| Tim Windelschmidt | 6d33a43 | 2025-02-04 14:34:25 +0100 | [diff] [blame] | 1 | // Copyright The Monogon Project Authors. |
| 2 | // SPDX-License-Identifier: Apache-2.0 |
| 3 | |
| Tim Windelschmidt | 7a1b27d | 2024-02-22 23:54:58 +0100 | [diff] [blame] | 4 | package main |
| 5 | |
| 6 | import ( |
| 7 | "context" |
| 8 | _ "embed" |
| 9 | "fmt" |
| 10 | "log" |
| 11 | "net" |
| 12 | "net/netip" |
| 13 | "os" |
| 14 | "os/signal" |
| 15 | "strings" |
| 16 | "syscall" |
| 17 | "time" |
| 18 | |
| 19 | "github.com/schollz/progressbar/v3" |
| 20 | "github.com/spf13/cobra" |
| 21 | xssh "golang.org/x/crypto/ssh" |
| 22 | "golang.org/x/crypto/ssh/agent" |
| Tim Windelschmidt | 7a1b27d | 2024-02-22 23:54:58 +0100 | [diff] [blame] | 23 | "golang.org/x/term" |
| 24 | "google.golang.org/protobuf/proto" |
| 25 | |
| 26 | "source.monogon.dev/go/net/ssh" |
| 27 | "source.monogon.dev/osbase/fat32" |
| 28 | ) |
| 29 | |
| 30 | var sshCmd = &cobra.Command{ |
| 31 | Use: "ssh --disk=<disk> <target>", |
| 32 | Short: "Installs Metropolis on a Linux system accessible via SSH.", |
| 33 | Example: "metroctl install --bundle=metropolis-v0.1.zip --takeover=takeover ssh --disk=nvme0n1 root@ssh-enabled-server.example", |
| 34 | Args: cobra.ExactArgs(1), // One positional argument: the target |
| Tim Windelschmidt | 0b4fb8c | 2024-09-18 17:34:23 +0200 | [diff] [blame] | 35 | RunE: func(cmd *cobra.Command, args []string) error { |
| 36 | user, address, err := parseSSHAddr(args[0]) |
| 37 | if err != nil { |
| 38 | return err |
| 39 | } |
| 40 | |
| 41 | diskName, err := cmd.Flags().GetString("disk") |
| 42 | if err != nil { |
| 43 | return err |
| 44 | } |
| 45 | |
| 46 | if len(diskName) == 0 { |
| 47 | return fmt.Errorf("flag disk is required") |
| 48 | } |
| 49 | |
| 50 | var authMethods []xssh.AuthMethod |
| 51 | if aconn, err := net.Dial("unix", os.Getenv("SSH_AUTH_SOCK")); err == nil { |
| 52 | defer aconn.Close() |
| 53 | a := agent.NewClient(aconn) |
| 54 | authMethods = append(authMethods, xssh.PublicKeysCallback(a.Signers)) |
| 55 | } else { |
| 56 | log.Printf("error while establishing ssh agent connection: %v", err) |
| 57 | log.Println("ssh agent authentication will not be available.") |
| 58 | } |
| 59 | |
| Timon Stampfli | d7c8bbb | 2024-12-15 17:26:35 +0100 | [diff] [blame] | 60 | // On Windows syscall.Stdin is a handle and needs to be cast to an |
| 61 | // int for term. |
| 62 | stdin := int(syscall.Stdin) // nolint:unconvert |
| 63 | if term.IsTerminal(stdin) { |
| Tim Windelschmidt | 0b4fb8c | 2024-09-18 17:34:23 +0200 | [diff] [blame] | 64 | authMethods = append(authMethods, |
| 65 | xssh.PasswordCallback(func() (string, error) { |
| 66 | fmt.Printf("%s@%s's password: ", user, address) |
| Timon Stampfli | d7c8bbb | 2024-12-15 17:26:35 +0100 | [diff] [blame] | 67 | b, err := term.ReadPassword(stdin) |
| Tim Windelschmidt | 0b4fb8c | 2024-09-18 17:34:23 +0200 | [diff] [blame] | 68 | if err != nil { |
| 69 | return "", err |
| 70 | } |
| 71 | fmt.Println() |
| 72 | return string(b), nil |
| 73 | }), |
| 74 | xssh.KeyboardInteractive(func(name, instruction string, questions []string, echos []bool) ([]string, error) { |
| 75 | answers := make([]string, 0, len(questions)) |
| 76 | for i, q := range questions { |
| 77 | fmt.Print(q) |
| 78 | if echos[i] { |
| 79 | if _, err := fmt.Scan(&questions[i]); err != nil { |
| 80 | return nil, err |
| 81 | } |
| 82 | } else { |
| Timon Stampfli | d7c8bbb | 2024-12-15 17:26:35 +0100 | [diff] [blame] | 83 | b, err := term.ReadPassword(stdin) |
| Tim Windelschmidt | 0b4fb8c | 2024-09-18 17:34:23 +0200 | [diff] [blame] | 84 | if err != nil { |
| 85 | return nil, err |
| 86 | } |
| 87 | fmt.Println() |
| 88 | answers = append(answers, string(b)) |
| 89 | } |
| 90 | } |
| 91 | return answers, nil |
| 92 | }), |
| 93 | ) |
| 94 | } else { |
| 95 | log.Println("stdin is not interactive. password authentication will not be available.") |
| 96 | } |
| 97 | |
| 98 | cl := ssh.DirectClient{ |
| 99 | Username: user, |
| 100 | AuthMethods: authMethods, |
| 101 | } |
| 102 | |
| 103 | ctx, _ := signal.NotifyContext(context.Background(), os.Interrupt) |
| 104 | conn, err := cl.Dial(ctx, address, 5*time.Second) |
| 105 | if err != nil { |
| 106 | return fmt.Errorf("error while establishing ssh connection: %w", err) |
| 107 | } |
| 108 | |
| 109 | params, err := makeNodeParams() |
| 110 | if err != nil { |
| 111 | return err |
| 112 | } |
| 113 | rawParams, err := proto.Marshal(params) |
| 114 | if err != nil { |
| 115 | return fmt.Errorf("error while marshaling node params: %w", err) |
| 116 | } |
| 117 | |
| 118 | const takeoverTargetPath = "/root/takeover" |
| 119 | const bundleTargetPath = "/root/bundle.zip" |
| 120 | bundle, err := external("bundle", "_main/metropolis/node/bundle.zip", bundlePath) |
| 121 | if err != nil { |
| 122 | return err |
| 123 | } |
| Jan Schär | f07d1b3 | 2025-03-24 18:36:06 +0000 | [diff] [blame] | 124 | takeoverPath, err := cmd.Flags().GetString("takeover") |
| 125 | if err != nil { |
| 126 | return err |
| 127 | } |
| 128 | takeover, err := external("takeover", "_main/metropolis/cli/takeover/takeover_bin_/takeover_bin", &takeoverPath) |
| Tim Windelschmidt | 0b4fb8c | 2024-09-18 17:34:23 +0200 | [diff] [blame] | 129 | if err != nil { |
| 130 | return err |
| 131 | } |
| 132 | |
| 133 | barUploader := func(r fat32.SizedReader, targetPath string) { |
| 134 | bar := progressbar.DefaultBytes( |
| 135 | r.Size(), |
| 136 | targetPath, |
| 137 | ) |
| 138 | defer bar.Close() |
| 139 | |
| 140 | proxyReader := progressbar.NewReader(r, bar) |
| 141 | defer proxyReader.Close() |
| 142 | |
| 143 | if err := conn.Upload(ctx, targetPath, &proxyReader); err != nil { |
| 144 | log.Fatalf("error while uploading %q: %v", targetPath, err) |
| 145 | } |
| 146 | } |
| 147 | |
| 148 | log.Println("Uploading required binaries to target host.") |
| 149 | barUploader(takeover, takeoverTargetPath) |
| 150 | barUploader(bundle, bundleTargetPath) |
| 151 | |
| 152 | // Start the agent and wait for the agent's output to arrive. |
| 153 | log.Printf("Starting the takeover executable at path %q.", takeoverTargetPath) |
| 154 | _, stderr, err := conn.Execute(ctx, fmt.Sprintf("%s -disk %s", takeoverTargetPath, diskName), rawParams) |
| 155 | stderrStr := strings.TrimSpace(string(stderr)) |
| 156 | if stderrStr != "" { |
| 157 | log.Printf("Agent stderr: %q", stderrStr) |
| 158 | } |
| 159 | if err != nil { |
| 160 | return fmt.Errorf("while starting the takeover executable: %w", err) |
| 161 | } |
| 162 | |
| 163 | return nil |
| 164 | }, |
| Tim Windelschmidt | 7a1b27d | 2024-02-22 23:54:58 +0100 | [diff] [blame] | 165 | } |
| 166 | |
| 167 | func parseAddrOptionalPort(addr string) (string, string, error) { |
| 168 | if addr == "" { |
| 169 | return "", "", fmt.Errorf("address is empty") |
| 170 | } |
| 171 | |
| 172 | idx := strings.LastIndex(addr, ":") |
| 173 | // IPv4, DNS without Port. |
| 174 | if idx == -1 { |
| 175 | return addr, "", nil |
| 176 | } |
| 177 | |
| 178 | // IPv4, DNS with Port. |
| 179 | if strings.Count(addr, ":") == 1 { |
| 180 | return addr[:idx], addr[idx+1:], nil |
| 181 | } |
| 182 | |
| 183 | // IPv6 with Port. |
| 184 | if addrPort, err := netip.ParseAddrPort(addr); err == nil { |
| 185 | return addrPort.Addr().String(), fmt.Sprintf("%d", addrPort.Port()), nil |
| 186 | } |
| 187 | |
| 188 | // IPv6 without Port. |
| 189 | if addr, err := netip.ParseAddr(addr); err == nil { |
| 190 | return addr.String(), "", nil |
| 191 | } |
| 192 | |
| 193 | return "", "", fmt.Errorf("failed to parse address: %q", addr) |
| 194 | } |
| 195 | |
| 196 | func parseSSHAddr(s string) (string, string, error) { |
| 197 | user, rawAddr, ok := strings.Cut(s, "@") |
| 198 | if !ok { |
| 199 | return "", "", fmt.Errorf("SSH user is mandatory") |
| 200 | } |
| 201 | |
| 202 | addr, port, err := parseAddrOptionalPort(rawAddr) |
| 203 | if err != nil { |
| 204 | return "", "", err |
| 205 | } |
| 206 | if port == "" { |
| 207 | port = "22" |
| 208 | } |
| 209 | |
| 210 | return user, net.JoinHostPort(addr, port), nil |
| 211 | } |
| 212 | |
| Tim Windelschmidt | 7a1b27d | 2024-02-22 23:54:58 +0100 | [diff] [blame] | 213 | func init() { |
| 214 | sshCmd.Flags().String("disk", "", "Which disk Metropolis should be installed to") |
| 215 | sshCmd.Flags().String("takeover", "", "Path to the Metropolis takeover binary") |
| 216 | |
| 217 | installCmd.AddCommand(sshCmd) |
| 218 | } |