| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668 |
- import * as fs from 'mz/fs'
- import * as crypto from 'crypto'
- import * as path from 'path'
- // eslint-disable-next-line @typescript-eslint/no-duplicate-imports, no-duplicate-imports
- import * as sshpk from 'sshpk'
- import colors from 'ansi-colors'
- import stripAnsi from 'strip-ansi'
- import { Injector, NgZone } from '@angular/core'
- import { NgbModal } from '@ng-bootstrap/ng-bootstrap'
- import { ConfigService, FileProvidersService, HostAppService, NotificationsService, Platform, PlatformService, wrapPromise, PromptModalComponent, LogService } from 'tabby-core'
- import { BaseSession } from 'tabby-terminal'
- import { Socket } from 'net'
- import { Client, ClientChannel, SFTPWrapper } from 'ssh2'
- import { Subject, Observable } from 'rxjs'
- import { ProxyCommandStream } from '../services/ssh.service'
- import { PasswordStorageService } from '../services/passwordStorage.service'
- import { promisify } from 'util'
- import { SFTPSession } from './sftp'
- import { ALGORITHM_BLACKLIST, SSHAlgorithmType, PortForwardType, SSHProfile } from '../api'
- import { ForwardedPort } from './forwards'
- import { X11Socket } from './x11'
- const WINDOWS_OPENSSH_AGENT_PIPE = '\\\\.\\pipe\\openssh-ssh-agent'
- interface AuthMethod {
- type: 'none'|'publickey'|'agent'|'password'|'keyboard-interactive'|'hostbased'
- name?: string
- contents?: Buffer
- }
- export class KeyboardInteractivePrompt {
- responses: string[] = []
- constructor (
- public name: string,
- public instruction: string,
- public prompts: string[],
- private callback: (_: string[]) => void,
- ) { }
- respond (): void {
- this.callback(this.responses)
- }
- }
- export class SSHSession extends BaseSession {
- shell?: ClientChannel
- ssh: Client
- sftp?: SFTPWrapper
- forwardedPorts: ForwardedPort[] = []
- jumpStream: any
- proxyCommandStream: ProxyCommandStream|null = null
- savedPassword?: string
- get serviceMessage$ (): Observable<string> { return this.serviceMessage }
- get keyboardInteractivePrompt$ (): Observable<KeyboardInteractivePrompt> { return this.keyboardInteractivePrompt }
- agentPath?: string
- activePrivateKey: string|null = null
- authUsername: string|null = null
- private remainingAuthMethods: AuthMethod[] = []
- private serviceMessage = new Subject<string>()
- private keyboardInteractivePrompt = new Subject<KeyboardInteractivePrompt>()
- private keychainPasswordUsed = false
- private passwordStorage: PasswordStorageService
- private ngbModal: NgbModal
- private hostApp: HostAppService
- private platform: PlatformService
- private notifications: NotificationsService
- private zone: NgZone
- private fileProviders: FileProvidersService
- private config: ConfigService
- constructor (
- private injector: Injector,
- public profile: SSHProfile,
- ) {
- super(injector.get(LogService).create(`ssh-${profile.options.host}-${profile.options.port}`))
- this.passwordStorage = injector.get(PasswordStorageService)
- this.ngbModal = injector.get(NgbModal)
- this.hostApp = injector.get(HostAppService)
- this.platform = injector.get(PlatformService)
- this.notifications = injector.get(NotificationsService)
- this.zone = injector.get(NgZone)
- this.fileProviders = injector.get(FileProvidersService)
- this.config = injector.get(ConfigService)
- this.destroyed$.subscribe(() => {
- for (const port of this.forwardedPorts) {
- port.stopLocalListener()
- }
- })
- this.setLoginScriptsOptions(profile.options)
- }
- async init (): Promise<void> {
- if (this.hostApp.platform === Platform.Windows) {
- if (this.config.store.ssh.agentType === 'auto') {
- if (await fs.exists(WINDOWS_OPENSSH_AGENT_PIPE)) {
- this.agentPath = WINDOWS_OPENSSH_AGENT_PIPE
- } else {
- if (await this.platform.isProcessRunning('pageant.exe')) {
- this.agentPath = 'pageant'
- }
- }
- } else if (this.config.store.ssh.agentType === 'pageant') {
- this.agentPath = 'pageant'
- } else {
- this.agentPath = this.config.store.ssh.agentPath || WINDOWS_OPENSSH_AGENT_PIPE
- }
- } else {
- this.agentPath = process.env.SSH_AUTH_SOCK!
- }
- this.remainingAuthMethods = [{ type: 'none' }]
- if (!this.profile.options.auth || this.profile.options.auth === 'publicKey') {
- if (this.profile.options.privateKeys?.length) {
- for (const pk of this.profile.options.privateKeys) {
- try {
- this.remainingAuthMethods.push({
- type: 'publickey',
- name: pk,
- contents: await this.fileProviders.retrieveFile(pk),
- })
- } catch (error) {
- this.emitServiceMessage(colors.bgYellow.yellow.black(' ! ') + ` Could not load private key ${pk}: ${error}`)
- }
- }
- } else {
- this.remainingAuthMethods.push({
- type: 'publickey',
- name: 'auto',
- })
- }
- }
- if (!this.profile.options.auth || this.profile.options.auth === 'agent') {
- if (!this.agentPath) {
- this.emitServiceMessage(colors.bgYellow.yellow.black(' ! ') + ` Agent auth selected, but no running agent is detected`)
- } else {
- this.remainingAuthMethods.push({ type: 'agent' })
- }
- }
- if (!this.profile.options.auth || this.profile.options.auth === 'password') {
- this.remainingAuthMethods.push({ type: 'password' })
- }
- if (!this.profile.options.auth || this.profile.options.auth === 'keyboardInteractive') {
- this.remainingAuthMethods.push({ type: 'keyboard-interactive' })
- }
- this.remainingAuthMethods.push({ type: 'hostbased' })
- }
- async openSFTP (): Promise<SFTPSession> {
- if (!this.sftp) {
- this.sftp = await wrapPromise(this.zone, promisify<SFTPWrapper>(f => this.ssh.sftp(f))())
- }
- return new SFTPSession(this.sftp, this.injector)
- }
- async start (interactive = true): Promise<void> {
- const log = (s: any) => this.emitServiceMessage(s)
- const ssh = new Client()
- this.ssh = ssh
- await this.init()
- let connected = false
- const algorithms = {}
- for (const key of Object.values(SSHAlgorithmType)) {
- algorithms[key] = this.profile.options.algorithms![key].filter(x => !ALGORITHM_BLACKLIST.includes(x))
- }
- const resultPromise: Promise<void> = new Promise(async (resolve, reject) => {
- ssh.on('ready', () => {
- connected = true
- if (this.savedPassword) {
- this.passwordStorage.savePassword(this.profile, this.savedPassword)
- }
- for (const fw of this.profile.options.forwardedPorts ?? []) {
- this.addPortForward(Object.assign(new ForwardedPort(), fw))
- }
- this.zone.run(resolve)
- })
- ssh.on('handshake', negotiated => {
- this.logger.info('Handshake complete:', negotiated)
- })
- ssh.on('error', error => {
- if (error.message === 'All configured authentication methods failed') {
- this.passwordStorage.deletePassword(this.profile)
- }
- this.zone.run(() => {
- if (connected) {
- // eslint-disable-next-line @typescript-eslint/no-base-to-string
- this.notifications.error(error.toString())
- } else {
- reject(error)
- }
- })
- })
- ssh.on('close', () => {
- if (this.open) {
- this.destroy()
- }
- })
- ssh.on('keyboard-interactive', (name, instructions, instructionsLang, prompts, finish) => this.zone.run(async () => {
- this.emitKeyboardInteractivePrompt(new KeyboardInteractivePrompt(
- name,
- instructions,
- prompts.map(x => x.prompt),
- finish,
- ))
- }))
- ssh.on('greeting', greeting => {
- if (!this.profile.options.skipBanner) {
- log('Greeting: ' + greeting)
- }
- })
- ssh.on('banner', banner => {
- if (!this.profile.options.skipBanner) {
- log(banner)
- }
- })
- })
- try {
- if (this.profile.options.proxyCommand) {
- this.emitServiceMessage(colors.bgBlue.black(' Proxy command ') + ` Using ${this.profile.options.proxyCommand}`)
- this.proxyCommandStream = new ProxyCommandStream(this.profile.options.proxyCommand)
- this.proxyCommandStream.on('error', err => {
- this.emitServiceMessage(colors.bgRed.black(' X ') + ` ${err.message}`)
- this.destroy()
- })
- this.proxyCommandStream.output$.subscribe((message: string) => {
- this.emitServiceMessage(colors.bgBlue.black(' Proxy command ') + ' ' + message.trim())
- })
- await this.proxyCommandStream.start()
- }
- this.authUsername ??= this.profile.options.user
- if (!this.authUsername) {
- const modal = this.ngbModal.open(PromptModalComponent)
- modal.componentInstance.prompt = `Username for ${this.profile.options.host}`
- try {
- const result = await modal.result
- this.authUsername = result?.value ?? null
- } catch {
- this.authUsername = 'root'
- }
- }
- ssh.connect({
- host: this.profile.options.host.trim(),
- port: this.profile.options.port ?? 22,
- sock: this.proxyCommandStream ?? this.jumpStream,
- username: this.authUsername ?? undefined,
- tryKeyboard: true,
- agent: this.agentPath,
- agentForward: this.profile.options.agentForward && !!this.agentPath,
- keepaliveInterval: this.profile.options.keepaliveInterval ?? 15000,
- keepaliveCountMax: this.profile.options.keepaliveCountMax,
- readyTimeout: this.profile.options.readyTimeout,
- hostVerifier: (digest: string) => {
- log('Host key fingerprint:')
- log(colors.white.bgBlack(' SHA256 ') + colors.bgBlackBright(' ' + digest + ' '))
- return true
- },
- hostHash: 'sha256' as any,
- algorithms,
- authHandler: (methodsLeft, partialSuccess, callback) => {
- this.zone.run(async () => {
- const a = await this.handleAuth(methodsLeft)
- console.warn(a)
- callback(a)
- })
- },
- })
- } catch (e) {
- this.notifications.error(e.message)
- throw e
- }
- await resultPromise
- this.open = true
- if (!interactive) {
- return
- }
- // -----------
- try {
- this.shell = await this.openShellChannel({ x11: this.profile.options.x11 })
- } catch (err) {
- this.emitServiceMessage(colors.bgRed.black(' X ') + ` Remote rejected opening a shell channel: ${err}`)
- if (err.toString().includes('Unable to request X11')) {
- this.emitServiceMessage(' Make sure `xauth` is installed on the remote side')
- }
- return
- }
- this.loginScriptProcessor?.executeUnconditionalScripts()
- this.shell.on('greeting', greeting => {
- this.emitServiceMessage(`Shell greeting: ${greeting}`)
- })
- this.shell.on('banner', banner => {
- this.emitServiceMessage(`Shell banner: ${banner}`)
- })
- this.shell.on('data', data => {
- this.emitOutput(data)
- })
- this.shell.on('end', () => {
- this.logger.info('Shell session ended')
- if (this.open) {
- this.destroy()
- }
- })
- this.ssh.on('tcp connection', (details, accept, reject) => {
- this.logger.info(`Incoming forwarded connection: (remote) ${details.srcIP}:${details.srcPort} -> (local) ${details.destIP}:${details.destPort}`)
- const forward = this.forwardedPorts.find(x => x.port === details.destPort)
- if (!forward) {
- this.emitServiceMessage(colors.bgRed.black(' X ') + ` Rejected incoming forwarded connection for unrecognized port ${details.destPort}`)
- reject()
- return
- }
- const socket = new Socket()
- socket.connect(forward.targetPort, forward.targetAddress)
- socket.on('error', e => {
- // eslint-disable-next-line @typescript-eslint/no-base-to-string
- this.emitServiceMessage(colors.bgRed.black(' X ') + ` Could not forward the remote connection to ${forward.targetAddress}:${forward.targetPort}: ${e}`)
- reject()
- })
- socket.on('connect', () => {
- this.logger.info('Connection forwarded')
- const stream = accept()
- stream.pipe(socket)
- socket.pipe(stream)
- stream.on('close', () => {
- socket.destroy()
- })
- socket.on('close', () => {
- stream.close()
- })
- })
- })
- this.ssh.on('x11', async (details, accept, reject) => {
- this.logger.info(`Incoming X11 connection from ${details.srcIP}:${details.srcPort}`)
- const displaySpec = process.env.DISPLAY ?? 'localhost:0'
- this.logger.debug(`Trying display ${displaySpec}`)
- const socket = new X11Socket()
- try {
- const x11Stream = await socket.connect(displaySpec)
- this.logger.info('Connection forwarded')
- const stream = accept()
- stream.pipe(x11Stream)
- x11Stream.pipe(stream)
- stream.on('close', () => {
- socket.destroy()
- })
- x11Stream.on('close', () => {
- stream.close()
- })
- } catch (e) {
- // eslint-disable-next-line @typescript-eslint/no-base-to-string
- this.emitServiceMessage(colors.bgRed.black(' X ') + ` Could not connect to the X server: ${e}`)
- this.emitServiceMessage(` Tabby tried to connect to ${JSON.stringify(X11Socket.resolveDisplaySpec(displaySpec))} based on the DISPLAY environment var (${displaySpec})`)
- if (process.platform === 'win32') {
- this.emitServiceMessage(' To use X forwarding, you need a local X server, e.g.:')
- this.emitServiceMessage(' * VcXsrv: https://sourceforge.net/projects/vcxsrv/')
- this.emitServiceMessage(' * Xming: https://sourceforge.net/projects/xming/')
- }
- reject()
- }
- })
- }
- emitServiceMessage (msg: string): void {
- this.serviceMessage.next(msg)
- this.logger.info(stripAnsi(msg))
- }
- emitKeyboardInteractivePrompt (prompt: KeyboardInteractivePrompt): void {
- this.logger.info('Keyboard-interactive auth:', prompt.name, prompt.instruction)
- this.emitServiceMessage(colors.bgBlackBright(' ') + ` Keyboard-interactive auth requested: ${prompt.name}`)
- if (prompt.instruction) {
- for (const line of prompt.instruction.split('\n')) {
- this.emitServiceMessage(line)
- }
- }
- this.keyboardInteractivePrompt.next(prompt)
- }
- async handleAuth (methodsLeft?: string[] | null): Promise<any> {
- this.activePrivateKey = null
- while (true) {
- const method = this.remainingAuthMethods.shift()
- if (!method) {
- return false
- }
- if (methodsLeft && !methodsLeft.includes(method.type) && method.type !== 'agent') {
- // Agent can still be used even if not in methodsLeft
- this.logger.info('Server does not support auth method', method.type)
- continue
- }
- if (method.type === 'password') {
- if (this.profile.options.password) {
- this.emitServiceMessage('Using preset password')
- return {
- type: 'password',
- username: this.authUsername,
- password: this.profile.options.password,
- }
- }
- if (!this.keychainPasswordUsed && this.profile.options.user) {
- const password = await this.passwordStorage.loadPassword(this.profile)
- if (password) {
- this.emitServiceMessage('Trying saved password')
- this.keychainPasswordUsed = true
- return {
- type: 'password',
- username: this.authUsername,
- password,
- }
- }
- }
- const modal = this.ngbModal.open(PromptModalComponent)
- modal.componentInstance.prompt = `Password for ${this.authUsername}@${this.profile.options.host}`
- modal.componentInstance.password = true
- modal.componentInstance.showRememberCheckbox = true
- try {
- const result = await modal.result
- if (result) {
- if (result.remember) {
- this.savedPassword = result.value
- }
- return {
- type: 'password',
- username: this.authUsername,
- password: result.value,
- }
- } else {
- continue
- }
- } catch {
- continue
- }
- }
- if (method.type === 'publickey') {
- try {
- const key = await this.loadPrivateKey(method.contents)
- return {
- type: 'publickey',
- username: this.authUsername,
- key,
- }
- } catch (e) {
- this.emitServiceMessage(colors.bgYellow.yellow.black(' ! ') + ` Failed to load private key ${method.name}: ${e}`)
- continue
- }
- }
- return method.type
- }
- }
- async addPortForward (fw: ForwardedPort): Promise<void> {
- if (fw.type === PortForwardType.Local || fw.type === PortForwardType.Dynamic) {
- await fw.startLocalListener((accept, reject, sourceAddress, sourcePort, targetAddress, targetPort) => {
- this.logger.info(`New connection on ${fw}`)
- this.ssh.forwardOut(
- sourceAddress ?? '127.0.0.1',
- sourcePort ?? 0,
- targetAddress,
- targetPort,
- (err, stream) => {
- if (err) {
- // eslint-disable-next-line @typescript-eslint/no-base-to-string
- this.emitServiceMessage(colors.bgRed.black(' X ') + ` Remote has rejected the forwarded connection to ${targetAddress}:${targetPort} via ${fw}: ${err}`)
- reject()
- return
- }
- const socket = accept()
- stream.pipe(socket)
- socket.pipe(stream)
- stream.on('close', () => {
- socket.destroy()
- })
- socket.on('close', () => {
- stream.close()
- })
- }
- )
- }).then(() => {
- this.emitServiceMessage(colors.bgGreen.black(' -> ') + ` Forwarded ${fw}`)
- this.forwardedPorts.push(fw)
- }).catch(e => {
- this.emitServiceMessage(colors.bgRed.black(' X ') + ` Failed to forward port ${fw}: ${e}`)
- throw e
- })
- }
- if (fw.type === PortForwardType.Remote) {
- await new Promise<void>((resolve, reject) => {
- this.ssh.forwardIn(fw.host, fw.port, err => {
- if (err) {
- // eslint-disable-next-line @typescript-eslint/no-base-to-string
- this.emitServiceMessage(colors.bgRed.black(' X ') + ` Remote rejected port forwarding for ${fw}: ${err}`)
- reject(err)
- return
- }
- resolve()
- })
- })
- this.emitServiceMessage(colors.bgGreen.black(' <- ') + ` Forwarded ${fw}`)
- this.forwardedPorts.push(fw)
- }
- }
- async removePortForward (fw: ForwardedPort): Promise<void> {
- if (fw.type === PortForwardType.Local || fw.type === PortForwardType.Dynamic) {
- fw.stopLocalListener()
- this.forwardedPorts = this.forwardedPorts.filter(x => x !== fw)
- }
- if (fw.type === PortForwardType.Remote) {
- this.ssh.unforwardIn(fw.host, fw.port)
- this.forwardedPorts = this.forwardedPorts.filter(x => x !== fw)
- }
- this.emitServiceMessage(`Stopped forwarding ${fw}`)
- }
- resize (columns: number, rows: number): void {
- if (this.shell) {
- this.shell.setWindow(rows, columns, rows, columns)
- }
- }
- write (data: Buffer): void {
- if (this.shell) {
- this.shell.write(data)
- }
- }
- kill (signal?: string): void {
- if (this.shell) {
- this.shell.signal(signal ?? 'TERM')
- }
- }
- async destroy (): Promise<void> {
- this.serviceMessage.complete()
- this.proxyCommandStream?.destroy()
- this.kill()
- this.ssh.end()
- await super.destroy()
- }
- async getChildProcesses (): Promise<any[]> {
- return []
- }
- async gracefullyKillProcess (): Promise<void> {
- this.kill('TERM')
- }
- supportsWorkingDirectory (): boolean {
- return !!this.reportedCWD
- }
- async getWorkingDirectory (): Promise<string|null> {
- return this.reportedCWD ?? null
- }
- private openShellChannel (options): Promise<ClientChannel> {
- return new Promise<ClientChannel>((resolve, reject) => {
- this.ssh.shell({ term: 'xterm-256color' }, options, (err, shell) => {
- if (err) {
- reject(err)
- } else {
- resolve(shell)
- }
- })
- })
- }
- async loadPrivateKey (privateKeyContents?: Buffer): Promise<string|null> {
- if (!privateKeyContents) {
- const userKeyPath = path.join(process.env.HOME!, '.ssh', 'id_rsa')
- if (await fs.exists(userKeyPath)) {
- this.emitServiceMessage('Using user\'s default private key')
- privateKeyContents = await fs.readFile(userKeyPath, { encoding: null })
- }
- }
- if (!privateKeyContents) {
- return null
- }
- this.emitServiceMessage('Loading private key')
- try {
- const parsedKey = await this.parsePrivateKey(privateKeyContents.toString())
- this.activePrivateKey = parsedKey.toString('openssh')
- return this.activePrivateKey
- } catch (error) {
- this.emitServiceMessage(colors.bgRed.black(' X ') + ' Could not read the private key file')
- this.emitServiceMessage(colors.bgRed.black(' X ') + ` ${error}`)
- this.notifications.error('Could not read the private key file')
- return null
- }
- }
- async parsePrivateKey (privateKey: string): Promise<any> {
- const keyHash = crypto.createHash('sha512').update(privateKey).digest('hex')
- let triedSavedPassphrase = false
- let passphrase: string|null = null
- while (true) {
- try {
- return sshpk.parsePrivateKey(privateKey, 'auto', { passphrase })
- } catch (e) {
- if (!triedSavedPassphrase) {
- passphrase = await this.passwordStorage.loadPrivateKeyPassword(keyHash)
- triedSavedPassphrase = true
- continue
- }
- if (e instanceof sshpk.KeyEncryptedError || e instanceof sshpk.KeyParseError) {
- await this.passwordStorage.deletePrivateKeyPassword(keyHash)
- const modal = this.ngbModal.open(PromptModalComponent)
- modal.componentInstance.prompt = 'Private key passphrase'
- modal.componentInstance.password = true
- modal.componentInstance.showRememberCheckbox = true
- try {
- const result = await modal.result
- passphrase = result?.value
- if (passphrase && result.remember) {
- this.passwordStorage.savePrivateKeyPassword(keyHash, passphrase)
- }
- } catch {
- throw e
- }
- } else {
- this.notifications.error('Could not read the private key', e.toString())
- throw e
- }
- }
- }
- }
- }
|