mirror of
https://github.com/moul/sshportal.git
synced 2024-11-15 12:46:17 +08:00
1872 lines
55 KiB
Go
1872 lines
55 KiB
Go
package main
|
|
|
|
import (
|
|
"bufio"
|
|
"encoding/json"
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
"runtime"
|
|
"strings"
|
|
"time"
|
|
|
|
shlex "github.com/anmitsu/go-shlex"
|
|
"github.com/asaskevich/govalidator"
|
|
humanize "github.com/dustin/go-humanize"
|
|
"github.com/gliderlabs/ssh"
|
|
"github.com/jinzhu/gorm"
|
|
"github.com/moby/moby/pkg/namesgenerator"
|
|
"github.com/olekukonko/tablewriter"
|
|
"github.com/urfave/cli"
|
|
"golang.org/x/crypto/ssh/terminal"
|
|
)
|
|
|
|
var banner = `
|
|
|
|
__________ _____ __ __
|
|
/ __/ __/ // / _ \___ ____/ /____ _/ /
|
|
_\ \_\ \/ _ / ___/ _ \/ __/ __/ _ '/ /
|
|
/___/___/_//_/_/ \___/_/ \__/\_,_/_/
|
|
|
|
|
|
`
|
|
var startTime = time.Now()
|
|
|
|
func shell(globalContext *cli.Context, s ssh.Session, sshCommand []string, db *gorm.DB) error {
|
|
if len(sshCommand) == 0 {
|
|
if _, err := fmt.Fprint(s, banner); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
cli.AppHelpTemplate = `COMMANDS:
|
|
{{range .Commands}}{{if not .HideHelp}} {{join .Names ", "}}{{ "\t"}}{{.Usage}}{{ "\n" }}{{end}}{{end}}{{if .VisibleFlags}}
|
|
GLOBAL OPTIONS:
|
|
{{range .VisibleFlags}}{{.}}
|
|
{{end}}{{end}}
|
|
`
|
|
cli.OsExiter = func(c int) {}
|
|
cli.HelpFlag = cli.BoolFlag{
|
|
Name: "help, h",
|
|
Hidden: true,
|
|
}
|
|
app := cli.NewApp()
|
|
app.Writer = s
|
|
app.HideVersion = true
|
|
|
|
myself := s.Context().Value(userContextKey).(User)
|
|
app.Commands = []cli.Command{
|
|
{
|
|
Name: "acl",
|
|
Usage: "Manages ACLs",
|
|
Subcommands: []cli.Command{
|
|
{
|
|
Name: "create",
|
|
Usage: "Creates a new ACL",
|
|
Description: "$> acl create -",
|
|
Flags: []cli.Flag{
|
|
cli.StringSliceFlag{Name: "hostgroup, hg", Usage: "Assigns `HOSTGROUPS` to the acl"},
|
|
cli.StringSliceFlag{Name: "usergroup, ug", Usage: "Assigns `HOSTGROUPS` to the acl"},
|
|
cli.StringFlag{Name: "pattern", Usage: "Assigns a host pattern to the acl"},
|
|
cli.StringFlag{Name: "comment", Usage: "Adds a comment"},
|
|
cli.StringFlag{Name: "action", Usage: "Assigns the ACL action (allow,deny)", Value: ACLActionAllow},
|
|
cli.UintFlag{Name: "weight, w", Usage: "Assigns the ACL weight (priority)"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
acl := ACL{
|
|
Comment: c.String("comment"),
|
|
HostPattern: c.String("pattern"),
|
|
UserGroups: []*UserGroup{},
|
|
HostGroups: []*HostGroup{},
|
|
Weight: c.Uint("weight"),
|
|
Action: c.String("action"),
|
|
}
|
|
if acl.Action != ACLActionAllow && acl.Action != ACLActionDeny {
|
|
return fmt.Errorf("invalid action %q, allowed values: allow, deny", acl.Action)
|
|
}
|
|
if _, err := govalidator.ValidateStruct(acl); err != nil {
|
|
return err
|
|
}
|
|
|
|
var userGroups []*UserGroup
|
|
if err := UserGroupsPreload(UserGroupsByIdentifiers(db, c.StringSlice("usergroup"))).Find(&userGroups).Error; err != nil {
|
|
return err
|
|
}
|
|
acl.UserGroups = append(acl.UserGroups, userGroups...)
|
|
var hostGroups []*HostGroup
|
|
if err := HostGroupsPreload(HostGroupsByIdentifiers(db, c.StringSlice("hostgroup"))).Find(&hostGroups).Error; err != nil {
|
|
return err
|
|
}
|
|
acl.HostGroups = append(acl.HostGroups, hostGroups...)
|
|
|
|
if len(acl.UserGroups) == 0 {
|
|
return fmt.Errorf("an ACL must have at least one user group")
|
|
}
|
|
if len(acl.HostGroups) == 0 && acl.HostPattern == "" {
|
|
return fmt.Errorf("an ACL must have at least one host group or host pattern")
|
|
}
|
|
|
|
if err := db.Create(&acl).Error; err != nil {
|
|
return err
|
|
}
|
|
fmt.Fprintf(s, "%d\n", acl.ID)
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "inspect",
|
|
Usage: "Shows detailed information on one or more ACLs",
|
|
ArgsUsage: "ACL...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var acls []ACL
|
|
if err := ACLsPreload(ACLsByIdentifiers(db, c.Args())).Find(&acls).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
enc := json.NewEncoder(s)
|
|
enc.SetIndent("", " ")
|
|
return enc.Encode(acls)
|
|
},
|
|
}, {
|
|
Name: "ls",
|
|
Usage: "Lists ACLs",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "latest, l", Usage: "Show the latest ACL"},
|
|
cli.BoolFlag{Name: "quiet, q", Usage: "Only display IDs"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var acls []*ACL
|
|
query := db.Order("created_at desc").Preload("UserGroups").Preload("HostGroups")
|
|
if c.Bool("latest") {
|
|
var acl ACL
|
|
if err := query.First(&acl).Error; err != nil {
|
|
return err
|
|
}
|
|
acls = append(acls, &acl)
|
|
} else {
|
|
if err := query.Find(&acls).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if c.Bool("quiet") {
|
|
for _, acl := range acls {
|
|
fmt.Fprintln(s, acl.ID)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
table := tablewriter.NewWriter(s)
|
|
table.SetHeader([]string{"ID", "Weight", "User groups", "Host groups", "Host pattern", "Action", "Updated", "Created", "Comment"})
|
|
table.SetBorder(false)
|
|
table.SetCaption(true, fmt.Sprintf("Total: %d ACLs.", len(acls)))
|
|
for _, acl := range acls {
|
|
userGroups := []string{}
|
|
hostGroups := []string{}
|
|
for _, entity := range acl.UserGroups {
|
|
userGroups = append(userGroups, entity.Name)
|
|
}
|
|
for _, entity := range acl.HostGroups {
|
|
hostGroups = append(hostGroups, entity.Name)
|
|
}
|
|
|
|
table.Append([]string{
|
|
fmt.Sprintf("%d", acl.ID),
|
|
fmt.Sprintf("%d", acl.Weight),
|
|
strings.Join(userGroups, ", "),
|
|
strings.Join(hostGroups, ", "),
|
|
acl.HostPattern,
|
|
acl.Action,
|
|
humanize.Time(acl.UpdatedAt),
|
|
humanize.Time(acl.CreatedAt),
|
|
acl.Comment,
|
|
})
|
|
}
|
|
table.Render()
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "rm",
|
|
Usage: "Removes one or more ACLs",
|
|
ArgsUsage: "ACL...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
return ACLsByIdentifiers(db, c.Args()).Delete(&ACL{}).Error
|
|
},
|
|
}, {
|
|
Name: "update",
|
|
Usage: "Updates an existing acl",
|
|
ArgsUsage: "ACL...",
|
|
Flags: []cli.Flag{
|
|
cli.StringFlag{Name: "action, a", Usage: "Update action"},
|
|
cli.StringFlag{Name: "pattern, p", Usage: "Update host-pattern"},
|
|
cli.UintFlag{Name: "weight, w", Usage: "Update weight"},
|
|
cli.StringFlag{Name: "comment, c", Usage: "Update comment"},
|
|
cli.StringSliceFlag{Name: "assign-usergroup, ug", Usage: "Assign the ACL to new `USERGROUPS`"},
|
|
cli.StringSliceFlag{Name: "unassign-usergroup", Usage: "Unassign the ACL from `USERGROUPS`"},
|
|
cli.StringSliceFlag{Name: "assign-hostgroup, hg", Usage: "Assign the ACL to new `HOSTGROUPS`"},
|
|
cli.StringSliceFlag{Name: "unassign-hostgroup", Usage: "Unassign the ACL from `HOSTGROUPS`"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var acls []ACL
|
|
if err := ACLsByIdentifiers(db, c.Args()).Find(&acls).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
tx := db.Begin()
|
|
for _, acl := range acls {
|
|
model := tx.Model(&acl)
|
|
update := ACL{
|
|
Action: c.String("action"),
|
|
HostPattern: c.String("pattern"),
|
|
Weight: c.Uint("weight"),
|
|
Comment: c.String("comment"),
|
|
}
|
|
if err := model.Updates(update).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
|
|
// associations
|
|
var appendUserGroups []UserGroup
|
|
var deleteUserGroups []UserGroup
|
|
if err := UserGroupsByIdentifiers(db, c.StringSlice("assign-usergroup")).Find(&appendUserGroups).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
if err := UserGroupsByIdentifiers(db, c.StringSlice("unassign-usergroup")).Find(&deleteUserGroups).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
if err := model.Association("UserGroups").Append(&appendUserGroups).Delete(deleteUserGroups).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
|
|
var appendHostGroups []HostGroup
|
|
var deleteHostGroups []HostGroup
|
|
if err := HostGroupsByIdentifiers(db, c.StringSlice("assign-hostgroup")).Find(&appendHostGroups).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
if err := HostGroupsByIdentifiers(db, c.StringSlice("unassign-hostgroup")).Find(&deleteHostGroups).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
if err := model.Association("HostGroups").Append(&appendHostGroups).Delete(deleteHostGroups).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
|
|
return tx.Commit().Error
|
|
},
|
|
},
|
|
},
|
|
}, {
|
|
Name: "config",
|
|
Usage: "Manages global configuration",
|
|
Subcommands: []cli.Command{
|
|
{
|
|
Name: "backup",
|
|
Usage: "Dumps a backup",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "indent", Usage: "uses indented JSON"},
|
|
cli.BoolFlag{Name: "decrypt", Usage: "decrypt sensitive data"},
|
|
},
|
|
Description: "ssh admin@portal config backup > sshportal.bkp",
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
config := Config{}
|
|
if err := HostsPreload(db).Find(&config.Hosts).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := SSHKeysPreload(db).Find(&config.SSHKeys).Error; err != nil {
|
|
return err
|
|
}
|
|
for _, key := range config.SSHKeys {
|
|
SSHKeyDecrypt(globalContext.String("aes-key"), key)
|
|
}
|
|
if !c.Bool("decrypt") {
|
|
for _, key := range config.SSHKeys {
|
|
if err := SSHKeyEncrypt(globalContext.String("aes-key"), key); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
if err := HostsPreload(db).Find(&config.Hosts).Error; err != nil {
|
|
return err
|
|
}
|
|
for _, host := range config.Hosts {
|
|
HostDecrypt(globalContext.String("aes-key"), host)
|
|
}
|
|
if !c.Bool("decrypt") {
|
|
for _, host := range config.Hosts {
|
|
if err := HostEncrypt(globalContext.String("aes-key"), host); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
if err := UserKeysPreload(db).Find(&config.UserKeys).Error; err != nil {
|
|
return err
|
|
}
|
|
if err := UsersPreload(db).Find(&config.Users).Error; err != nil {
|
|
return err
|
|
}
|
|
if err := UserGroupsPreload(db).Find(&config.UserGroups).Error; err != nil {
|
|
return err
|
|
}
|
|
if err := HostGroupsPreload(db).Find(&config.HostGroups).Error; err != nil {
|
|
return err
|
|
}
|
|
if err := ACLsPreload(db).Find(&config.ACLs).Error; err != nil {
|
|
return err
|
|
}
|
|
if err := db.Find(&config.Settings).Error; err != nil {
|
|
return err
|
|
}
|
|
if err := SessionsPreload(db).Find(&config.Sessions).Error; err != nil {
|
|
return err
|
|
}
|
|
if err := EventsPreload(db).Find(&config.Events).Error; err != nil {
|
|
return err
|
|
}
|
|
config.Date = time.Now()
|
|
enc := json.NewEncoder(s)
|
|
if c.Bool("indent") {
|
|
enc.SetIndent("", " ")
|
|
}
|
|
return enc.Encode(config)
|
|
},
|
|
}, {
|
|
Name: "restore",
|
|
Usage: "Restores a backup",
|
|
Description: "ssh admin@portal config restore < sshportal.bkp",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "confirm", Usage: "yes, I want to replace everything with this backup!"},
|
|
cli.BoolFlag{Name: "decrypt", Usage: "do not encrypt sensitive data"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
config := Config{}
|
|
|
|
dec := json.NewDecoder(s)
|
|
if err := dec.Decode(&config); err != nil {
|
|
return err
|
|
}
|
|
|
|
fmt.Fprintf(s, "Loaded backup file (date=%v)\n", config.Date)
|
|
fmt.Fprintf(s, "* %d ACLs\n", len(config.ACLs))
|
|
fmt.Fprintf(s, "* %d HostGroups\n", len(config.HostGroups))
|
|
fmt.Fprintf(s, "* %d Hosts\n", len(config.Hosts))
|
|
fmt.Fprintf(s, "* %d Keys\n", len(config.SSHKeys))
|
|
fmt.Fprintf(s, "* %d UserGroups\n", len(config.UserGroups))
|
|
fmt.Fprintf(s, "* %d Userkeys\n", len(config.UserKeys))
|
|
fmt.Fprintf(s, "* %d Users\n", len(config.Users))
|
|
fmt.Fprintf(s, "* %d Settings\n", len(config.Settings))
|
|
fmt.Fprintf(s, "* %d Sessions\n", len(config.Sessions))
|
|
fmt.Fprintf(s, "* %d Events\n", len(config.Events))
|
|
|
|
if !c.Bool("confirm") {
|
|
fmt.Fprintf(s, "restore will erase and replace everything in the database.\nIf you are ok, add the '--confirm' to the restore command\n")
|
|
return errors.New("")
|
|
}
|
|
|
|
tx := db.Begin()
|
|
|
|
// FIXME: handle different migrations:
|
|
// 1. drop tables
|
|
// 2. apply migrations `1` to `<backup-migration-id>`
|
|
// 3. restore data
|
|
// 4. continues migrations
|
|
|
|
// FIXME: tell the administrator to restart the server
|
|
// if the master host key changed
|
|
|
|
// FIXME: do everything in a transaction
|
|
tableNames := []string{
|
|
"acls",
|
|
"events",
|
|
"host_group_acls",
|
|
"host_groups",
|
|
"host_host_groups",
|
|
"hosts",
|
|
//"migrations",
|
|
"sessions",
|
|
"settings",
|
|
"ssh_keys",
|
|
"user_group_acls",
|
|
"user_groups",
|
|
"user_keys",
|
|
"user_roles",
|
|
"user_user_groups",
|
|
"user_user_roles",
|
|
"users",
|
|
}
|
|
for _, tableName := range tableNames {
|
|
/* #nosec */
|
|
if err := tx.Exec(fmt.Sprintf("DELETE FROM %s", tableName)).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
for _, host := range config.Hosts {
|
|
HostDecrypt(globalContext.String("aes-key"), host)
|
|
if !c.Bool("decrypt") {
|
|
if err := HostEncrypt(globalContext.String("aes-key"), host); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if err := tx.FirstOrCreate(&host).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
for _, user := range config.Users {
|
|
if err := tx.FirstOrCreate(&user).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
for _, acl := range config.ACLs {
|
|
if err := tx.FirstOrCreate(&acl).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
for _, hostGroup := range config.HostGroups {
|
|
if err := tx.FirstOrCreate(&hostGroup).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
for _, userGroup := range config.UserGroups {
|
|
if err := tx.FirstOrCreate(&userGroup).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
for _, sshKey := range config.SSHKeys {
|
|
SSHKeyDecrypt(globalContext.String("aes-key"), sshKey)
|
|
if !c.Bool("decrypt") {
|
|
if err := SSHKeyEncrypt(globalContext.String("aes-key"), sshKey); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if err := tx.FirstOrCreate(&sshKey).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
for _, userKey := range config.UserKeys {
|
|
if err := tx.FirstOrCreate(&userKey).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
for _, setting := range config.Settings {
|
|
if err := tx.FirstOrCreate(&setting).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
for _, session := range config.Sessions {
|
|
if err := tx.FirstOrCreate(&session).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
for _, event := range config.Events {
|
|
if err := tx.FirstOrCreate(&event).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
|
|
if err := tx.Commit().Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
fmt.Fprintf(s, "Import done.\n")
|
|
return nil
|
|
},
|
|
},
|
|
},
|
|
}, {
|
|
Name: "event",
|
|
Usage: "Manages events",
|
|
Subcommands: []cli.Command{
|
|
{
|
|
Name: "inspect",
|
|
Usage: "Shows detailed information on one or more events",
|
|
ArgsUsage: "EVENT...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var events []*Event
|
|
if err := EventsPreload(EventsByIdentifiers(db, c.Args())).Find(&events).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, event := range events {
|
|
if len(event.Args) > 0 {
|
|
if err := json.Unmarshal(event.Args, &event.ArgsMap); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
enc := json.NewEncoder(s)
|
|
enc.SetIndent("", " ")
|
|
return enc.Encode(events)
|
|
},
|
|
}, {
|
|
Name: "ls",
|
|
Usage: "Lists events",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "latest, l", Usage: "Show the latest event"},
|
|
cli.BoolFlag{Name: "quiet, q", Usage: "Only display IDs"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var events []Event
|
|
query := db.Order("created_at desc").Preload("Author")
|
|
if c.Bool("latest") {
|
|
var event Event
|
|
if err := query.First(&event).Error; err != nil {
|
|
return err
|
|
}
|
|
events = append(events, event)
|
|
} else {
|
|
if err := query.Find(&events).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if c.Bool("quiet") {
|
|
for _, event := range events {
|
|
fmt.Fprintln(s, event.ID)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
table := tablewriter.NewWriter(s)
|
|
table.SetHeader([]string{"ID", "Author", "Domain", "Action", "Entity", "Args", "Date"})
|
|
table.SetBorder(false)
|
|
table.SetCaption(true, fmt.Sprintf("Total: %d events.", len(events)))
|
|
for _, event := range events {
|
|
author := ""
|
|
if event.Author != nil {
|
|
author = event.Author.Name
|
|
}
|
|
table.Append([]string{
|
|
fmt.Sprintf("%d", event.ID),
|
|
author,
|
|
event.Domain,
|
|
event.Action,
|
|
event.Entity,
|
|
wrapText(string(event.Args), 30),
|
|
humanize.Time(event.CreatedAt),
|
|
})
|
|
}
|
|
table.Render()
|
|
return nil
|
|
},
|
|
},
|
|
},
|
|
}, {
|
|
Name: "host",
|
|
Usage: "Manages hosts",
|
|
Subcommands: []cli.Command{
|
|
{
|
|
Name: "create",
|
|
Usage: "Creates a new host",
|
|
ArgsUsage: "<user>[:<password>]@<host>[:<port>]",
|
|
Description: "$> host create bart@foo.org\n $> host create bob:marley@example.com:2222",
|
|
Flags: []cli.Flag{
|
|
cli.StringFlag{Name: "name, n", Usage: "Assigns a name to the host"},
|
|
cli.StringFlag{Name: "password, p", Usage: "If present, sshportal will use password-based authentication"},
|
|
cli.StringFlag{Name: "comment, c"},
|
|
cli.StringFlag{Name: "key, k", Usage: "`KEY` to use for authentication"},
|
|
cli.StringSliceFlag{Name: "group, g", Usage: "Assigns the host to `HOSTGROUPS` (default: \"default\")"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() != 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
host, err := NewHostFromURL(c.Args().First())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if c.String("password") != "" {
|
|
host.Password = c.String("password")
|
|
}
|
|
host.Name = strings.Split(host.Hostname(), ".")[0]
|
|
|
|
if c.String("name") != "" {
|
|
host.Name = c.String("name")
|
|
}
|
|
// FIXME: check if name already exists
|
|
host.Comment = c.String("comment")
|
|
|
|
if _, err := govalidator.ValidateStruct(host); err != nil {
|
|
return err
|
|
}
|
|
|
|
inputKey := c.String("key")
|
|
if inputKey == "" && host.Password == "" {
|
|
inputKey = "default"
|
|
}
|
|
if inputKey != "" {
|
|
var key SSHKey
|
|
if err := SSHKeysByIdentifiers(db, []string{inputKey}).First(&key).Error; err != nil {
|
|
return err
|
|
}
|
|
host.SSHKeyID = key.ID
|
|
}
|
|
|
|
// host group
|
|
inputGroups := c.StringSlice("group")
|
|
if len(inputGroups) == 0 {
|
|
inputGroups = []string{"default"}
|
|
}
|
|
if err := HostGroupsByIdentifiers(db, inputGroups).Find(&host.Groups).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
// encrypt
|
|
if err := HostEncrypt(globalContext.String("aes-key"), host); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := db.Create(&host).Error; err != nil {
|
|
return err
|
|
}
|
|
fmt.Fprintf(s, "%d\n", host.ID)
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "inspect",
|
|
Usage: "Shows detailed information on one or more hosts",
|
|
ArgsUsage: "HOST...",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "decrypt", Usage: "Decrypt sensitive data"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin", "listhosts"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var hosts []*Host
|
|
db = db.Preload("Groups")
|
|
if UserHasRole(myself, "admin") {
|
|
db = db.Preload("SSHKey")
|
|
}
|
|
if err := HostsByIdentifiers(db, c.Args()).Find(&hosts).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
if c.Bool("decrypt") {
|
|
for _, host := range hosts {
|
|
HostDecrypt(globalContext.String("aes-keuy"), host)
|
|
}
|
|
}
|
|
|
|
enc := json.NewEncoder(s)
|
|
enc.SetIndent("", " ")
|
|
return enc.Encode(hosts)
|
|
},
|
|
}, {
|
|
Name: "ls",
|
|
Usage: "Lists hosts",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "latest, l", Usage: "Show the latest host"},
|
|
cli.BoolFlag{Name: "quiet, q", Usage: "Only display IDs"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin", "listhosts"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var hosts []*Host
|
|
query := db.Order("created_at desc").Preload("Groups")
|
|
if c.Bool("latest") {
|
|
var host Host
|
|
if err := query.First(&host).Error; err != nil {
|
|
return err
|
|
}
|
|
hosts = append(hosts, &host)
|
|
} else {
|
|
if err := query.Find(&hosts).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if c.Bool("quiet") {
|
|
for _, host := range hosts {
|
|
fmt.Fprintln(s, host.ID)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
table := tablewriter.NewWriter(s)
|
|
table.SetHeader([]string{"ID", "Name", "URL", "Key", "Pass", "Groups", "Updated", "Created", "Comment"})
|
|
table.SetBorder(false)
|
|
table.SetCaption(true, fmt.Sprintf("Total: %d hosts.", len(hosts)))
|
|
for _, host := range hosts {
|
|
authKey, authPass := "", ""
|
|
if host.Password != "" {
|
|
authPass = "yes"
|
|
}
|
|
if host.SSHKeyID > 0 {
|
|
var key SSHKey
|
|
db.Model(&host).Related(&key)
|
|
authKey = key.Name
|
|
}
|
|
groupNames := []string{}
|
|
for _, hostGroup := range host.Groups {
|
|
groupNames = append(groupNames, hostGroup.Name)
|
|
}
|
|
table.Append([]string{
|
|
fmt.Sprintf("%d", host.ID),
|
|
host.Name,
|
|
host.URL(),
|
|
authKey,
|
|
authPass,
|
|
strings.Join(groupNames, ", "),
|
|
humanize.Time(host.UpdatedAt),
|
|
humanize.Time(host.CreatedAt),
|
|
host.Comment,
|
|
//FIXME: add some stats about last access time etc
|
|
})
|
|
}
|
|
table.Render()
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "rm",
|
|
Usage: "Removes one or more hosts",
|
|
ArgsUsage: "HOST...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
return HostsByIdentifiers(db, c.Args()).Delete(&Host{}).Error
|
|
},
|
|
}, {
|
|
Name: "update",
|
|
Usage: "Updates an existing host",
|
|
ArgsUsage: "HOST...",
|
|
Flags: []cli.Flag{
|
|
cli.StringFlag{Name: "name, n", Usage: "Rename the host"},
|
|
cli.StringFlag{Name: "password, p", Usage: "Update/set a password, use \"none\" to unset"},
|
|
cli.StringFlag{Name: "comment, c", Usage: "Update/set a host comment"},
|
|
cli.StringFlag{Name: "key, k", Usage: "Link a `KEY` to use for authentication"},
|
|
cli.StringSliceFlag{Name: "assign-group, g", Usage: "Assign the host to a new `HOSTGROUPS`"},
|
|
cli.StringSliceFlag{Name: "unassign-group", Usage: "Unassign the host from a `HOSTGROUPS`"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var hosts []Host
|
|
if err := HostsByIdentifiers(db, c.Args()).Find(&hosts).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
if len(hosts) > 1 && c.String("name") != "" {
|
|
return fmt.Errorf("cannot set --name when editing multiple hosts at once")
|
|
}
|
|
|
|
tx := db.Begin()
|
|
for _, host := range hosts {
|
|
model := tx.Model(&host)
|
|
// simple fields
|
|
for _, fieldname := range []string{"name", "comment", "password"} {
|
|
if c.String(fieldname) != "" {
|
|
if err := model.Update(fieldname, c.String(fieldname)).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
// associations
|
|
if c.String("key") != "" {
|
|
var key SSHKey
|
|
if err := SSHKeysByIdentifiers(db, []string{c.String("key")}).First(&key).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
if err := model.Association("SSHKey").Replace(&key).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
var appendGroups []HostGroup
|
|
var deleteGroups []HostGroup
|
|
if err := HostGroupsByIdentifiers(db, c.StringSlice("assign-group")).Find(&appendGroups).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
if err := HostGroupsByIdentifiers(db, c.StringSlice("unassign-group")).Find(&deleteGroups).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
if err := model.Association("Groups").Append(&appendGroups).Delete(deleteGroups).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
|
|
return tx.Commit().Error
|
|
},
|
|
},
|
|
},
|
|
}, {
|
|
Name: "hostgroup",
|
|
Usage: "Manages host groups",
|
|
Subcommands: []cli.Command{
|
|
{
|
|
Name: "create",
|
|
Usage: "Creates a new host group",
|
|
Description: "$> hostgroup create --name=prod",
|
|
Flags: []cli.Flag{
|
|
cli.StringFlag{Name: "name", Usage: "Assigns a name to the host group"},
|
|
cli.StringFlag{Name: "comment", Usage: "Adds a comment"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
hostGroup := HostGroup{
|
|
Name: c.String("name"),
|
|
Comment: c.String("comment"),
|
|
}
|
|
if hostGroup.Name == "" {
|
|
hostGroup.Name = namesgenerator.GetRandomName(0)
|
|
}
|
|
if _, err := govalidator.ValidateStruct(hostGroup); err != nil {
|
|
return err
|
|
}
|
|
// FIXME: check if name already exists
|
|
|
|
if err := db.Create(&hostGroup).Error; err != nil {
|
|
return err
|
|
}
|
|
fmt.Fprintf(s, "%d\n", hostGroup.ID)
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "inspect",
|
|
Usage: "Shows detailed information on one or more host groups",
|
|
ArgsUsage: "HOSTGROUP...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var hostGroups []HostGroup
|
|
if err := HostGroupsPreload(HostGroupsByIdentifiers(db, c.Args())).Find(&hostGroups).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
enc := json.NewEncoder(s)
|
|
enc.SetIndent("", " ")
|
|
return enc.Encode(hostGroups)
|
|
},
|
|
}, {
|
|
Name: "ls",
|
|
Usage: "Lists host groups",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "latest, l", Usage: "Show the latest host group"},
|
|
cli.BoolFlag{Name: "quiet, q", Usage: "Only display IDs"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var hostGroups []*HostGroup
|
|
query := db.Order("created_at desc").Preload("ACLs").Preload("Hosts")
|
|
if c.Bool("latest") {
|
|
var hostGroup HostGroup
|
|
if err := query.First(&hostGroup).Error; err != nil {
|
|
return err
|
|
}
|
|
hostGroups = append(hostGroups, &hostGroup)
|
|
} else {
|
|
if err := query.Find(&hostGroups).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
if c.Bool("quiet") {
|
|
for _, hostGroup := range hostGroups {
|
|
fmt.Fprintln(s, hostGroup.ID)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
table := tablewriter.NewWriter(s)
|
|
table.SetHeader([]string{"ID", "Name", "Hosts", "ACLs", "Updated", "Created", "Comment"})
|
|
table.SetBorder(false)
|
|
table.SetCaption(true, fmt.Sprintf("Total: %d host groups.", len(hostGroups)))
|
|
for _, hostGroup := range hostGroups {
|
|
// FIXME: add more stats (amount of hosts, linked usergroups, ...)
|
|
table.Append([]string{
|
|
fmt.Sprintf("%d", hostGroup.ID),
|
|
hostGroup.Name,
|
|
fmt.Sprintf("%d", len(hostGroup.Hosts)),
|
|
fmt.Sprintf("%d", len(hostGroup.ACLs)),
|
|
humanize.Time(hostGroup.UpdatedAt),
|
|
humanize.Time(hostGroup.CreatedAt),
|
|
hostGroup.Comment,
|
|
})
|
|
}
|
|
table.Render()
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "rm",
|
|
Usage: "Removes one or more host groups",
|
|
ArgsUsage: "HOSTGROUP...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
return HostGroupsByIdentifiers(db, c.Args()).Delete(&HostGroup{}).Error
|
|
},
|
|
},
|
|
},
|
|
}, {
|
|
Name: "info",
|
|
Usage: "Shows system-wide information",
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
fmt.Fprintf(s, "Debug mode (server): %v\n", globalContext.Bool("debug"))
|
|
hostname, _ := os.Hostname()
|
|
fmt.Fprintf(s, "Hostname: %s\n", hostname)
|
|
fmt.Fprintf(s, "CPUs: %d\n", runtime.NumCPU())
|
|
fmt.Fprintf(s, "Demo mode: %v\n", globalContext.Bool("demo"))
|
|
fmt.Fprintf(s, "DB Driver: %s\n", globalContext.String("db-driver"))
|
|
fmt.Fprintf(s, "DB Conn: %s\n", globalContext.String("db-conn"))
|
|
fmt.Fprintf(s, "Bind Address: %s\n", globalContext.String("bind-address"))
|
|
fmt.Fprintf(s, "System Time: %v\n", time.Now().Format(time.RFC3339Nano))
|
|
fmt.Fprintf(s, "OS Type: %s\n", runtime.GOOS)
|
|
fmt.Fprintf(s, "OS Architecture: %s\n", runtime.GOARCH)
|
|
fmt.Fprintf(s, "Go routines: %d\n", runtime.NumGoroutine())
|
|
fmt.Fprintf(s, "Go version (build): %v\n", runtime.Version())
|
|
fmt.Fprintf(s, "Uptime: %v\n", time.Since(startTime))
|
|
|
|
fmt.Fprintf(s, "User email: %v\n", myself.ID)
|
|
fmt.Fprintf(s, "User email: %s\n", myself.Email)
|
|
fmt.Fprintf(s, "Version: %s\n", Version)
|
|
fmt.Fprintf(s, "GIT SHA: %s\n", GitSha)
|
|
fmt.Fprintf(s, "GIT Branch: %s\n", GitBranch)
|
|
fmt.Fprintf(s, "GIT Tag: %s\n", GitTag)
|
|
|
|
// FIXME: add info about current server (network, cpu, ram, OS)
|
|
// FIXME: add info about current user
|
|
// FIXME: add active connections
|
|
// FIXME: stats
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "key",
|
|
Usage: "Manages keys",
|
|
Subcommands: []cli.Command{
|
|
{
|
|
Name: "create",
|
|
Usage: "Creates a new key",
|
|
Description: "$> key create\n $> key create --name=mykey",
|
|
Flags: []cli.Flag{
|
|
cli.StringFlag{Name: "name", Usage: "Assigns a name to the key"},
|
|
cli.StringFlag{Name: "type", Value: "rsa"},
|
|
cli.UintFlag{Name: "length", Value: 2048},
|
|
cli.StringFlag{Name: "comment", Usage: "Adds a comment"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
name := namesgenerator.GetRandomName(0)
|
|
if c.String("name") != "" {
|
|
name = c.String("name")
|
|
}
|
|
|
|
key, err := NewSSHKey(c.String("type"), c.Uint("length"))
|
|
if globalContext.String("aes-key") != "" {
|
|
if err2 := SSHKeyEncrypt(globalContext.String("aes-key"), key); err2 != nil {
|
|
return err2
|
|
}
|
|
}
|
|
if err != nil {
|
|
return err
|
|
}
|
|
key.Name = name
|
|
key.Comment = c.String("comment")
|
|
|
|
if _, err := govalidator.ValidateStruct(key); err != nil {
|
|
return err
|
|
}
|
|
// FIXME: check if name already exists
|
|
|
|
// save the key in database
|
|
if err := db.Create(&key).Error; err != nil {
|
|
return err
|
|
}
|
|
fmt.Fprintf(s, "%d\n", key.ID)
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "inspect",
|
|
Usage: "Shows detailed information on one or more keys",
|
|
ArgsUsage: "KEY...",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "decrypt", Usage: "Decrypt sensitive data"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var keys []*SSHKey
|
|
if err := SSHKeysByIdentifiers(db, c.Args()).Find(&keys).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
if c.Bool("decrypt") {
|
|
for _, key := range keys {
|
|
SSHKeyDecrypt(globalContext.String("aes-key"), key)
|
|
}
|
|
}
|
|
|
|
enc := json.NewEncoder(s)
|
|
enc.SetIndent("", " ")
|
|
return enc.Encode(keys)
|
|
},
|
|
}, {
|
|
Name: "ls",
|
|
Usage: "Lists keys",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "latest, l", Usage: "Show the latest key"},
|
|
cli.BoolFlag{Name: "quiet, q", Usage: "Only display IDs"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var sshKeys []*SSHKey
|
|
query := db.Order("created_at desc").Preload("Hosts")
|
|
if c.Bool("latest") {
|
|
var sshKey SSHKey
|
|
if err := query.First(&sshKey).Error; err != nil {
|
|
return err
|
|
}
|
|
sshKeys = append(sshKeys, &sshKey)
|
|
} else {
|
|
if err := query.Find(&sshKeys).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if c.Bool("quiet") {
|
|
for _, sshKey := range sshKeys {
|
|
fmt.Fprintln(s, sshKey.ID)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
table := tablewriter.NewWriter(s)
|
|
table.SetHeader([]string{"ID", "Name", "Type", "Length", "Hosts", "Updated", "Created", "Comment"})
|
|
table.SetBorder(false)
|
|
table.SetCaption(true, fmt.Sprintf("Total: %d keys.", len(sshKeys)))
|
|
for _, key := range sshKeys {
|
|
table.Append([]string{
|
|
fmt.Sprintf("%d", key.ID),
|
|
key.Name,
|
|
key.Type,
|
|
fmt.Sprintf("%d", key.Length),
|
|
//key.Fingerprint,
|
|
fmt.Sprintf("%d", len(key.Hosts)),
|
|
humanize.Time(key.UpdatedAt),
|
|
humanize.Time(key.CreatedAt),
|
|
key.Comment,
|
|
//FIXME: add some stats
|
|
})
|
|
}
|
|
table.Render()
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "rm",
|
|
Usage: "Removes one or more keys",
|
|
ArgsUsage: "KEY...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
return SSHKeysByIdentifiers(db, c.Args()).Delete(&SSHKey{}).Error
|
|
},
|
|
}, {
|
|
Name: "setup",
|
|
Usage: "Return shell command to install key on remote host",
|
|
ArgsUsage: "KEY",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() != 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
// not checking roles, everyone with an account can see how to enroll new hosts
|
|
|
|
var key SSHKey
|
|
if err := SSHKeysByIdentifiers(db, c.Args()).First(&key).Error; err != nil {
|
|
return err
|
|
}
|
|
fmt.Fprintf(s, "umask 077; mkdir -p .ssh; echo %s sshportal >> .ssh/authorized_keys\n", key.PubKey)
|
|
return nil
|
|
},
|
|
},
|
|
},
|
|
}, {
|
|
Name: "user",
|
|
Usage: "Manages users",
|
|
Subcommands: []cli.Command{
|
|
{
|
|
Name: "inspect",
|
|
Usage: "Shows detailed information on one or more users",
|
|
ArgsUsage: "USER...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var users []User
|
|
if err := UsersPreload(UsersByIdentifiers(db, c.Args())).Find(&users).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
enc := json.NewEncoder(s)
|
|
enc.SetIndent("", " ")
|
|
return enc.Encode(users)
|
|
},
|
|
}, {
|
|
Name: "invite",
|
|
ArgsUsage: "<email>",
|
|
Usage: "Invites a new user",
|
|
Description: "$> user invite bob@example.com\n $> user invite --name=Robert bob@example.com",
|
|
Flags: []cli.Flag{
|
|
cli.StringFlag{Name: "name", Usage: "Assigns a name to the user"},
|
|
cli.StringFlag{Name: "comment", Usage: "Adds a comment"},
|
|
cli.StringSliceFlag{Name: "group, g", Usage: "Names or IDs of `USERGROUPS` (default: \"default\")"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() != 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
// FIXME: validate email
|
|
|
|
email := c.Args().First()
|
|
name := strings.Split(email, "@")[0]
|
|
if c.String("name") != "" {
|
|
name = c.String("name")
|
|
}
|
|
|
|
user := User{
|
|
Name: name,
|
|
Email: email,
|
|
Comment: c.String("comment"),
|
|
InviteToken: randStringBytes(16),
|
|
}
|
|
|
|
if _, err := govalidator.ValidateStruct(user); err != nil {
|
|
return err
|
|
}
|
|
|
|
// user group
|
|
inputGroups := c.StringSlice("group")
|
|
if len(inputGroups) == 0 {
|
|
inputGroups = []string{"default"}
|
|
}
|
|
if err := UserGroupsByIdentifiers(db, inputGroups).Find(&user.Groups).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
// save the user in database
|
|
if err := db.Create(&user).Error; err != nil {
|
|
return err
|
|
}
|
|
fmt.Fprintf(s, "User %d created.\nTo associate this account with a key, use the following SSH user: 'invite-%s'.\n", user.ID, user.InviteToken)
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "ls",
|
|
Usage: "Lists users",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "latest, l", Usage: "Show the latest user"},
|
|
cli.BoolFlag{Name: "quiet, q", Usage: "Only display IDs"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var users []*User
|
|
query := db.Order("created_at desc").Preload("Groups").Preload("Roles").Preload("Keys")
|
|
if c.Bool("latest") {
|
|
var user User
|
|
if err := query.First(&user).Error; err != nil {
|
|
return err
|
|
}
|
|
users = append(users, &user)
|
|
} else {
|
|
if err := query.Find(&users).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if c.Bool("quiet") {
|
|
for _, user := range users {
|
|
fmt.Fprintln(s, user.ID)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
table := tablewriter.NewWriter(s)
|
|
table.SetHeader([]string{"ID", "Name", "Email", "Roles", "Keys", "Groups", "Updated", "Created", "Comment"})
|
|
table.SetBorder(false)
|
|
table.SetCaption(true, fmt.Sprintf("Total: %d users.", len(users)))
|
|
for _, user := range users {
|
|
groupNames := []string{}
|
|
for _, userGroup := range user.Groups {
|
|
groupNames = append(groupNames, userGroup.Name)
|
|
}
|
|
roleNames := []string{}
|
|
for _, role := range user.Roles {
|
|
roleNames = append(roleNames, role.Name)
|
|
}
|
|
table.Append([]string{
|
|
fmt.Sprintf("%d", user.ID),
|
|
user.Name,
|
|
user.Email,
|
|
strings.Join(roleNames, ", "),
|
|
fmt.Sprintf("%d", len(user.Keys)),
|
|
strings.Join(groupNames, ", "),
|
|
humanize.Time(user.UpdatedAt),
|
|
humanize.Time(user.CreatedAt),
|
|
user.Comment,
|
|
})
|
|
}
|
|
table.Render()
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "rm",
|
|
Usage: "Removes one or more users",
|
|
ArgsUsage: "USER...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
return UsersByIdentifiers(db, c.Args()).Delete(&User{}).Error
|
|
},
|
|
}, {
|
|
Name: "update",
|
|
Usage: "Updates an existing user",
|
|
ArgsUsage: "USER...",
|
|
Flags: []cli.Flag{
|
|
cli.StringFlag{Name: "name, n", Usage: "Renames the user"},
|
|
cli.StringFlag{Name: "email, e", Usage: "Updates the email"},
|
|
cli.StringSliceFlag{Name: "assign-role, r", Usage: "Assign the user to new `USERROLES`"},
|
|
cli.StringSliceFlag{Name: "unassign-role", Usage: "Unassign the user from `USERROLES`"},
|
|
cli.StringSliceFlag{Name: "assign-group, g", Usage: "Assign the user to new `USERGROUPS`"},
|
|
cli.StringSliceFlag{Name: "unassign-group", Usage: "Unassign the user from `USERGROUPS`"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
// FIXME: check if unset-admin + user == myself
|
|
var users []User
|
|
if err := UsersByIdentifiers(db, c.Args()).Find(&users).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
if c.Bool("set-admin") && c.Bool("unset-admin") {
|
|
return fmt.Errorf("cannot use --set-admin and --unset-admin altogether")
|
|
}
|
|
|
|
if len(users) > 1 && c.String("email") != "" {
|
|
return fmt.Errorf("cannot set --email when editing multiple users at once")
|
|
}
|
|
|
|
tx := db.Begin()
|
|
for _, user := range users {
|
|
model := tx.Model(&user)
|
|
// simple fields
|
|
for _, fieldname := range []string{"name", "email", "comment"} {
|
|
if c.String(fieldname) != "" {
|
|
if err := model.Update(fieldname, c.String(fieldname)).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
// associations
|
|
var appendGroups []UserGroup
|
|
if err := UserGroupsByIdentifiers(db, c.StringSlice("assign-group")).Find(&appendGroups).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
var deleteGroups []UserGroup
|
|
if err := UserGroupsByIdentifiers(db, c.StringSlice("unassign-group")).Find(&deleteGroups).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
if err := model.Association("Groups").Append(&appendGroups).Delete(deleteGroups).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
|
|
var appendRoles []UserRole
|
|
if err := UserRolesByIdentifiers(db, c.StringSlice("assign-role")).Find(&appendRoles).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
var deleteRoles []UserRole
|
|
if err := UserRolesByIdentifiers(db, c.StringSlice("unassign-role")).Find(&deleteRoles).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
if err := model.Association("Roles").Append(&appendRoles).Delete(deleteRoles).Error; err != nil {
|
|
tx.Rollback()
|
|
return err
|
|
}
|
|
}
|
|
|
|
return tx.Commit().Error
|
|
},
|
|
},
|
|
},
|
|
}, {
|
|
Name: "usergroup",
|
|
Usage: "Manages user groups",
|
|
Subcommands: []cli.Command{
|
|
{
|
|
Name: "create",
|
|
Usage: "Creates a new user group",
|
|
Description: "$> usergroup create --name=prod",
|
|
Flags: []cli.Flag{
|
|
cli.StringFlag{Name: "name", Usage: "Assigns a name to the user group"},
|
|
cli.StringFlag{Name: "comment", Usage: "Adds a comment"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
userGroup := UserGroup{
|
|
Name: c.String("name"),
|
|
Comment: c.String("comment"),
|
|
}
|
|
if userGroup.Name == "" {
|
|
userGroup.Name = namesgenerator.GetRandomName(0)
|
|
}
|
|
|
|
if _, err := govalidator.ValidateStruct(userGroup); err != nil {
|
|
return err
|
|
}
|
|
// FIXME: check if name already exists
|
|
// FIXME: add myself to the new group
|
|
|
|
userGroup.Users = []*User{&myself}
|
|
|
|
if err := db.Create(&userGroup).Error; err != nil {
|
|
return err
|
|
}
|
|
fmt.Fprintf(s, "%d\n", userGroup.ID)
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "inspect",
|
|
Usage: "Shows detailed information on one or more user groups",
|
|
ArgsUsage: "USERGROUP...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var userGroups []UserGroup
|
|
if err := UserGroupsPreload(UserGroupsByIdentifiers(db, c.Args())).Find(&userGroups).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
enc := json.NewEncoder(s)
|
|
enc.SetIndent("", " ")
|
|
return enc.Encode(userGroups)
|
|
},
|
|
}, {
|
|
Name: "ls",
|
|
Usage: "Lists user groups",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "latest, l", Usage: "Show the latest user group"},
|
|
cli.BoolFlag{Name: "quiet, q", Usage: "Only display IDs"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var userGroups []*UserGroup
|
|
query := db.Order("created_at desc").Preload("ACLs").Preload("Users")
|
|
if c.Bool("latest") {
|
|
var userGroup UserGroup
|
|
if err := query.First(&userGroup).Error; err != nil {
|
|
return err
|
|
}
|
|
userGroups = append(userGroups, &userGroup)
|
|
} else {
|
|
if err := query.Find(&userGroups).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if c.Bool("quiet") {
|
|
for _, userGroup := range userGroups {
|
|
fmt.Fprintln(s, userGroup.ID)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
table := tablewriter.NewWriter(s)
|
|
table.SetHeader([]string{"ID", "Name", "Users", "ACLs", "Update", "Create", "Comment"})
|
|
table.SetBorder(false)
|
|
table.SetCaption(true, fmt.Sprintf("Total: %d user groups.", len(userGroups)))
|
|
for _, userGroup := range userGroups {
|
|
table.Append([]string{
|
|
fmt.Sprintf("%d", userGroup.ID),
|
|
userGroup.Name,
|
|
fmt.Sprintf("%d", len(userGroup.Users)),
|
|
fmt.Sprintf("%d", len(userGroup.ACLs)),
|
|
humanize.Time(userGroup.UpdatedAt),
|
|
humanize.Time(userGroup.CreatedAt),
|
|
userGroup.Comment,
|
|
})
|
|
// FIXME: add more stats (amount of users, linked usergroups, ...)
|
|
}
|
|
table.Render()
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "rm",
|
|
Usage: "Removes one or more user groups",
|
|
ArgsUsage: "USERGROUP...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
return UserGroupsByIdentifiers(db, c.Args()).Delete(&UserGroup{}).Error
|
|
},
|
|
},
|
|
},
|
|
}, {
|
|
Name: "userkey",
|
|
Usage: "Manages userkeys",
|
|
Subcommands: []cli.Command{
|
|
{
|
|
Name: "create",
|
|
ArgsUsage: "<user ID or email>",
|
|
Usage: "Creates a new userkey",
|
|
Description: "$> userkey create bob\n $> user create --name=mykey bob",
|
|
Flags: []cli.Flag{
|
|
cli.StringFlag{Name: "comment", Usage: "Adds a comment"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() != 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var user User
|
|
if err := UsersByIdentifiers(db, c.Args()).First(&user).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
fmt.Fprintf(s, "Enter key:\n")
|
|
reader := bufio.NewReader(s)
|
|
text, _ := reader.ReadString('\n')
|
|
|
|
key, comment, _, _, err := ssh.ParseAuthorizedKey([]byte(text))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
userkey := UserKey{
|
|
User: &user,
|
|
Key: key.Marshal(),
|
|
Comment: comment,
|
|
}
|
|
if c.String("comment") != "" {
|
|
userkey.Comment = c.String("comment")
|
|
}
|
|
|
|
if _, err := govalidator.ValidateStruct(userkey); err != nil {
|
|
return err
|
|
}
|
|
|
|
// save the userkey in database
|
|
if err := db.Create(&userkey).Error; err != nil {
|
|
return err
|
|
}
|
|
fmt.Fprintf(s, "%d\n", userkey.ID)
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "inspect",
|
|
Usage: "Shows detailed information on one or more userkeys",
|
|
ArgsUsage: "USERKEY...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var userKeys []UserKey
|
|
if err := UserKeysPreload(UserKeysByIdentifiers(db, c.Args())).Find(&userKeys).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
enc := json.NewEncoder(s)
|
|
enc.SetIndent("", " ")
|
|
return enc.Encode(userKeys)
|
|
},
|
|
}, {
|
|
Name: "ls",
|
|
Usage: "Lists userkeys",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "latest, l", Usage: "Show the latest user key"},
|
|
cli.BoolFlag{Name: "quiet, q", Usage: "Only display IDs"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var userKeys []*UserKey
|
|
query := db.Order("created_at desc").Preload("User")
|
|
if c.Bool("latest") {
|
|
var userKey UserKey
|
|
if err := query.First(&userKey).Error; err != nil {
|
|
return err
|
|
}
|
|
userKeys = append(userKeys, &userKey)
|
|
} else {
|
|
if err := query.Find(&userKeys).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if c.Bool("quiet") {
|
|
for _, userKey := range userKeys {
|
|
fmt.Fprintln(s, userKey.ID)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
table := tablewriter.NewWriter(s)
|
|
table.SetHeader([]string{"ID", "User", "Updated", "Created", "Comment"})
|
|
table.SetBorder(false)
|
|
table.SetCaption(true, fmt.Sprintf("Total: %d userkeys.", len(userKeys)))
|
|
for _, userkey := range userKeys {
|
|
table.Append([]string{
|
|
fmt.Sprintf("%d", userkey.ID),
|
|
userkey.User.Email,
|
|
// FIXME: add fingerprint
|
|
humanize.Time(userkey.UpdatedAt),
|
|
humanize.Time(userkey.CreatedAt),
|
|
userkey.Comment,
|
|
})
|
|
}
|
|
table.Render()
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "rm",
|
|
Usage: "Removes one or more userkeys",
|
|
ArgsUsage: "USERKEY...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
return UserKeysByIdentifiers(db, c.Args()).Delete(&UserKey{}).Error
|
|
},
|
|
},
|
|
},
|
|
}, {
|
|
Name: "session",
|
|
Usage: "Manages sessions",
|
|
Subcommands: []cli.Command{
|
|
{
|
|
Name: "inspect",
|
|
Usage: "Shows detailed information on one or more sessions",
|
|
ArgsUsage: "SESSION...",
|
|
Action: func(c *cli.Context) error {
|
|
if c.NArg() < 1 {
|
|
return cli.ShowSubcommandHelp(c)
|
|
}
|
|
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var sessions []Session
|
|
if err := SessionsPreload(SessionsByIdentifiers(db, c.Args())).Find(&sessions).Error; err != nil {
|
|
return err
|
|
}
|
|
|
|
enc := json.NewEncoder(s)
|
|
enc.SetIndent("", " ")
|
|
return enc.Encode(sessions)
|
|
},
|
|
}, {
|
|
Name: "ls",
|
|
Usage: "Lists sessions",
|
|
Flags: []cli.Flag{
|
|
cli.BoolFlag{Name: "latest, l", Usage: "Show the latest session"},
|
|
cli.BoolFlag{Name: "quiet, q", Usage: "Only display IDs"},
|
|
},
|
|
Action: func(c *cli.Context) error {
|
|
if err := UserCheckRoles(myself, []string{"admin"}); err != nil {
|
|
return err
|
|
}
|
|
|
|
var sessions []*Session
|
|
query := db.Order("created_at desc").Preload("User").Preload("Host")
|
|
if c.Bool("latest") {
|
|
var session Session
|
|
if err := query.First(&session).Error; err != nil {
|
|
return err
|
|
}
|
|
sessions = append(sessions, &session)
|
|
} else {
|
|
if err := query.Find(&sessions).Error; err != nil {
|
|
return err
|
|
}
|
|
}
|
|
if c.Bool("quiet") {
|
|
for _, session := range sessions {
|
|
fmt.Fprintln(s, session.ID)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
table := tablewriter.NewWriter(s)
|
|
table.SetHeader([]string{"ID", "User", "Host", "Status", "Start", "Duration", "Error", "Comment"})
|
|
table.SetBorder(false)
|
|
table.SetCaption(true, fmt.Sprintf("Total: %d sessions.", len(sessions)))
|
|
for _, session := range sessions {
|
|
var duration string
|
|
if session.StoppedAt == nil || session.StoppedAt.IsZero() {
|
|
duration = humanize.RelTime(session.CreatedAt, time.Now(), "", "")
|
|
} else {
|
|
duration = humanize.RelTime(session.CreatedAt, *session.StoppedAt, "", "")
|
|
}
|
|
duration = strings.Replace(duration, "now", "1 second", 1)
|
|
table.Append([]string{
|
|
fmt.Sprintf("%d", session.ID),
|
|
session.User.Name,
|
|
session.Host.Name,
|
|
session.Status,
|
|
humanize.Time(session.CreatedAt),
|
|
duration,
|
|
wrapText(session.ErrMsg, 30),
|
|
session.Comment,
|
|
})
|
|
}
|
|
table.Render()
|
|
return nil
|
|
},
|
|
},
|
|
},
|
|
}, {
|
|
Name: "version",
|
|
Usage: "Shows the SSHPortal version information",
|
|
Action: func(c *cli.Context) error {
|
|
fmt.Fprintf(s, "%s\n", Version)
|
|
return nil
|
|
},
|
|
}, {
|
|
Name: "exit",
|
|
Usage: "Exit",
|
|
Action: func(c *cli.Context) error {
|
|
return cli.NewExitError("", 0)
|
|
},
|
|
},
|
|
}
|
|
|
|
if len(sshCommand) == 0 { // interactive mode
|
|
term := terminal.NewTerminal(s, "config> ")
|
|
for {
|
|
line, err := term.ReadLine()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
words, err := shlex.Split(line, true)
|
|
if err != nil {
|
|
fmt.Fprint(s, "syntax error.\n")
|
|
continue
|
|
}
|
|
if len(words) == 1 && strings.ToLower(words[0]) == "exit" {
|
|
return s.Exit(0)
|
|
}
|
|
NewEvent("shell", words[0]).SetAuthor(&myself).SetArg("interactive", true).SetArg("args", words[1:]).Log(db)
|
|
if err := app.Run(append([]string{"config"}, words...)); err != nil {
|
|
if cliErr, ok := err.(*cli.ExitError); ok {
|
|
if cliErr.ExitCode() != 0 {
|
|
fmt.Fprintf(s, "error: %v\n", err)
|
|
}
|
|
//s.Exit(cliErr.ExitCode())
|
|
} else {
|
|
fmt.Fprintf(s, "error: %v\n", err)
|
|
}
|
|
}
|
|
}
|
|
} else { // oneshot mode
|
|
NewEvent("shell", sshCommand[0]).SetAuthor(&myself).SetArg("interactive", false).SetArg("args", sshCommand[1:]).Log(db)
|
|
if err := app.Run(append([]string{"config"}, sshCommand...)); err != nil {
|
|
if errMsg := err.Error(); errMsg != "" {
|
|
fmt.Fprintf(s, "error: %s\n", errMsg)
|
|
}
|
|
if cliErr, ok := err.(*cli.ExitError); ok {
|
|
return s.Exit(cliErr.ExitCode())
|
|
}
|
|
return s.Exit(1)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|