2025-07-05 20:09:01 +05:00
|
|
|
mod sftp;
|
2025-07-08 09:40:46 +05:00
|
|
|
mod config;
|
|
|
|
|
|
|
|
use std::{io::ErrorKind, net::SocketAddr, sync::Arc, time::Duration};
|
2025-07-09 06:15:21 +05:00
|
|
|
use config::{Config, DBConfig};
|
2025-07-05 20:09:01 +05:00
|
|
|
use russh::{keys::ssh_key::{rand_core::OsRng, PublicKey}, server::{Auth, Handler as SshHandler, Msg, Server, Session}, Channel, ChannelId};
|
|
|
|
use sftp::SftpSession;
|
2025-07-09 06:15:21 +05:00
|
|
|
use sqlx::{mysql::MySqlPoolOptions, postgres::PgPoolOptions, sqlite::SqlitePoolOptions, MySql, Pool, Postgres, Row, Sqlite};
|
2025-07-08 09:40:46 +05:00
|
|
|
use tokio::fs;
|
2025-07-02 06:39:31 +05:00
|
|
|
|
2025-07-09 06:15:21 +05:00
|
|
|
macro_rules! fetch_pub_key {
|
|
|
|
($pool:ident, $query:literal, $user:ident) => {
|
|
|
|
{
|
|
|
|
let row_res = sqlx::query($query)
|
|
|
|
.bind($user)
|
|
|
|
.fetch_one($pool).await;
|
|
|
|
match row_res {
|
|
|
|
Ok(row) => Some(row.get("public_key")),
|
|
|
|
Err(_) => None
|
|
|
|
}
|
|
|
|
}
|
|
|
|
};
|
|
|
|
}
|
|
|
|
|
2025-07-07 07:46:50 +05:00
|
|
|
struct SftpServer {
|
2025-07-09 06:15:21 +05:00
|
|
|
pool: Arc<DBPool>,
|
|
|
|
config: Arc<Config>
|
2025-07-07 07:46:50 +05:00
|
|
|
}
|
2025-07-02 06:39:31 +05:00
|
|
|
|
|
|
|
impl Server for SftpServer {
|
|
|
|
type Handler = SshSession;
|
|
|
|
|
|
|
|
fn new_client(&mut self, _peer_addr: Option<SocketAddr>) -> Self::Handler {
|
2025-07-07 07:46:50 +05:00
|
|
|
let session_pool = self.pool.clone();
|
2025-07-09 06:15:21 +05:00
|
|
|
let config = self.config.clone();
|
|
|
|
SshSession { channel: None, user: None, pool: session_pool, config }
|
2025-07-02 06:39:31 +05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
struct SshSession {
|
2025-07-04 12:02:10 +05:00
|
|
|
channel: Option<Channel<Msg>>,
|
2025-07-07 07:46:50 +05:00
|
|
|
user: Option<String>,
|
2025-07-09 06:15:21 +05:00
|
|
|
pool: Arc<DBPool>,
|
|
|
|
config: Arc<Config>
|
2025-07-02 06:39:31 +05:00
|
|
|
}
|
|
|
|
|
|
|
|
impl SshHandler for SshSession {
|
2025-07-05 20:09:01 +05:00
|
|
|
type Error = russh::Error;
|
2025-07-02 06:39:31 +05:00
|
|
|
|
|
|
|
async fn auth_publickey_offered(
|
2025-07-04 12:02:10 +05:00
|
|
|
&mut self,
|
|
|
|
user: &str,
|
|
|
|
public_key: &PublicKey,
|
|
|
|
) -> Result<Auth, Self::Error> {
|
|
|
|
self.user = Some(user.to_string());
|
2025-07-07 07:46:50 +05:00
|
|
|
|
2025-07-09 06:15:21 +05:00
|
|
|
let offered_key = public_key.to_string();
|
2025-07-07 07:46:50 +05:00
|
|
|
|
2025-07-09 06:15:21 +05:00
|
|
|
let stored_key_opt: Option<String> = match &*self.pool {
|
|
|
|
DBPool::Sqlite(pool) => fetch_pub_key!(pool, "SELECT * FROM users WHERE username = ?", user),
|
|
|
|
DBPool::Postgres(pool) => fetch_pub_key!(pool, "SELECT * FROM users WHERE username = $1", user),
|
|
|
|
DBPool::Mysql(pool) => fetch_pub_key!(pool, "SELECT * FROM users WHERE username = ?", user)
|
|
|
|
};
|
|
|
|
|
|
|
|
if let Some(stored_key) = stored_key_opt {
|
|
|
|
if stored_key == offered_key {
|
|
|
|
Ok(Auth::Accept)
|
2025-07-07 07:46:50 +05:00
|
|
|
}
|
2025-07-09 06:15:21 +05:00
|
|
|
else {
|
|
|
|
println!("invalid key");
|
2025-07-07 07:46:50 +05:00
|
|
|
Ok(Auth::reject())
|
|
|
|
}
|
|
|
|
}
|
2025-07-09 06:15:21 +05:00
|
|
|
else {
|
|
|
|
println!("user not found");
|
|
|
|
Ok(Auth::reject())
|
|
|
|
}
|
|
|
|
|
2025-07-02 06:39:31 +05:00
|
|
|
}
|
|
|
|
|
|
|
|
async fn auth_publickey(
|
2025-07-04 12:02:10 +05:00
|
|
|
&mut self,
|
2025-07-07 07:46:50 +05:00
|
|
|
_user: &str,
|
|
|
|
_public_key: &PublicKey,
|
2025-07-04 12:02:10 +05:00
|
|
|
) -> Result<Auth, Self::Error> {
|
2025-07-02 06:39:31 +05:00
|
|
|
Ok(Auth::Accept)
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn channel_open_session(
|
2025-07-04 12:02:10 +05:00
|
|
|
&mut self,
|
|
|
|
channel: russh::Channel<Msg>,
|
|
|
|
_session: &mut Session,
|
|
|
|
) -> Result<bool, Self::Error> {
|
2025-07-02 06:39:31 +05:00
|
|
|
self.channel = Some(channel);
|
|
|
|
Ok(true)
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn channel_eof(
|
2025-07-04 12:02:10 +05:00
|
|
|
&mut self,
|
|
|
|
channel_id: ChannelId,
|
|
|
|
session: &mut Session,
|
|
|
|
) -> Result<(), Self::Error> {
|
2025-07-02 06:39:31 +05:00
|
|
|
session.close(channel_id)
|
|
|
|
}
|
|
|
|
|
|
|
|
async fn subsystem_request(
|
2025-07-04 12:02:10 +05:00
|
|
|
&mut self,
|
|
|
|
channel_id: ChannelId,
|
|
|
|
name: &str,
|
|
|
|
session: &mut Session,
|
|
|
|
) -> Result<(), Self::Error> {
|
2025-07-02 06:39:31 +05:00
|
|
|
if name == "sftp" {
|
|
|
|
session.channel_success(channel_id)?;
|
2025-07-09 06:15:21 +05:00
|
|
|
let jail_dir = format!("{}/{}", self.config.general.jail_dir, self.user.as_ref().unwrap());
|
2025-07-05 20:09:01 +05:00
|
|
|
let sftp_handler = SftpSession::new(jail_dir);
|
2025-07-02 06:39:31 +05:00
|
|
|
russh_sftp::server::run(self.channel.take().ok_or(Self::Error::WrongChannel)?.into_stream(), sftp_handler).await;
|
|
|
|
}
|
|
|
|
else {
|
|
|
|
session.channel_failure(channel_id)?;
|
|
|
|
}
|
|
|
|
Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2025-07-09 06:15:21 +05:00
|
|
|
enum DBPool {
|
|
|
|
Sqlite(Pool<Sqlite>),
|
|
|
|
Postgres(Pool<Postgres>),
|
|
|
|
Mysql(Pool<MySql>)
|
|
|
|
}
|
|
|
|
|
2025-07-08 09:40:46 +05:00
|
|
|
|
2025-07-02 06:39:31 +05:00
|
|
|
#[tokio::main]
|
2025-07-07 07:46:50 +05:00
|
|
|
async fn main() -> Result<(), sqlx::Error> {
|
2025-07-08 09:40:46 +05:00
|
|
|
|
|
|
|
const CONFIG_PATH: &str = "/etc/flux-sftp/config.toml";
|
2025-07-09 06:15:21 +05:00
|
|
|
let config: Arc<Config>;
|
2025-07-08 09:40:46 +05:00
|
|
|
match fs::read_to_string(CONFIG_PATH).await {
|
|
|
|
Ok(toml) => {
|
|
|
|
match toml::from_str::<Config>(&toml) {
|
2025-07-09 06:15:21 +05:00
|
|
|
Ok(c) => config = Arc::new(c),
|
2025-07-08 09:40:46 +05:00
|
|
|
Err(e) => {
|
|
|
|
println!("error parsing config file: {}\n please make sure config file is valid", e);
|
|
|
|
return Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
Err(e) => {
|
|
|
|
match e.kind() {
|
|
|
|
ErrorKind::NotFound => println!("config file not found, please ensure config file is present at: {}", CONFIG_PATH),
|
|
|
|
_ => println!("error occured reading config file: {}", e)
|
|
|
|
}
|
|
|
|
return Ok(())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2025-07-09 06:15:21 +05:00
|
|
|
let url = match &config.database {
|
|
|
|
DBConfig::Sqlite { path } => format!("sqlite:{}", path),
|
|
|
|
DBConfig::Postgres { host, port, user, password, dbname } => format!("postgres://{}:{}@{}:{}/{}", user, password, host, port, dbname),
|
|
|
|
DBConfig::Mysql { host, port, user, password, dbname } => format!("mysql://{}:{}@{}:{}/{}", user, password, host, port, dbname),
|
|
|
|
};
|
|
|
|
|
|
|
|
let pool = match &config.database {
|
|
|
|
DBConfig::Sqlite { .. } => DBPool::Sqlite(SqlitePoolOptions::new().max_connections(3).connect(&url).await?),
|
|
|
|
DBConfig::Postgres { .. } => DBPool::Postgres(PgPoolOptions::new().max_connections(3).connect(&url).await?),
|
|
|
|
DBConfig::Mysql { .. } => DBPool::Mysql(MySqlPoolOptions::new().max_connections(3).connect(&url).await?)
|
|
|
|
};
|
2025-07-08 09:40:46 +05:00
|
|
|
|
2025-07-09 06:15:21 +05:00
|
|
|
let mut server = SftpServer { pool: Arc::new(pool), config: config.clone() };
|
2025-07-02 06:39:31 +05:00
|
|
|
|
2025-07-08 09:40:46 +05:00
|
|
|
let russh_config = russh::server::Config {
|
2025-07-02 06:39:31 +05:00
|
|
|
auth_rejection_time: Duration::from_secs(3),
|
|
|
|
auth_rejection_time_initial: Some(Duration::from_secs(0)),
|
|
|
|
keys: vec![
|
|
|
|
russh::keys::PrivateKey::random(&mut OsRng, russh::keys::Algorithm::Ed25519).unwrap(),
|
|
|
|
],
|
|
|
|
..Default::default()
|
|
|
|
};
|
|
|
|
|
2025-07-09 06:15:21 +05:00
|
|
|
server.run_on_address(Arc::new(russh_config), (&config.general.listen_address as &str, config.general.port)).await.unwrap();
|
2025-07-07 07:46:50 +05:00
|
|
|
Ok(())
|
2025-07-02 06:39:31 +05:00
|
|
|
}
|