mirror of
https://github.com/containers/podman.git
synced 2025-06-25 12:20:42 +08:00
Merge pull request #8676 from jwhonce/issues/7806
Refine public key usage when remote
This commit is contained in:
@ -168,19 +168,17 @@ func getUserInfo(uri *url.URL) (*url.Userinfo, error) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
func getUDS(cmd *cobra.Command, uri *url.URL) (string, error) {
|
func getUDS(cmd *cobra.Command, uri *url.URL) (string, error) {
|
||||||
var authMethods []ssh.AuthMethod
|
var signers []ssh.Signer
|
||||||
passwd, set := uri.User.Password()
|
|
||||||
if set {
|
|
||||||
authMethods = append(authMethods, ssh.Password(passwd))
|
|
||||||
}
|
|
||||||
|
|
||||||
|
passwd, passwdSet := uri.User.Password()
|
||||||
if cmd.Flags().Changed("identity") {
|
if cmd.Flags().Changed("identity") {
|
||||||
value := cmd.Flag("identity").Value.String()
|
value := cmd.Flag("identity").Value.String()
|
||||||
auth, err := terminal.PublicKey(value, []byte(passwd))
|
s, err := terminal.PublicKey(value, []byte(passwd))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", errors.Wrapf(err, "failed to read identity %q", value)
|
return "", errors.Wrapf(err, "failed to read identity %q", value)
|
||||||
}
|
}
|
||||||
authMethods = append(authMethods, auth)
|
signers = append(signers, s)
|
||||||
|
logrus.Debugf("SSH Ident Key %q %s %s", value, ssh.FingerprintSHA256(s.PublicKey()), s.PublicKey().Type())
|
||||||
}
|
}
|
||||||
|
|
||||||
if sock, found := os.LookupEnv("SSH_AUTH_SOCK"); found {
|
if sock, found := os.LookupEnv("SSH_AUTH_SOCK"); found {
|
||||||
@ -190,16 +188,51 @@ func getUDS(cmd *cobra.Command, uri *url.URL) (string, error) {
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
a := agent.NewClient(c)
|
agentSigners, err := agent.NewClient(c).Signers()
|
||||||
authMethods = append(authMethods, ssh.PublicKeysCallback(a.Signers))
|
|
||||||
}
|
|
||||||
|
|
||||||
if len(authMethods) == 0 {
|
|
||||||
pass, err := terminal.ReadPassword(fmt.Sprintf("%s's login password:", uri.User.Username()))
|
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", err
|
return "", err
|
||||||
}
|
}
|
||||||
authMethods = append(authMethods, ssh.Password(string(pass)))
|
|
||||||
|
signers = append(signers, agentSigners...)
|
||||||
|
|
||||||
|
if logrus.IsLevelEnabled(logrus.DebugLevel) {
|
||||||
|
for _, s := range agentSigners {
|
||||||
|
logrus.Debugf("SSH Agent Key %s %s", ssh.FingerprintSHA256(s.PublicKey()), s.PublicKey().Type())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var authMethods []ssh.AuthMethod
|
||||||
|
if len(signers) > 0 {
|
||||||
|
var dedup = make(map[string]ssh.Signer)
|
||||||
|
// Dedup signers based on fingerprint, ssh-agent keys override CONTAINER_SSHKEY
|
||||||
|
for _, s := range signers {
|
||||||
|
fp := ssh.FingerprintSHA256(s.PublicKey())
|
||||||
|
if _, found := dedup[fp]; found {
|
||||||
|
logrus.Debugf("Dedup SSH Key %s %s", ssh.FingerprintSHA256(s.PublicKey()), s.PublicKey().Type())
|
||||||
|
}
|
||||||
|
dedup[fp] = s
|
||||||
|
}
|
||||||
|
|
||||||
|
var uniq []ssh.Signer
|
||||||
|
for _, s := range dedup {
|
||||||
|
uniq = append(uniq, s)
|
||||||
|
}
|
||||||
|
|
||||||
|
authMethods = append(authMethods, ssh.PublicKeysCallback(func() ([]ssh.Signer, error) {
|
||||||
|
return uniq, nil
|
||||||
|
}))
|
||||||
|
}
|
||||||
|
|
||||||
|
if passwdSet {
|
||||||
|
authMethods = append(authMethods, ssh.Password(passwd))
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(authMethods) == 0 {
|
||||||
|
authMethods = append(authMethods, ssh.PasswordCallback(func() (string, error) {
|
||||||
|
pass, err := terminal.ReadPassword(fmt.Sprintf("%s's login password:", uri.User.Username()))
|
||||||
|
return string(pass), err
|
||||||
|
}))
|
||||||
}
|
}
|
||||||
|
|
||||||
cfg := &ssh.ClientConfig{
|
cfg := &ssh.ClientConfig{
|
||||||
|
@ -182,30 +182,65 @@ func pingNewConnection(ctx context.Context) error {
|
|||||||
func sshClient(_url *url.URL, secure bool, passPhrase string, identity string) (Connection, error) {
|
func sshClient(_url *url.URL, secure bool, passPhrase string, identity string) (Connection, error) {
|
||||||
// if you modify the authmethods or their conditionals, you will also need to make similar
|
// if you modify the authmethods or their conditionals, you will also need to make similar
|
||||||
// changes in the client (currently cmd/podman/system/connection/add getUDS).
|
// changes in the client (currently cmd/podman/system/connection/add getUDS).
|
||||||
authMethods := []ssh.AuthMethod{}
|
|
||||||
|
var signers []ssh.Signer // order Signers are appended to this list determines which key is presented to server
|
||||||
|
|
||||||
if len(identity) > 0 {
|
if len(identity) > 0 {
|
||||||
auth, err := terminal.PublicKey(identity, []byte(passPhrase))
|
s, err := terminal.PublicKey(identity, []byte(passPhrase))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return Connection{}, errors.Wrapf(err, "failed to parse identity %q", identity)
|
return Connection{}, errors.Wrapf(err, "failed to parse identity %q", identity)
|
||||||
}
|
}
|
||||||
logrus.Debugf("public key signer enabled for identity %q", identity)
|
|
||||||
authMethods = append(authMethods, auth)
|
signers = append(signers, s)
|
||||||
|
logrus.Debugf("SSH Ident Key %q %s %s", identity, ssh.FingerprintSHA256(s.PublicKey()), s.PublicKey().Type())
|
||||||
}
|
}
|
||||||
|
|
||||||
if sock, found := os.LookupEnv("SSH_AUTH_SOCK"); found {
|
if sock, found := os.LookupEnv("SSH_AUTH_SOCK"); found {
|
||||||
logrus.Debugf("Found SSH_AUTH_SOCK %q, ssh-agent signer enabled", sock)
|
logrus.Debugf("Found SSH_AUTH_SOCK %q, ssh-agent signer(s) enabled", sock)
|
||||||
|
|
||||||
c, err := net.Dial("unix", sock)
|
c, err := net.Dial("unix", sock)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return Connection{}, err
|
return Connection{}, err
|
||||||
}
|
}
|
||||||
a := agent.NewClient(c)
|
|
||||||
authMethods = append(authMethods, ssh.PublicKeysCallback(a.Signers))
|
agentSigners, err := agent.NewClient(c).Signers()
|
||||||
|
if err != nil {
|
||||||
|
return Connection{}, err
|
||||||
|
}
|
||||||
|
signers = append(signers, agentSigners...)
|
||||||
|
|
||||||
|
if logrus.IsLevelEnabled(logrus.DebugLevel) {
|
||||||
|
for _, s := range agentSigners {
|
||||||
|
logrus.Debugf("SSH Agent Key %s %s", ssh.FingerprintSHA256(s.PublicKey()), s.PublicKey().Type())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var authMethods []ssh.AuthMethod
|
||||||
|
if len(signers) > 0 {
|
||||||
|
var dedup = make(map[string]ssh.Signer)
|
||||||
|
// Dedup signers based on fingerprint, ssh-agent keys override CONTAINER_SSHKEY
|
||||||
|
for _, s := range signers {
|
||||||
|
fp := ssh.FingerprintSHA256(s.PublicKey())
|
||||||
|
if _, found := dedup[fp]; found {
|
||||||
|
logrus.Debugf("Dedup SSH Key %s %s", ssh.FingerprintSHA256(s.PublicKey()), s.PublicKey().Type())
|
||||||
|
}
|
||||||
|
dedup[fp] = s
|
||||||
|
}
|
||||||
|
|
||||||
|
var uniq []ssh.Signer
|
||||||
|
for _, s := range dedup {
|
||||||
|
uniq = append(uniq, s)
|
||||||
|
}
|
||||||
|
authMethods = append(authMethods, ssh.PublicKeysCallback(func() ([]ssh.Signer, error) {
|
||||||
|
return uniq, nil
|
||||||
|
}))
|
||||||
}
|
}
|
||||||
|
|
||||||
if pw, found := _url.User.Password(); found {
|
if pw, found := _url.User.Password(); found {
|
||||||
authMethods = append(authMethods, ssh.Password(pw))
|
authMethods = append(authMethods, ssh.Password(pw))
|
||||||
}
|
}
|
||||||
|
|
||||||
if len(authMethods) == 0 {
|
if len(authMethods) == 0 {
|
||||||
callback := func() (string, error) {
|
callback := func() (string, error) {
|
||||||
pass, err := terminal.ReadPassword("Login password:")
|
pass, err := terminal.ReadPassword("Login password:")
|
||||||
|
@ -5,18 +5,38 @@ package infra
|
|||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
"fmt"
|
"fmt"
|
||||||
|
"sync"
|
||||||
|
|
||||||
"github.com/containers/podman/v2/pkg/bindings"
|
"github.com/containers/podman/v2/pkg/bindings"
|
||||||
"github.com/containers/podman/v2/pkg/domain/entities"
|
"github.com/containers/podman/v2/pkg/domain/entities"
|
||||||
"github.com/containers/podman/v2/pkg/domain/infra/tunnel"
|
"github.com/containers/podman/v2/pkg/domain/infra/tunnel"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
var (
|
||||||
|
connectionMutex = &sync.Mutex{}
|
||||||
|
connection *context.Context
|
||||||
|
)
|
||||||
|
|
||||||
|
func newConnection(uri string, identity string) (context.Context, error) {
|
||||||
|
connectionMutex.Lock()
|
||||||
|
defer connectionMutex.Unlock()
|
||||||
|
|
||||||
|
if connection == nil {
|
||||||
|
ctx, err := bindings.NewConnectionWithIdentity(context.Background(), uri, identity)
|
||||||
|
if err != nil {
|
||||||
|
return ctx, err
|
||||||
|
}
|
||||||
|
connection = &ctx
|
||||||
|
}
|
||||||
|
return *connection, nil
|
||||||
|
}
|
||||||
|
|
||||||
func NewContainerEngine(facts *entities.PodmanConfig) (entities.ContainerEngine, error) {
|
func NewContainerEngine(facts *entities.PodmanConfig) (entities.ContainerEngine, error) {
|
||||||
switch facts.EngineMode {
|
switch facts.EngineMode {
|
||||||
case entities.ABIMode:
|
case entities.ABIMode:
|
||||||
return nil, fmt.Errorf("direct runtime not supported")
|
return nil, fmt.Errorf("direct runtime not supported")
|
||||||
case entities.TunnelMode:
|
case entities.TunnelMode:
|
||||||
ctx, err := bindings.NewConnectionWithIdentity(context.Background(), facts.URI, facts.Identity)
|
ctx, err := newConnection(facts.URI, facts.Identity)
|
||||||
return &tunnel.ContainerEngine{ClientCxt: ctx}, err
|
return &tunnel.ContainerEngine{ClientCxt: ctx}, err
|
||||||
}
|
}
|
||||||
return nil, fmt.Errorf("runtime mode '%v' is not supported", facts.EngineMode)
|
return nil, fmt.Errorf("runtime mode '%v' is not supported", facts.EngineMode)
|
||||||
@ -28,7 +48,7 @@ func NewImageEngine(facts *entities.PodmanConfig) (entities.ImageEngine, error)
|
|||||||
case entities.ABIMode:
|
case entities.ABIMode:
|
||||||
return nil, fmt.Errorf("direct image runtime not supported")
|
return nil, fmt.Errorf("direct image runtime not supported")
|
||||||
case entities.TunnelMode:
|
case entities.TunnelMode:
|
||||||
ctx, err := bindings.NewConnectionWithIdentity(context.Background(), facts.URI, facts.Identity)
|
ctx, err := newConnection(facts.URI, facts.Identity)
|
||||||
return &tunnel.ImageEngine{ClientCxt: ctx}, err
|
return &tunnel.ImageEngine{ClientCxt: ctx}, err
|
||||||
}
|
}
|
||||||
return nil, fmt.Errorf("runtime mode '%v' is not supported", facts.EngineMode)
|
return nil, fmt.Errorf("runtime mode '%v' is not supported", facts.EngineMode)
|
||||||
|
@ -61,7 +61,7 @@ func ReadPassword(prompt string) (pw []byte, err error) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
func PublicKey(path string, passphrase []byte) (ssh.AuthMethod, error) {
|
func PublicKey(path string, passphrase []byte) (ssh.Signer, error) {
|
||||||
key, err := ioutil.ReadFile(path)
|
key, err := ioutil.ReadFile(path)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, err
|
||||||
@ -75,12 +75,9 @@ func PublicKey(path string, passphrase []byte) (ssh.AuthMethod, error) {
|
|||||||
if len(passphrase) == 0 {
|
if len(passphrase) == 0 {
|
||||||
passphrase = ReadPassphrase()
|
passphrase = ReadPassphrase()
|
||||||
}
|
}
|
||||||
signer, err = ssh.ParsePrivateKeyWithPassphrase(key, passphrase)
|
return ssh.ParsePrivateKeyWithPassphrase(key, passphrase)
|
||||||
if err != nil {
|
|
||||||
return nil, err
|
|
||||||
}
|
}
|
||||||
}
|
return signer, nil
|
||||||
return ssh.PublicKeys(signer), nil
|
|
||||||
}
|
}
|
||||||
|
|
||||||
func ReadPassphrase() []byte {
|
func ReadPassphrase() []byte {
|
||||||
|
Reference in New Issue
Block a user