2019-12-07 22:01:40 +00:00
|
|
|
package sftp
|
|
|
|
|
|
|
|
import (
|
2020-09-01 03:14:04 +00:00
|
|
|
"crypto/rand"
|
|
|
|
"crypto/rsa"
|
|
|
|
"crypto/x509"
|
|
|
|
"encoding/pem"
|
|
|
|
"fmt"
|
2020-05-29 05:07:53 +00:00
|
|
|
"github.com/apex/log"
|
2020-09-01 03:14:04 +00:00
|
|
|
"github.com/patrickmn/go-cache"
|
|
|
|
"github.com/pkg/sftp"
|
2019-12-07 23:53:07 +00:00
|
|
|
"github.com/pterodactyl/wings/api"
|
2020-09-01 03:14:04 +00:00
|
|
|
"golang.org/x/crypto/ssh"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"net"
|
|
|
|
"os"
|
|
|
|
"path"
|
|
|
|
"strings"
|
|
|
|
"time"
|
2019-12-07 22:01:40 +00:00
|
|
|
)
|
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
type Settings struct {
|
|
|
|
BasePath string
|
|
|
|
ReadOnly bool
|
|
|
|
BindPort int
|
|
|
|
BindAddress string
|
|
|
|
}
|
|
|
|
|
2020-09-05 19:08:40 +00:00
|
|
|
type User struct {
|
2020-09-01 03:14:04 +00:00
|
|
|
Uid int
|
|
|
|
Gid int
|
|
|
|
}
|
|
|
|
|
|
|
|
type Server struct {
|
|
|
|
cache *cache.Cache
|
|
|
|
|
|
|
|
Settings Settings
|
2020-09-05 19:08:40 +00:00
|
|
|
User User
|
2020-09-01 03:14:04 +00:00
|
|
|
|
|
|
|
PathValidator func(fs FileSystem, p string) (string, error)
|
|
|
|
DiskSpaceValidator func(fs FileSystem) bool
|
|
|
|
|
|
|
|
// Validator function that is called when a user connects to the server. This should
|
|
|
|
// check against whatever system is desired to confirm if the given username and password
|
|
|
|
// combination is valid. If so, should return an authentication response.
|
|
|
|
CredentialValidator func(r api.SftpAuthRequest) (*api.SftpAuthResponse, error)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a new server configuration instance.
|
|
|
|
func New(c *Server) error {
|
|
|
|
c.cache = cache.New(5*time.Minute, 10*time.Minute)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Initialize the SFTP server and add a persistent listener to handle inbound SFTP connections.
|
|
|
|
func (c *Server) Initialize() error {
|
|
|
|
serverConfig := &ssh.ServerConfig{
|
|
|
|
NoClientAuth: false,
|
|
|
|
MaxAuthTries: 6,
|
|
|
|
PasswordCallback: func(conn ssh.ConnMetadata, pass []byte) (*ssh.Permissions, error) {
|
|
|
|
resp, err := c.CredentialValidator(api.SftpAuthRequest{
|
|
|
|
User: conn.User(),
|
|
|
|
Pass: string(pass),
|
|
|
|
IP: conn.RemoteAddr().String(),
|
|
|
|
SessionID: conn.SessionID(),
|
|
|
|
ClientVersion: conn.ClientVersion(),
|
|
|
|
})
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
sshPerm := &ssh.Permissions{
|
|
|
|
Extensions: map[string]string{
|
|
|
|
"uuid": resp.Server,
|
|
|
|
"user": conn.User(),
|
|
|
|
"permissions": strings.Join(resp.Permissions, ","),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
return sshPerm, nil
|
2019-12-07 22:01:40 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
if _, err := os.Stat(path.Join(c.Settings.BasePath, ".sftp/id_rsa")); os.IsNotExist(err) {
|
|
|
|
if err := c.generatePrivateKey(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else if err != nil {
|
2019-12-07 23:53:07 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
privateBytes, err := ioutil.ReadFile(path.Join(c.Settings.BasePath, ".sftp/id_rsa"))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-12-07 23:53:07 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
private, err := ssh.ParsePrivateKey(privateBytes)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-12-07 23:53:07 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
// Add our private key to the server configuration.
|
|
|
|
serverConfig.AddHostKey(private)
|
2019-12-08 01:35:45 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
listener, err := net.Listen("tcp", fmt.Sprintf("%s:%d", c.Settings.BindAddress, c.Settings.BindPort))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
2019-12-08 01:35:45 +00:00
|
|
|
}
|
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
log.WithField("host", c.Settings.BindAddress).WithField("port", c.Settings.BindPort).Info("sftp subsystem listening for connections")
|
|
|
|
|
|
|
|
for {
|
|
|
|
conn, _ := listener.Accept()
|
|
|
|
if conn != nil {
|
|
|
|
go c.AcceptInboundConnection(conn, serverConfig)
|
|
|
|
}
|
|
|
|
}
|
2019-12-08 00:43:00 +00:00
|
|
|
}
|
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
// Handles an inbound connection to the instance and determines if we should serve the request
|
|
|
|
// or not.
|
|
|
|
func (c Server) AcceptInboundConnection(conn net.Conn, config *ssh.ServerConfig) {
|
|
|
|
defer conn.Close()
|
2019-12-08 01:35:45 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
// Before beginning a handshake must be performed on the incoming net.Conn
|
|
|
|
sconn, chans, reqs, err := ssh.NewServerConn(conn, config)
|
|
|
|
if err != nil {
|
|
|
|
return
|
2019-12-08 01:35:45 +00:00
|
|
|
}
|
2020-09-01 03:14:04 +00:00
|
|
|
defer sconn.Close()
|
2019-12-08 01:35:45 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
go ssh.DiscardRequests(reqs)
|
2019-12-08 00:43:00 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
for newChannel := range chans {
|
|
|
|
// If its not a session channel we just move on because its not something we
|
|
|
|
// know how to handle at this point.
|
|
|
|
if newChannel.ChannelType() != "session" {
|
|
|
|
newChannel.Reject(ssh.UnknownChannelType, "unknown channel type")
|
|
|
|
continue
|
|
|
|
}
|
2020-07-03 04:03:11 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
channel, requests, err := newChannel.Accept()
|
|
|
|
if err != nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Channels have a type that is dependent on the protocol. For SFTP this is "subsystem"
|
|
|
|
// with a payload that (should) be "sftp". Discard anything else we receive ("pty", "shell", etc)
|
|
|
|
go func(in <-chan *ssh.Request) {
|
|
|
|
for req := range in {
|
|
|
|
ok := false
|
|
|
|
|
|
|
|
switch req.Type {
|
|
|
|
case "subsystem":
|
|
|
|
if string(req.Payload[4:]) == "sftp" {
|
|
|
|
ok = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
req.Reply(ok, nil)
|
|
|
|
}
|
|
|
|
}(requests)
|
|
|
|
|
|
|
|
// Configure the user's home folder for the rest of the request cycle.
|
|
|
|
if sconn.Permissions.Extensions["uuid"] == "" {
|
|
|
|
continue
|
|
|
|
}
|
2020-07-03 04:03:11 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
// Create a new handler for the currently logged in user's server.
|
|
|
|
fs := c.createHandler(sconn)
|
|
|
|
|
|
|
|
// Create the server instance for the channel using the filesystem we created above.
|
|
|
|
server := sftp.NewRequestServer(channel, fs)
|
|
|
|
|
|
|
|
if err := server.Serve(); err == io.EOF {
|
|
|
|
server.Close()
|
|
|
|
}
|
2020-07-03 04:03:11 +00:00
|
|
|
}
|
2020-09-01 03:14:04 +00:00
|
|
|
}
|
2020-07-03 04:03:11 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
// Creates a new SFTP handler for a given server. The directory argument should
|
|
|
|
// be the base directory for a server. All actions done on the server will be
|
|
|
|
// relative to that directory, and the user will not be able to escape out of it.
|
|
|
|
func (c Server) createHandler(sc *ssh.ServerConn) sftp.Handlers {
|
|
|
|
p := FileSystem{
|
|
|
|
UUID: sc.Permissions.Extensions["uuid"],
|
|
|
|
Permissions: strings.Split(sc.Permissions.Extensions["permissions"], ","),
|
|
|
|
ReadOnly: c.Settings.ReadOnly,
|
|
|
|
Cache: c.cache,
|
|
|
|
User: c.User,
|
|
|
|
HasDiskSpace: c.DiskSpaceValidator,
|
|
|
|
PathValidator: c.PathValidator,
|
|
|
|
logger: log.WithFields(log.Fields{
|
|
|
|
"subsystem": "sftp",
|
|
|
|
"username": sc.User(),
|
|
|
|
"ip": sc.RemoteAddr(),
|
|
|
|
}),
|
|
|
|
}
|
2020-07-03 04:03:11 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
return sftp.Handlers{
|
|
|
|
FileGet: p,
|
|
|
|
FilePut: p,
|
|
|
|
FileCmd: p,
|
|
|
|
FileList: p,
|
2020-07-03 04:03:11 +00:00
|
|
|
}
|
2020-09-01 03:14:04 +00:00
|
|
|
}
|
2020-07-03 04:03:11 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
// Generates a private key that will be used by the SFTP server.
|
|
|
|
func (c Server) generatePrivateKey() error {
|
|
|
|
key, err := rsa.GenerateKey(rand.Reader, 2048)
|
2019-12-08 01:35:45 +00:00
|
|
|
if err != nil {
|
2020-09-01 03:14:04 +00:00
|
|
|
return err
|
|
|
|
}
|
2020-07-03 04:03:11 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
if err := os.MkdirAll(path.Join(c.Settings.BasePath, ".sftp"), 0755); err != nil {
|
|
|
|
return err
|
2019-12-08 01:35:45 +00:00
|
|
|
}
|
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
o, err := os.OpenFile(path.Join(c.Settings.BasePath, ".sftp/id_rsa"), os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0600)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
defer o.Close()
|
2019-12-08 01:35:45 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
pkey := &pem.Block{
|
|
|
|
Type: "RSA PRIVATE KEY",
|
|
|
|
Bytes: x509.MarshalPKCS1PrivateKey(key),
|
2019-12-08 01:35:45 +00:00
|
|
|
}
|
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
if err := pem.Encode(o, pkey); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2020-05-29 05:07:53 +00:00
|
|
|
|
2020-09-01 03:14:04 +00:00
|
|
|
return nil
|
2019-12-07 22:01:40 +00:00
|
|
|
}
|