mirror of
https://github.com/ovh/the-bastion.git
synced 2024-11-10 17:26:51 +08:00
84687256a8
Fixes #259
158 lines
5.8 KiB
Perl
Executable file
158 lines
5.8 KiB
Perl
Executable file
#! /usr/bin/env perl
|
|
# vim: set filetype=perl ts=4 sw=4 sts=4 et:
|
|
use common::sense;
|
|
|
|
use File::Basename;
|
|
use lib dirname(__FILE__) . '/../../../lib/perl';
|
|
use OVH::Result;
|
|
use OVH::Bastion;
|
|
use OVH::Bastion::Plugin qw( :DEFAULT help );
|
|
use OVH::Bastion::Plugin::ACL;
|
|
|
|
my $remainingOptions = OVH::Bastion::Plugin::begin(
|
|
argv => \@ARGV,
|
|
header => "adding a server to a group",
|
|
options => {
|
|
"group=s" => \my $group,
|
|
"user-any" => \my $userAny,
|
|
"port-any" => \my $portAny,
|
|
"scpup" => \my $scpUp,
|
|
"scpdown" => \my $scpDown,
|
|
"sftp" => \my $sftp,
|
|
"force" => \my $force, # for slashes, and/or for servers that are down (no connection test)
|
|
"force-key=s" => \my $forceKey,
|
|
"force-password=s" => \my $forcePassword,
|
|
"ttl=s" => \my $ttl,
|
|
"comment=s" => \my $comment,
|
|
},
|
|
helptext => <<'EOF',
|
|
Add an IP or IP block to a group's servers list
|
|
|
|
Usage: --osh SCRIPT_NAME --group GROUP [OPTIONS]
|
|
|
|
--group GROUP Specify which group this machine should be added to (it should have the public group key of course)
|
|
--host HOST|IP|NET/CIDR Host(s) to add access to, either a HOST which will be resolved to an IP immediately, or an IP,
|
|
or a whole network using the NET/CIDR notation
|
|
--user USER Specify which remote user should be allowed (root, run, etc...)
|
|
--user-any Allow any remote user (the remote user should still have the public group key in all cases)
|
|
--port PORT Only allow access to this port (e.g. 22)
|
|
--port-any Allow access to any port
|
|
--scpup Allow SCP upload, you--bastion-->server (omit --user in this case)
|
|
--scpdown Allow SCP download, you<--bastion--server (omit --user in this case)
|
|
--sftp Allow usage of the SFTP subsystem, you<--bastion-->server (omit --user in this case)
|
|
--force Don't try the ssh connection, just add the host to the group blindly
|
|
--force-key FINGERPRINT Only use the key with the specified fingerprint to connect to the server (cf groupInfo)
|
|
--force-password HASH Only use the password with the specified hash to connect to the server (cf groupListPasswords)
|
|
--ttl SECONDS|DURATION Specify a number of seconds (or a duration string, such as "1d7h8m") after which the access will automatically expire
|
|
--comment '"ANY TEXT'" Add a comment alongside this server
|
|
|
|
Examples::
|
|
|
|
--osh SCRIPT_NAME --group grp1 --host 203.0.113.0/24 --user-any --port-any --force --comment '"a whole network"'
|
|
--osh SCRIPT_NAME --group grp2 --host srv1.example.org --user root --port 22
|
|
EOF
|
|
);
|
|
|
|
my $fnret;
|
|
|
|
if (not $group or not $ip) {
|
|
help();
|
|
osh_exit 'ERR_MISSING_PARAMETER',
|
|
"Missing mandatory parameter 'host' or 'group' (or host didn't resolve correctly)";
|
|
}
|
|
|
|
$fnret = OVH::Bastion::Plugin::ACL::check(
|
|
user => $user,
|
|
userAny => $userAny,
|
|
port => $port,
|
|
portAny => $portAny,
|
|
scpUp => $scpUp,
|
|
scpDown => $scpDown,
|
|
sftp => $sftp
|
|
);
|
|
if (!$fnret) {
|
|
help();
|
|
osh_exit($fnret);
|
|
}
|
|
$user = $fnret->value->{'user'};
|
|
|
|
$fnret = OVH::Bastion::is_valid_group_and_existing(group => $group, groupType => "key");
|
|
$fnret or osh_exit($fnret);
|
|
|
|
# get returned untainted value
|
|
$group = $fnret->value->{'group'};
|
|
my $shortGroup = $fnret->value->{'shortGroup'};
|
|
|
|
if (defined $ttl) {
|
|
$fnret = OVH::Bastion::is_valid_ttl(ttl => $ttl);
|
|
$fnret or osh_exit $fnret;
|
|
$ttl = $fnret->value->{'seconds'};
|
|
}
|
|
|
|
if ($forceKey && $forcePassword) {
|
|
osh_exit 'ERR_INCOMPATIBLE_PARAMETERS', "Can't use --force-key and --force-password at the same time";
|
|
}
|
|
|
|
if ($forceKey) {
|
|
$fnret = OVH::Bastion::is_valid_fingerprint(fingerprint => $forceKey);
|
|
$fnret or osh_exit $fnret;
|
|
$forceKey = $fnret->value->{'fingerprint'};
|
|
}
|
|
|
|
if ($forcePassword) {
|
|
$fnret = OVH::Bastion::is_valid_hash(hash => $forcePassword);
|
|
$fnret or osh_exit $fnret;
|
|
$forcePassword = $fnret->value->{'hash'};
|
|
}
|
|
|
|
#
|
|
# Now do it
|
|
#
|
|
|
|
$fnret = OVH::Bastion::is_group_aclkeeper(account => $self, group => $shortGroup, superowner => 1);
|
|
$fnret
|
|
or osh_exit 'ERR_NOT_GROUP_ACLKEEPER',
|
|
"Sorry, you must be an aclkeeper of group $shortGroup to be able to add servers to it";
|
|
|
|
if (not $force) {
|
|
$fnret = OVH::Bastion::ssh_test_access_way(
|
|
group => $group,
|
|
user => $user,
|
|
port => $port,
|
|
ip => $ip,
|
|
forceKey => $forceKey,
|
|
forcePassword => $forcePassword
|
|
);
|
|
if ($fnret->is_ok and $fnret->err ne 'OK') {
|
|
|
|
# we have something to say, say it
|
|
osh_info $fnret->msg;
|
|
}
|
|
elsif (not $fnret) {
|
|
osh_info "Note: if you still want to add this access even if it doesn't work, use --force";
|
|
osh_exit $fnret;
|
|
}
|
|
}
|
|
else {
|
|
osh_info "Forcing add as asked, we didn't test the SSH connection, maybe it won't work!";
|
|
}
|
|
|
|
# if no comment is specified, but we're adding the server by hostname,
|
|
# use it to craft a comment
|
|
if (!$comment && $host ne $ip) {
|
|
$comment = "hostname=$host";
|
|
}
|
|
|
|
my @command = qw{ sudo -n -u };
|
|
push @command, ($group, '--', '/usr/bin/env', 'perl', '-T', $OVH::Bastion::BASEPATH . '/bin/helper/osh-groupAddServer');
|
|
push @command, '--group', $group;
|
|
push @command, '--action', 'add';
|
|
push @command, '--ip', $ip;
|
|
push @command, '--user', $user if $user;
|
|
push @command, '--port', $port if $port;
|
|
push @command, '--force-key', $forceKey if $forceKey;
|
|
push @command, '--force-password', $forcePassword if $forcePassword;
|
|
push @command, '--ttl', $ttl if $ttl;
|
|
push @command, '--comment', $comment if $comment;
|
|
|
|
osh_exit OVH::Bastion::helper(cmd => \@command);
|