username", username).put("password", userpass), ar -> {
auth.setAuthed(ar.succeeded());
});
});
throw auth;
});
//
nativeServer.start();
status.set(STATUS_STARTED);
fut.complete();
} catch (Exception e) {
status.set(STATUS_STOPPED);
fut.fail(e);
}
}, listenHandler);
return this;
}
@Override
public int actualPort() {
return nativeServer.getPort();
}
public void close(Handler> completionHandler) {
if (!status.compareAndSet(STATUS_STARTED, STATUS_STOPPING)) {
completionHandler.handle(Future.failedFuture("Invalid state:" + status.get()));
return;
}
vertx.executeBlocking(fut-> {
try {
SshServer server = this.nativeServer;
this.nativeServer = null;
server.close();
completionHandler.handle(Future.succeededFuture());
} catch (Exception t) {
completionHandler.handle(Future.failedFuture(t));
} finally {
status.set(STATUS_STOPPED);
}
}, completionHandler);
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy