Files
khm/src/client.rs

232 lines
7.1 KiB
Rust
Raw Normal View History

2025-03-14 02:14:15 +02:00
use base64::{engine::general_purpose, Engine as _};
use log::{error, info};
2025-03-14 02:14:15 +02:00
use reqwest::header::{HeaderMap, HeaderValue, AUTHORIZATION};
2024-07-07 21:13:19 +03:00
use reqwest::Client;
use serde::{Deserialize, Serialize};
2024-07-07 21:02:39 +03:00
use std::fs::File;
use std::io::{self, BufRead, Write};
use std::path::Path;
#[derive(Serialize, Deserialize, Clone, Debug)]
struct SshKey {
server: String,
public_key: String,
2025-07-18 18:35:04 +03:00
#[serde(default)]
deprecated: bool,
2024-07-07 21:02:39 +03:00
}
fn read_known_hosts(file_path: &str) -> io::Result<Vec<SshKey>> {
let path = Path::new(file_path);
let file = File::open(&path)?;
let reader = io::BufReader::new(file);
let mut keys = Vec::new();
for line in reader.lines() {
2024-07-09 02:28:44 +03:00
match line {
Ok(line) => {
let parts: Vec<&str> = line.split_whitespace().collect();
if parts.len() >= 2 {
let server = parts[0].to_string();
let public_key = parts[1..].join(" ");
keys.push(SshKey {
server,
2025-07-18 18:35:04 +03:00
public_key,
deprecated: false, // Keys from known_hosts are not deprecated
2025-07-18 18:35:04 +03:00
});
2024-07-09 02:28:44 +03:00
}
}
2024-07-09 02:28:44 +03:00
Err(e) => {
error!("Error reading line from known_hosts file: {}", e);
2024-07-07 21:02:39 +03:00
}
}
}
2024-07-09 02:28:44 +03:00
info!("Read {} keys from known_hosts file", keys.len());
2024-07-07 21:02:39 +03:00
Ok(keys)
}
fn write_known_hosts(file_path: &str, keys: &[SshKey]) -> io::Result<()> {
let path = Path::new(file_path);
let mut file = File::create(&path)?;
2025-07-18 18:35:04 +03:00
// Filter out deprecated keys - they should not be written to known_hosts
let active_keys: Vec<&SshKey> = keys.iter().filter(|key| !key.deprecated).collect();
let active_count = active_keys.len();
for key in active_keys {
2024-07-07 21:02:39 +03:00
writeln!(file, "{} {}", key.server, key.public_key)?;
}
info!(
"Wrote {} active keys to known_hosts file (filtered out deprecated keys)",
active_count
);
2024-07-07 21:02:39 +03:00
Ok(())
}
// Get local hostname for request headers
fn get_hostname() -> String {
match hostname::get() {
Ok(name) => name.to_string_lossy().to_string(),
Err(_) => "unknown-host".to_string(),
}
}
2025-03-14 02:14:15 +02:00
async fn send_keys_to_server(
host: &str,
keys: Vec<SshKey>,
auth_string: &str,
) -> Result<(), reqwest::Error> {
2024-07-07 21:02:39 +03:00
let client = Client::new();
let url = format!("{}/keys", host);
2025-03-14 02:14:15 +02:00
info!("URL: {} ", url);
let mut headers = HeaderMap::new();
// Add hostname header
let hostname = get_hostname();
headers.insert(
"X-Client-Hostname",
HeaderValue::from_str(&hostname).unwrap_or_else(|_| {
error!("Failed to create hostname header value");
HeaderValue::from_static("unknown-host")
}),
);
info!("Adding hostname header: {}", hostname);
2025-03-14 02:14:15 +02:00
if !auth_string.is_empty() {
let parts: Vec<&str> = auth_string.splitn(2, ':').collect();
if parts.len() == 2 {
let username = parts[0];
let password = parts[1];
let auth_header_value = format!("{}:{}", username, password);
let encoded_auth = general_purpose::STANDARD.encode(auth_header_value);
let auth_header = format!("Basic {}", encoded_auth);
headers.insert(AUTHORIZATION, HeaderValue::from_str(&auth_header).unwrap());
} else {
error!("Invalid auth string format. Expected 'username:password'");
}
}
let response = client
.post(&url)
.headers(headers)
.json(&keys)
.send()
.await?;
2024-07-07 21:02:39 +03:00
if response.status().is_success() {
2024-07-09 02:28:44 +03:00
info!("Keys successfully sent to server.");
2024-07-07 21:02:39 +03:00
} else {
2024-07-09 02:28:44 +03:00
error!(
2024-07-07 21:13:19 +03:00
"Failed to send keys to server. Status: {}",
response.status()
);
2024-07-07 21:02:39 +03:00
}
Ok(())
}
2025-03-14 02:14:15 +02:00
async fn get_keys_from_server(
host: &str,
auth_string: &str,
) -> Result<Vec<SshKey>, reqwest::Error> {
2024-07-07 21:02:39 +03:00
let client = Client::new();
let url = format!("{}/keys", host);
2025-03-14 02:14:15 +02:00
let mut headers = HeaderMap::new();
// Add hostname header
let hostname = get_hostname();
headers.insert(
"X-Client-Hostname",
HeaderValue::from_str(&hostname).unwrap_or_else(|_| {
error!("Failed to create hostname header value");
HeaderValue::from_static("unknown-host")
}),
);
info!("Adding hostname header: {}", hostname);
2025-03-14 02:14:15 +02:00
if !auth_string.is_empty() {
let parts: Vec<&str> = auth_string.splitn(2, ':').collect();
if parts.len() == 2 {
let username = parts[0];
let password = parts[1];
let auth_header_value = format!("{}:{}", username, password);
let encoded_auth = general_purpose::STANDARD.encode(auth_header_value);
let auth_header = format!("Basic {}", encoded_auth);
headers.insert(AUTHORIZATION, HeaderValue::from_str(&auth_header).unwrap());
} else {
error!("Invalid auth string format. Expected 'username:password'");
}
2024-07-07 21:02:39 +03:00
}
2025-03-14 02:14:15 +02:00
let response = client.get(&url).headers(headers).send().await?;
let response = response.error_for_status()?;
let keys: Vec<SshKey> = response.json().await?;
info!("Received {} keys from server", keys.len());
Ok(keys)
2024-07-07 21:02:39 +03:00
}
pub async fn run_client(args: crate::Args) -> std::io::Result<()> {
2024-07-09 02:28:44 +03:00
info!("Client mode: Reading known_hosts file");
2025-07-18 17:52:58 +03:00
let keys = match read_known_hosts(&args.known_hosts) {
Ok(keys) => keys,
Err(e) => {
if e.kind() == io::ErrorKind::NotFound {
info!(
"known_hosts file not found: {}. Starting with empty key list.",
args.known_hosts
);
2025-07-18 17:52:58 +03:00
Vec::new()
} else {
error!("Failed to read known_hosts file: {}", e);
return Err(e);
}
}
};
2024-07-07 21:02:39 +03:00
let host = args.host.expect("host is required in client mode");
2025-07-19 15:51:17 +03:00
let flow = args.flow.expect("flow is required in client mode");
let url = format!("{}/{}", host, flow);
2025-07-19 15:51:17 +03:00
info!("Client mode: Sending keys to server at {}", url);
if let Err(e) = send_keys_to_server(&url, keys, &args.basic_auth).await {
2025-07-18 17:52:58 +03:00
error!("Failed to send keys to server: {}", e);
return Err(io::Error::new(
io::ErrorKind::Other,
format!("Network error: {}", e),
));
2025-07-18 17:52:58 +03:00
}
2024-07-07 21:02:39 +03:00
if args.in_place {
2024-07-09 02:28:44 +03:00
info!("Client mode: In-place update is enabled. Fetching keys from server.");
2025-07-19 15:51:17 +03:00
let server_keys = match get_keys_from_server(&url, &args.basic_auth).await {
2025-07-18 17:52:58 +03:00
Ok(keys) => keys,
Err(e) => {
error!("Failed to get keys from server: {}", e);
return Err(io::Error::new(
io::ErrorKind::Other,
format!("Network error: {}", e),
));
2025-07-18 17:52:58 +03:00
}
};
2024-07-07 21:02:39 +03:00
2024-07-09 02:28:44 +03:00
info!("Client mode: Writing updated known_hosts file");
2025-07-18 17:52:58 +03:00
if let Err(e) = write_known_hosts(&args.known_hosts, &server_keys) {
error!("Failed to write known_hosts file: {}", e);
return Err(e);
}
2024-07-07 21:02:39 +03:00
}
2024-07-09 02:28:44 +03:00
info!("Client mode: Finished operations");
2024-07-07 21:02:39 +03:00
Ok(())
}