mirror of
https://github.com/house-of-vanity/khm.git
synced 2025-08-21 14:27:14 +00:00
Added basic auth support
This commit is contained in:
5
Cargo.lock
generated
5
Cargo.lock
generated
@@ -1,6 +1,6 @@
|
|||||||
# This file is automatically @generated by Cargo.
|
# This file is automatically @generated by Cargo.
|
||||||
# It is not intended for manual editing.
|
# It is not intended for manual editing.
|
||||||
version = 3
|
version = 4
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "actix-codec"
|
name = "actix-codec"
|
||||||
@@ -1053,9 +1053,10 @@ dependencies = [
|
|||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "khm"
|
name = "khm"
|
||||||
version = "0.2.0"
|
version = "0.2.2"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"actix-web",
|
"actix-web",
|
||||||
|
"base64 0.21.7",
|
||||||
"chrono",
|
"chrono",
|
||||||
"clap",
|
"clap",
|
||||||
"env_logger",
|
"env_logger",
|
||||||
|
@@ -1,6 +1,6 @@
|
|||||||
[package]
|
[package]
|
||||||
name = "khm"
|
name = "khm"
|
||||||
version = "0.2.2"
|
version = "0.3.0"
|
||||||
edition = "2021"
|
edition = "2021"
|
||||||
authors = ["AB <ab@hexor.cy>", "ChatGPT-4o"]
|
authors = ["AB <ab@hexor.cy>", "ChatGPT-4o"]
|
||||||
|
|
||||||
@@ -11,6 +11,7 @@ serde_json = "1.0"
|
|||||||
env_logger = "0.11.3"
|
env_logger = "0.11.3"
|
||||||
log = "0.4"
|
log = "0.4"
|
||||||
regex = "1.10.5"
|
regex = "1.10.5"
|
||||||
|
base64 = "0.21"
|
||||||
tokio = { version = "1", features = ["full"] }
|
tokio = { version = "1", features = ["full"] }
|
||||||
tokio-postgres = { version = "0.7", features = ["with-chrono-0_4"] }
|
tokio-postgres = { version = "0.7", features = ["with-chrono-0_4"] }
|
||||||
clap = { version = "4", features = ["derive"] }
|
clap = { version = "4", features = ["derive"] }
|
||||||
|
@@ -1,4 +1,6 @@
|
|||||||
|
use base64::{engine::general_purpose, Engine as _};
|
||||||
use log::{error, info};
|
use log::{error, info};
|
||||||
|
use reqwest::header::{HeaderMap, HeaderValue, AUTHORIZATION};
|
||||||
use reqwest::Client;
|
use reqwest::Client;
|
||||||
use serde::{Deserialize, Serialize};
|
use serde::{Deserialize, Serialize};
|
||||||
use std::fs::File;
|
use std::fs::File;
|
||||||
@@ -48,10 +50,39 @@ fn write_known_hosts(file_path: &str, keys: &[SshKey]) -> io::Result<()> {
|
|||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn send_keys_to_server(host: &str, keys: Vec<SshKey>) -> Result<(), reqwest::Error> {
|
async fn send_keys_to_server(
|
||||||
|
host: &str,
|
||||||
|
keys: Vec<SshKey>,
|
||||||
|
auth_string: &str,
|
||||||
|
) -> Result<(), reqwest::Error> {
|
||||||
let client = Client::new();
|
let client = Client::new();
|
||||||
let url = format!("{}/keys", host);
|
let url = format!("{}/keys", host);
|
||||||
let response = client.post(&url).json(&keys).send().await?;
|
info!("URL: {} ", url);
|
||||||
|
|
||||||
|
let mut headers = HeaderMap::new();
|
||||||
|
|
||||||
|
if !auth_string.is_empty() {
|
||||||
|
let parts: Vec<&str> = auth_string.splitn(2, ':').collect();
|
||||||
|
if parts.len() == 2 {
|
||||||
|
let username = parts[0];
|
||||||
|
let password = parts[1];
|
||||||
|
|
||||||
|
let auth_header_value = format!("{}:{}", username, password);
|
||||||
|
let encoded_auth = general_purpose::STANDARD.encode(auth_header_value);
|
||||||
|
let auth_header = format!("Basic {}", encoded_auth);
|
||||||
|
|
||||||
|
headers.insert(AUTHORIZATION, HeaderValue::from_str(&auth_header).unwrap());
|
||||||
|
} else {
|
||||||
|
error!("Invalid auth string format. Expected 'username:password'");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
let response = client
|
||||||
|
.post(&url)
|
||||||
|
.headers(headers)
|
||||||
|
.json(&keys)
|
||||||
|
.send()
|
||||||
|
.await?;
|
||||||
|
|
||||||
if response.status().is_success() {
|
if response.status().is_success() {
|
||||||
info!("Keys successfully sent to server.");
|
info!("Keys successfully sent to server.");
|
||||||
@@ -65,22 +96,38 @@ async fn send_keys_to_server(host: &str, keys: Vec<SshKey>) -> Result<(), reqwes
|
|||||||
Ok(())
|
Ok(())
|
||||||
}
|
}
|
||||||
|
|
||||||
async fn get_keys_from_server(host: &str) -> Result<Vec<SshKey>, reqwest::Error> {
|
async fn get_keys_from_server(
|
||||||
|
host: &str,
|
||||||
|
auth_string: &str,
|
||||||
|
) -> Result<Vec<SshKey>, reqwest::Error> {
|
||||||
let client = Client::new();
|
let client = Client::new();
|
||||||
let url = format!("{}/keys", host);
|
let url = format!("{}/keys", host);
|
||||||
let response = client.get(&url).send().await?;
|
|
||||||
|
|
||||||
if response.status().is_success() {
|
let mut headers = HeaderMap::new();
|
||||||
|
|
||||||
|
if !auth_string.is_empty() {
|
||||||
|
let parts: Vec<&str> = auth_string.splitn(2, ':').collect();
|
||||||
|
if parts.len() == 2 {
|
||||||
|
let username = parts[0];
|
||||||
|
let password = parts[1];
|
||||||
|
|
||||||
|
let auth_header_value = format!("{}:{}", username, password);
|
||||||
|
let encoded_auth = general_purpose::STANDARD.encode(auth_header_value);
|
||||||
|
let auth_header = format!("Basic {}", encoded_auth);
|
||||||
|
|
||||||
|
headers.insert(AUTHORIZATION, HeaderValue::from_str(&auth_header).unwrap());
|
||||||
|
} else {
|
||||||
|
error!("Invalid auth string format. Expected 'username:password'");
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
let response = client.get(&url).headers(headers).send().await?;
|
||||||
|
|
||||||
|
let response = response.error_for_status()?;
|
||||||
|
|
||||||
let keys: Vec<SshKey> = response.json().await?;
|
let keys: Vec<SshKey> = response.json().await?;
|
||||||
info!("Received {} keys from server", keys.len());
|
info!("Received {} keys from server", keys.len());
|
||||||
Ok(keys)
|
Ok(keys)
|
||||||
} else {
|
|
||||||
error!(
|
|
||||||
"Failed to get keys from server. Status: {}",
|
|
||||||
response.status()
|
|
||||||
);
|
|
||||||
Ok(vec![])
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
pub async fn run_client(args: crate::Args) -> std::io::Result<()> {
|
pub async fn run_client(args: crate::Args) -> std::io::Result<()> {
|
||||||
@@ -89,13 +136,13 @@ pub async fn run_client(args: crate::Args) -> std::io::Result<()> {
|
|||||||
|
|
||||||
let host = args.host.expect("host is required in client mode");
|
let host = args.host.expect("host is required in client mode");
|
||||||
info!("Client mode: Sending keys to server at {}", host);
|
info!("Client mode: Sending keys to server at {}", host);
|
||||||
send_keys_to_server(&host, keys)
|
send_keys_to_server(&host, keys, &args.basic_auth)
|
||||||
.await
|
.await
|
||||||
.expect("Failed to send keys to server");
|
.expect("Failed to send keys to server");
|
||||||
|
|
||||||
if args.in_place {
|
if args.in_place {
|
||||||
info!("Client mode: In-place update is enabled. Fetching keys from server.");
|
info!("Client mode: In-place update is enabled. Fetching keys from server.");
|
||||||
let server_keys = get_keys_from_server(&host)
|
let server_keys = get_keys_from_server(&host, &args.basic_auth)
|
||||||
.await
|
.await
|
||||||
.expect("Failed to get keys from server");
|
.expect("Failed to get keys from server");
|
||||||
|
|
||||||
|
@@ -105,6 +105,10 @@ struct Args {
|
|||||||
help = "Client mode: Path to the known_hosts file"
|
help = "Client mode: Path to the known_hosts file"
|
||||||
)]
|
)]
|
||||||
known_hosts: String,
|
known_hosts: String,
|
||||||
|
|
||||||
|
/// Basic auth string for client mode. Format: user:pass
|
||||||
|
#[arg(long, default_value = "", help = "Client mode: Basic Auth credentials")]
|
||||||
|
basic_auth: String,
|
||||||
}
|
}
|
||||||
|
|
||||||
#[actix_web::main]
|
#[actix_web::main]
|
||||||
|
Reference in New Issue
Block a user