优化部署

This commit is contained in:
xiuting.xu 2026-05-12 15:23:09 +08:00
parent a4d674190a
commit 4c6b441753
18 changed files with 273 additions and 69 deletions

View File

@ -3,6 +3,10 @@ name = "rpki"
version = "0.1.0" version = "0.1.0"
edition = "2024" edition = "2024"
[[bin]]
name = "rpki_rtr"
path = "src/main_rtr.rs"
[dependencies] [dependencies]
der-parser = "10.0.0" der-parser = "10.0.0"
hex = "0.4.3" hex = "0.4.3"

17
deploy/client/.env Normal file
View File

@ -0,0 +1,17 @@
# Target RTR server address for client compose files
# TCP example: 10.0.0.12:323
# TLS example: rpki.example.com:324
# SSH example: 10.0.0.12:22
RPKI_RTR_SERVER_ADDR=rpki-rtr-tcp:323
# TLS server name used by --server-name in TLS mode
# Must match server certificate SAN dNSName.
RPKI_RTR_TLS_SERVER_NAME=localhost
# SSH mode examples:
# RPKI_RTR_SERVER_ADDR=10.0.0.12:2222
# RPKI_RTR_CLIENT_KEYS_VOLUME=../../certs:/app/certs:ro
# RPKI_RTR_CLIENT_KEY_PATH=/app/certs/rtr-client.key
# RPKI_RTR_SSH_SERVER_PUBKEY_PATH=/app/certs/ssh_host_rsa_key.pub
# RPKI_RTR_SSH_USERNAME=rpki-rtr
# RPKI_RTR_SSH_PASSWORD=your-password

View File

@ -3,7 +3,7 @@ version: "3.9"
services: services:
rtr-client-1: rtr-client-1:
image: rpki-rtr-debug-client:latest image: rpki-rtr-debug-client:latest
command: ["rpki-rtr-tcp:323", "2", "reset", "--keep-after-error", "--summary-only"] command: ["${RPKI_RTR_SERVER_ADDR:-rpki-rtr-tcp:323}", "2", "reset", "--keep-after-error", "--summary-only"]
volumes: volumes:
- ../../logs/client:/app/logs - ../../logs/client:/app/logs
restart: no restart: no
@ -12,7 +12,7 @@ services:
rtr-client-2: rtr-client-2:
image: rpki-rtr-debug-client:latest image: rpki-rtr-debug-client:latest
command: ["rpki-rtr-tcp:323", "2", "reset", "--keep-after-error", "--summary-only"] command: ["${RPKI_RTR_SERVER_ADDR:-rpki-rtr-tcp:323}", "2", "reset", "--keep-after-error", "--summary-only"]
volumes: volumes:
- ../../logs/client:/app/logs - ../../logs/client:/app/logs
restart: no restart: no
@ -21,7 +21,7 @@ services:
rtr-client-3: rtr-client-3:
image: rpki-rtr-debug-client:latest image: rpki-rtr-debug-client:latest
command: ["rpki-rtr-tcp:323", "2", "reset", "--keep-after-error", "--summary-only"] command: ["${RPKI_RTR_SERVER_ADDR:-rpki-rtr-tcp:323}", "2", "reset", "--keep-after-error", "--summary-only"]
volumes: volumes:
- ../../logs/client:/app/logs - ../../logs/client:/app/logs
restart: no restart: no
@ -30,7 +30,7 @@ services:
rtr-client-4: rtr-client-4:
image: rpki-rtr-debug-client:latest image: rpki-rtr-debug-client:latest
command: ["rpki-rtr-tcp:323", "2", "reset", "--keep-after-error", "--summary-only"] command: ["${RPKI_RTR_SERVER_ADDR:-rpki-rtr-tcp:323}", "2", "reset", "--keep-after-error", "--summary-only"]
volumes: volumes:
- ../../logs/client:/app/logs - ../../logs/client:/app/logs
restart: no restart: no
@ -39,7 +39,7 @@ services:
rtr-client-5: rtr-client-5:
image: rpki-rtr-debug-client:latest image: rpki-rtr-debug-client:latest
command: ["rpki-rtr-tcp:323", "2", "reset", "--keep-after-error", "--summary-only"] command: ["${RPKI_RTR_SERVER_ADDR:-rpki-rtr-tcp:323}", "2", "reset", "--keep-after-error", "--summary-only"]
volumes: volumes:
- ../../logs/client:/app/logs - ../../logs/client:/app/logs
restart: no restart: no

View File

@ -0,0 +1,36 @@
version: "3.9"
services:
rtr-debug-client:
build:
context: ../..
dockerfile: deploy/client/Dockerfile
image: rpki-rtr-debug-client:latest
command:
[
"${RPKI_RTR_SERVER_ADDR:-rpki-rtr-ssh:22}",
"2",
"reset",
"--ssh",
"--ssh-user",
"${RPKI_RTR_SSH_USERNAME:-rpki-rtr}",
"--ssh-password",
"${RPKI_RTR_SSH_PASSWORD}",
"--ssh-server-key",
"${RPKI_RTR_SSH_SERVER_PUBKEY_PATH:-/app/certs/ssh_host_rsa_key.pub}",
"--keep-after-error",
"--summary-only"
]
volumes:
- ${RPKI_RTR_CLIENT_KEYS_VOLUME:-../../certs:/app/certs:ro}
- ../../logs/client:/app/logs
restart: no
stdin_open: true
tty: true
networks:
- rpki_net
networks:
rpki_net:
name: rpki_net
driver: bridge

View File

@ -8,21 +8,21 @@ services:
image: rpki-rtr-debug-client:latest image: rpki-rtr-debug-client:latest
command: command:
[ [
"rpki-rtr-ssh:${RPKI_RTR_SSH_PORT:-22}", "${RPKI_RTR_SERVER_ADDR:-rpki-rtr-ssh:22}",
"2", "2",
"reset", "reset",
"--ssh", "--ssh",
"--ssh-user", "--ssh-user",
"rpki-rtr", "${RPKI_RTR_SSH_USERNAME:-rpki-rtr}",
"--ssh-key", "--ssh-key",
"/app/certs/rtr-client.key", "${RPKI_RTR_CLIENT_KEY_PATH:-/app/certs/rtr-client.key}",
"--ssh-server-key", "--ssh-server-key",
"/app/certs/ssh_host_rsa_key.pub", "${RPKI_RTR_SSH_SERVER_PUBKEY_PATH:-/app/certs/ssh_host_rsa_key.pub}",
"--keep-after-error", "--keep-after-error",
"--summary-only" "--summary-only"
] ]
volumes: volumes:
- ../../certs:/app/certs:ro - ${RPKI_RTR_CLIENT_KEYS_VOLUME:-../../certs:/app/certs:ro}
- ../../logs/client:/app/logs - ../../logs/client:/app/logs
restart: no restart: no
stdin_open: true stdin_open: true

View File

@ -4,7 +4,7 @@ services:
context: ../.. context: ../..
dockerfile: deploy/client/Dockerfile dockerfile: deploy/client/Dockerfile
image: rpki-rtr-debug-client:latest image: rpki-rtr-debug-client:latest
command: ["rpki-rtr-tcp:323", "2", "reset", "--keep-after-error", "--summary-only"] command: ["${RPKI_RTR_SERVER_ADDR:-rpki-rtr-tcp:323}", "2", "reset", "--keep-after-error", "--summary-only"]
volumes: volumes:
- ../../logs/client:/app/logs - ../../logs/client:/app/logs
restart: no restart: no

View File

@ -8,14 +8,14 @@ services:
image: rpki-rtr-debug-client:latest image: rpki-rtr-debug-client:latest
command: command:
[ [
"rpki-rtr-tls:324", "${RPKI_RTR_SERVER_ADDR:-rpki-rtr-tls:324}",
"2", "2",
"reset", "reset",
"--tls", "--tls",
"--ca-cert", "--ca-cert",
"/app/certs/client-ca.crt", "/app/certs/client-ca.crt",
"--server-name", "--server-name",
"localhost", "${RPKI_RTR_TLS_SERVER_NAME:-localhost}",
"--client-cert", "--client-cert",
"/app/certs/client-good.crt", "/app/certs/client-good.crt",
"--client-key", "--client-key",

View File

@ -4,7 +4,7 @@ services:
context: ../.. context: ../..
dockerfile: deploy/client/Dockerfile dockerfile: deploy/client/Dockerfile
image: rpki-rtr-debug-client:latest image: rpki-rtr-debug-client:latest
command: ["rpki-rtr-tcp:323", "2", "reset", "--keep-after-error", "--summary-only"] command: ["${RPKI_RTR_SERVER_ADDR:-rpki-rtr-tcp:323}", "2", "reset", "--keep-after-error", "--summary-only"]
volumes: volumes:
- ../../logs/client:/app/logs - ../../logs/client:/app/logs
restart: no restart: no

View File

@ -32,7 +32,7 @@ RUN apt-get update \
COPY Cargo.toml Cargo.lock ./ COPY Cargo.toml Cargo.lock ./
COPY src ./src COPY src ./src
RUN cargo build --release --bin rpki RUN cargo build --release --bin rpki_rtr
FROM debian:bookworm-slim AS runtime FROM debian:bookworm-slim AS runtime
@ -60,7 +60,7 @@ RUN apt-get update \
WORKDIR /app WORKDIR /app
COPY --from=builder /build/target/release/rpki /usr/local/bin/rpki COPY --from=builder /build/target/release/rpki_rtr /usr/local/bin/rpki_rtr
COPY --chmod=755 deploy/server/entrypoint.sh /usr/local/bin/rpki-rtr-entrypoint.sh COPY --chmod=755 deploy/server/entrypoint.sh /usr/local/bin/rpki-rtr-entrypoint.sh
RUN mkdir -p /app/data /app/rtr-db /app/certs /app/slurm /app/logs RUN mkdir -p /app/data /app/rtr-db /app/certs /app/slurm /app/logs

View File

@ -10,16 +10,18 @@ services:
restart: no restart: no
ports: ports:
- "323:323" - "323:323"
- "${RPKI_RTR_SSH_HOST_PORT:-2222}:22" - "${RPKI_RTR_SSH_HOST_PORT:-2222}:${RPKI_RTR_SSH_CONTAINER_PORT:-22}"
environment: environment:
RPKI_RTR_ENABLE_TLS: "false" RPKI_RTR_ENABLE_TLS: "false"
RPKI_RTR_ENABLE_SSH: "true" RPKI_RTR_ENABLE_SSH: "true"
RPKI_RTR_TCP_ADDR: "0.0.0.0:323" RPKI_RTR_TCP_ADDR: "0.0.0.0:323"
RPKI_RTR_SSH_ADDR: "0.0.0.0:22" RPKI_RTR_SSH_ADDR: "0.0.0.0:${RPKI_RTR_SSH_CONTAINER_PORT:-22}"
RPKI_RTR_SSH_HOST_KEY_PATH: "/app/certs/ssh_host_rsa_key" RPKI_RTR_SSH_HOST_KEY_PATH: "${RPKI_RTR_SSH_HOST_KEY_PATH:-/host-ssh/ssh_host_ed25519_key}"
RPKI_RTR_SSH_AUTHORIZED_KEYS_PATH: "/app/certs/rtr-authorized_keys" RPKI_RTR_SSH_AUTHORIZED_KEYS_PATH: "${RPKI_RTR_SSH_AUTHORIZED_KEYS_PATH:-/app/certs/rtr-authorized_keys}"
RPKI_RTR_SSH_USERNAME: "rpki-rtr" RPKI_RTR_SSH_USERNAME: "${RPKI_RTR_SSH_USERNAME:-rpki-rtr}"
RPKI_RTR_SSH_SUBSYSTEM_NAME: "rpki-rtr" RPKI_RTR_SSH_SUBSYSTEM_NAME: "${RPKI_RTR_SSH_SUBSYSTEM_NAME:-rpki-rtr}"
# SSH auth mode: key | password | both
RPKI_RTR_SSH_AUTH_MODE: "${RPKI_RTR_SSH_AUTH_MODE:-key}"
# Optional: enable password authentication in addition to publickey # Optional: enable password authentication in addition to publickey
# RPKI_RTR_SSH_PASSWORD: "test-password" # RPKI_RTR_SSH_PASSWORD: "test-password"
RPKI_RTR_DB_PATH: "/app/rtr-db" RPKI_RTR_DB_PATH: "/app/rtr-db"
@ -33,6 +35,7 @@ services:
- ../../data:/app/data:ro - ../../data:/app/data:ro
- ../../rtr-db:/app/rtr-db - ../../rtr-db:/app/rtr-db
- ../../data:/app/slurm:ro - ../../data:/app/slurm:ro
- ${RPKI_RTR_SSH_KEYS_VOLUME:-/etc/ssh:/host-ssh:ro}
- ../../certs:/app/certs:ro - ../../certs:/app/certs:ro
- ../../logs/server:/app/logs - ../../logs/server:/app/logs
networks: networks:

View File

@ -7,4 +7,4 @@ log_name="${HOSTNAME:-rpki-rtr}"
stdout_log="/app/logs/${log_name}.stdout.log" stdout_log="/app/logs/${log_name}.stdout.log"
stderr_log="/app/logs/${log_name}.stderr.log" stderr_log="/app/logs/${log_name}.stderr.log"
exec /usr/local/bin/rpki "$@" >>"$stdout_log" 2>>"$stderr_log" exec /usr/local/bin/rpki_rtr "$@" >>"$stdout_log" 2>>"$stderr_log"

View File

@ -148,3 +148,24 @@ SSH 参数:
- `keep-after-error` - `keep-after-error`
- `output` / `output verbose` / `output summary` - `output` / `output verbose` / `output summary`
- `quit` - `quit`
## SSH Password Auth (Added)
`rtr_debug_client` now supports password auth in SSH mode.
- Use exactly one auth option in SSH mode:
- `--ssh-key <path>`
- `--ssh-password <value>`
- Host key verification is still required:
- `--ssh-known-hosts <path>` or `--ssh-server-key <path>`
Example:
```sh
cargo run --bin rtr_debug_client -- \
127.0.0.1:22 1 reset \
--ssh \
--ssh-user rpki-rtr \
--ssh-password 'your-password' \
--ssh-server-key certs/ssh_host_rsa_key.pub
```

View File

@ -1001,6 +1001,15 @@ impl Config {
})?; })?;
ensure_ssh_config(&mut transport)?.private_key = Some(PathBuf::from(path)); ensure_ssh_config(&mut transport)?.private_key = Some(PathBuf::from(path));
} }
"--ssh-password" => {
let password = args.next().ok_or_else(|| {
io::Error::new(
io::ErrorKind::InvalidInput,
"--ssh-password requires a value",
)
})?;
ensure_ssh_config(&mut transport)?.password = Some(password);
}
"--ssh-subsystem" => { "--ssh-subsystem" => {
let subsystem = args.next().ok_or_else(|| { let subsystem = args.next().ok_or_else(|| {
io::Error::new( io::Error::new(
@ -1181,8 +1190,15 @@ impl TransportConfig {
.unwrap_or_else(|| "<none>".to_string()) .unwrap_or_else(|| "<none>".to_string())
), ),
Self::Ssh(cfg) => format!( Self::Ssh(cfg) => format!(
"ssh (user={}, subsystem={}, host_key_check={})", "ssh (user={}, auth={}, subsystem={}, host_key_check={})",
cfg.user.as_deref().unwrap_or("<unset>"), cfg.user.as_deref().unwrap_or("<unset>"),
if cfg.private_key.is_some() {
"publickey"
} else if cfg.password.is_some() {
"password"
} else {
"<unset>"
},
cfg.subsystem cfg.subsystem
.as_deref() .as_deref()
.unwrap_or(DEFAULT_SSH_SUBSYSTEM_NAME), .unwrap_or(DEFAULT_SSH_SUBSYSTEM_NAME),
@ -1222,6 +1238,7 @@ impl HostKeyVerification {
struct SshConfig { struct SshConfig {
user: Option<String>, user: Option<String>,
private_key: Option<PathBuf>, private_key: Option<PathBuf>,
password: Option<String>,
subsystem: Option<String>, subsystem: Option<String>,
known_hosts: Option<PathBuf>, known_hosts: Option<PathBuf>,
server_key: Option<PathBuf>, server_key: Option<PathBuf>,
@ -1315,12 +1332,28 @@ fn finalize_transport(transport: TransportConfig, addr: &str) -> io::Result<Tran
)); ));
} }
let private_key = cfg.private_key.take().ok_or_else(|| { let private_key = cfg.private_key.take();
io::Error::new( let password = cfg.password.take().and_then(|value| {
let trimmed = value.trim();
if trimmed.is_empty() {
None
} else {
Some(trimmed.to_string())
}
});
if private_key.is_some() && password.is_some() {
return Err(io::Error::new(
io::ErrorKind::InvalidInput, io::ErrorKind::InvalidInput,
"SSH mode requires --ssh-key <path>", "SSH mode authentication must choose one: --ssh-key <path> or --ssh-password <value>",
) ));
})?; }
if private_key.is_none() && password.is_none() {
return Err(io::Error::new(
io::ErrorKind::InvalidInput,
"SSH mode requires authentication: --ssh-key <path> or --ssh-password <value>",
));
}
if cfg.known_hosts.is_some() && cfg.server_key.is_some() { if cfg.known_hosts.is_some() && cfg.server_key.is_some() {
return Err(io::Error::new( return Err(io::Error::new(
@ -1356,7 +1389,8 @@ fn finalize_transport(transport: TransportConfig, addr: &str) -> io::Result<Tran
Ok(TransportConfig::Ssh(SshConfig { Ok(TransportConfig::Ssh(SshConfig {
user: Some(user), user: Some(user),
private_key: Some(private_key), private_key,
password,
subsystem: Some(subsystem), subsystem: Some(subsystem),
known_hosts: None, known_hosts: None,
server_key: None, server_key: None,
@ -1439,10 +1473,24 @@ async fn connect_ssh_stream(addr: &str, ssh: &SshConfig) -> io::Result<DynStream
.user .user
.as_deref() .as_deref()
.ok_or_else(|| io::Error::new(io::ErrorKind::InvalidInput, "missing SSH user"))?; .ok_or_else(|| io::Error::new(io::ErrorKind::InvalidInput, "missing SSH user"))?;
let private_key_path = ssh let private_key_path = ssh.private_key.as_ref();
.private_key let password = ssh
.as_ref() .password
.ok_or_else(|| io::Error::new(io::ErrorKind::InvalidInput, "missing SSH private key"))?; .as_deref()
.map(str::trim)
.filter(|value| !value.is_empty());
if private_key_path.is_some() && password.is_some() {
return Err(io::Error::new(
io::ErrorKind::InvalidInput,
"SSH auth config invalid: both private key and password provided",
));
}
if private_key_path.is_none() && password.is_none() {
return Err(io::Error::new(
io::ErrorKind::InvalidInput,
"SSH auth config invalid: neither private key nor password provided",
));
}
let subsystem = ssh let subsystem = ssh
.subsystem .subsystem
.as_deref() .as_deref()
@ -1471,38 +1519,53 @@ async fn connect_ssh_stream(addr: &str, ssh: &SshConfig) -> io::Result<DynStream
) )
})?; })?;
let private_key = load_secret_key(private_key_path, None).map_err(|err| { let auth_result = if let Some(private_key_path) = private_key_path {
io::Error::new( let private_key = load_secret_key(private_key_path, None).map_err(|err| {
io::ErrorKind::InvalidInput,
format!(
"failed to load SSH private key {}: {}",
private_key_path.display(),
err
),
)
})?;
let rsa_hash = session.best_supported_rsa_hash().await.map_err(|err| {
io::Error::new(
io::ErrorKind::ConnectionAborted,
format!("failed to negotiate SSH RSA hash: {}", err),
)
})?;
let auth_result = session
.authenticate_publickey(
user.to_string(),
PrivateKeyWithHashAlg::new(Arc::new(private_key), rsa_hash.flatten()),
)
.await
.map_err(|err| {
io::Error::new( io::Error::new(
io::ErrorKind::PermissionDenied, io::ErrorKind::InvalidInput,
format!("SSH publickey authentication failed: {}", err), format!(
"failed to load SSH private key {}: {}",
private_key_path.display(),
err
),
) )
})?; })?;
let rsa_hash = session.best_supported_rsa_hash().await.map_err(|err| {
io::Error::new(
io::ErrorKind::ConnectionAborted,
format!("failed to negotiate SSH RSA hash: {}", err),
)
})?;
session
.authenticate_publickey(
user.to_string(),
PrivateKeyWithHashAlg::new(Arc::new(private_key), rsa_hash.flatten()),
)
.await
.map_err(|err| {
io::Error::new(
io::ErrorKind::PermissionDenied,
format!("SSH publickey authentication failed: {}", err),
)
})?
} else {
session
.authenticate_password(
user.to_string(),
password.expect("password checked above").to_string(),
)
.await
.map_err(|err| {
io::Error::new(
io::ErrorKind::PermissionDenied,
format!("SSH password authentication failed: {}", err),
)
})?
};
if !auth_result.success() { if !auth_result.success() {
return Err(io::Error::new( return Err(io::Error::new(
io::ErrorKind::PermissionDenied, io::ErrorKind::PermissionDenied,
"SSH publickey authentication rejected by server", "SSH authentication rejected by server",
)); ));
} }

View File

@ -11,6 +11,7 @@ use tracing::{info, warn};
use rpki::rtr::cache::{RtrCache, SharedRtrCache}; use rpki::rtr::cache::{RtrCache, SharedRtrCache};
use rpki::rtr::payload::Timing; use rpki::rtr::payload::Timing;
use rpki::rtr::server::ssh::SshAuthMode;
use rpki::rtr::server::{RtrNotifier, RtrService, RtrServiceConfig, RunningRtrService}; use rpki::rtr::server::{RtrNotifier, RtrService, RtrServiceConfig, RunningRtrService};
use rpki::rtr::store::RtrStore; use rpki::rtr::store::RtrStore;
use rpki::source::pipeline::{PayloadLoadConfig, load_payloads_from_latest_sources}; use rpki::source::pipeline::{PayloadLoadConfig, load_payloads_from_latest_sources};
@ -33,6 +34,7 @@ struct AppConfig {
ssh_authorized_keys_path: String, ssh_authorized_keys_path: String,
ssh_username: String, ssh_username: String,
ssh_subsystem_name: String, ssh_subsystem_name: String,
ssh_auth_mode: SshAuthMode,
ssh_password: Option<String>, ssh_password: Option<String>,
max_delta: u8, max_delta: u8,
@ -63,6 +65,7 @@ impl Default for AppConfig {
ssh_authorized_keys_path: "./certs/rtr-authorized_keys".to_string(), ssh_authorized_keys_path: "./certs/rtr-authorized_keys".to_string(),
ssh_username: "rpki-rtr".to_string(), ssh_username: "rpki-rtr".to_string(),
ssh_subsystem_name: "rpki-rtr".to_string(), ssh_subsystem_name: "rpki-rtr".to_string(),
ssh_auth_mode: SshAuthMode::Key,
ssh_password: None, ssh_password: None,
max_delta: 100, max_delta: 100,
@ -153,6 +156,14 @@ impl AppConfig {
if let Some(value) = env_var("RPKI_RTR_SSH_SUBSYSTEM_NAME")? { if let Some(value) = env_var("RPKI_RTR_SSH_SUBSYSTEM_NAME")? {
config.ssh_subsystem_name = value; config.ssh_subsystem_name = value;
} }
if let Some(value) = env_var("RPKI_RTR_SSH_AUTH_MODE")? {
config.ssh_auth_mode = SshAuthMode::parse(&value).ok_or_else(|| {
anyhow!(
"invalid RPKI_RTR_SSH_AUTH_MODE '{}': expected key|password|both",
value
)
})?;
}
if let Some(value) = env_var("RPKI_RTR_SSH_PASSWORD")? { if let Some(value) = env_var("RPKI_RTR_SSH_PASSWORD")? {
let value = value.trim().to_string(); let value = value.trim().to_string();
config.ssh_password = if value.is_empty() { None } else { Some(value) }; config.ssh_password = if value.is_empty() { None } else { Some(value) };
@ -368,6 +379,7 @@ fn start_servers(config: &AppConfig, service: &RtrService) -> RunningRtrService
&config.ssh_authorized_keys_path, &config.ssh_authorized_keys_path,
&config.ssh_username, &config.ssh_username,
&config.ssh_subsystem_name, &config.ssh_subsystem_name,
config.ssh_auth_mode,
config.ssh_password.as_deref(), config.ssh_password.as_deref(),
) )
} else if config.enable_tls { } else if config.enable_tls {
@ -388,6 +400,7 @@ fn start_servers(config: &AppConfig, service: &RtrService) -> RunningRtrService
&config.ssh_authorized_keys_path, &config.ssh_authorized_keys_path,
&config.ssh_username, &config.ssh_username,
&config.ssh_subsystem_name, &config.ssh_subsystem_name,
config.ssh_auth_mode,
config.ssh_password.as_deref(), config.ssh_password.as_deref(),
) )
} else { } else {
@ -505,6 +518,7 @@ fn log_startup_config(config: &AppConfig) {
); );
info!("ssh_username={}", config.ssh_username); info!("ssh_username={}", config.ssh_username);
info!("ssh_subsystem_name={}", config.ssh_subsystem_name); info!("ssh_subsystem_name={}", config.ssh_subsystem_name);
info!("ssh_auth_mode={}", config.ssh_auth_mode.as_str());
info!("ssh_password_enabled={}", config.ssh_password.is_some()); info!("ssh_password_enabled={}", config.ssh_password.is_some());
} }

10
src/rtr/cache/core.rs vendored
View File

@ -65,7 +65,7 @@ pub struct VersionState {
impl VersionState { impl VersionState {
fn new(session_id: u16, serial: u32, snapshot: Snapshot, max_delta: u8) -> Self { fn new(session_id: u16, serial: u32, snapshot: Snapshot, max_delta: u8) -> Self {
let rtr_payloads = Arc::new(snapshot.payloads_for_rtr()); let rtr_payloads = snapshot.rtr_payloads_for_rtr_arc();
Self { Self {
session_id, session_id,
serial, serial,
@ -199,7 +199,7 @@ impl RtrCacheBuilder {
VersionState { VersionState {
session_id: session_ids.as_array()[idx], session_id: session_ids.as_array()[idx],
serial: serials[idx], serial: serials[idx],
rtr_payloads: Arc::new(snapshot.payloads_for_rtr()), rtr_payloads: snapshot.rtr_payloads_for_rtr_arc(),
snapshot: Arc::new(snapshot), snapshot: Arc::new(snapshot),
deltas: deltas[idx].clone(), deltas: deltas[idx].clone(),
} }
@ -230,7 +230,7 @@ impl RtrCache {
self.availability = CacheAvailability::NoDataAvailable; self.availability = CacheAvailability::NoDataAvailable;
for version_state in &mut self.versions { for version_state in &mut self.versions {
version_state.snapshot = Arc::new(Snapshot::empty()); version_state.snapshot = Arc::new(Snapshot::empty());
version_state.rtr_payloads = Arc::new(Vec::new()); version_state.rtr_payloads = version_state.snapshot.rtr_payloads_for_rtr_arc();
version_state.deltas.clear(); version_state.deltas.clear();
} }
} }
@ -247,7 +247,7 @@ impl RtrCache {
state.session_id = new_session_ids.get(v); state.session_id = new_session_ids.get(v);
state.serial = 1; state.serial = 1;
state.snapshot = Arc::new(project_snapshot_for_version(source_snapshot, v)); state.snapshot = Arc::new(project_snapshot_for_version(source_snapshot, v));
state.rtr_payloads = Arc::new(state.snapshot.as_ref().payloads_for_rtr()); state.rtr_payloads = state.snapshot.rtr_payloads_for_rtr_arc();
state.deltas.clear(); state.deltas.clear();
} }
self.last_update_end = DualTime::now(); self.last_update_end = DualTime::now();
@ -362,7 +362,7 @@ impl RtrCache {
} }
state.snapshot = Arc::new(projected); state.snapshot = Arc::new(projected);
state.rtr_payloads = Arc::new(state.snapshot.as_ref().payloads_for_rtr()); state.rtr_payloads = state.snapshot.rtr_payloads_for_rtr_arc();
Self::push_delta( Self::push_delta(
state, state,
self.max_delta, self.max_delta,

View File

@ -13,7 +13,7 @@ use crate::rtr::cache::SharedRtrCache;
use crate::rtr::server::config::RtrServiceConfig; use crate::rtr::server::config::RtrServiceConfig;
use crate::rtr::server::listener::RtrServer; use crate::rtr::server::listener::RtrServer;
use crate::rtr::server::notifier::RtrNotifier; use crate::rtr::server::notifier::RtrNotifier;
use crate::rtr::server::ssh::load_rtr_ssh_runtime_config; use crate::rtr::server::ssh::{SshAuthMode, load_rtr_ssh_runtime_config};
pub struct RtrService { pub struct RtrService {
cache: SharedRtrCache, cache: SharedRtrCache,
@ -167,6 +167,7 @@ impl RtrService {
authorized_keys_path: impl AsRef<Path>, authorized_keys_path: impl AsRef<Path>,
username: &str, username: &str,
subsystem_name: &str, subsystem_name: &str,
auth_mode: SshAuthMode,
password: Option<&str>, password: Option<&str>,
) -> JoinHandle<()> { ) -> JoinHandle<()> {
let host_key_path = host_key_path.as_ref().to_path_buf(); let host_key_path = host_key_path.as_ref().to_path_buf();
@ -184,6 +185,7 @@ impl RtrService {
&authorized_keys_path, &authorized_keys_path,
&username, &username,
&subsystem_name, &subsystem_name,
auth_mode,
password.as_deref(), password.as_deref(),
inactivity_timeout, inactivity_timeout,
keepalive_interval, keepalive_interval,
@ -213,6 +215,7 @@ impl RtrService {
authorized_keys_path: impl AsRef<Path>, authorized_keys_path: impl AsRef<Path>,
username: &str, username: &str,
subsystem_name: &str, subsystem_name: &str,
auth_mode: SshAuthMode,
password: Option<&str>, password: Option<&str>,
) -> RunningRtrService { ) -> RunningRtrService {
let tcp_handle = self.spawn_tcp(tcp_bind_addr); let tcp_handle = self.spawn_tcp(tcp_bind_addr);
@ -222,6 +225,7 @@ impl RtrService {
authorized_keys_path, authorized_keys_path,
username, username,
subsystem_name, subsystem_name,
auth_mode,
password, password,
); );
@ -244,6 +248,7 @@ impl RtrService {
authorized_keys_path: impl AsRef<Path>, authorized_keys_path: impl AsRef<Path>,
username: &str, username: &str,
subsystem_name: &str, subsystem_name: &str,
auth_mode: SshAuthMode,
password: Option<&str>, password: Option<&str>,
) -> RunningRtrService { ) -> RunningRtrService {
let tcp_handle = self.spawn_tcp(tcp_bind_addr); let tcp_handle = self.spawn_tcp(tcp_bind_addr);
@ -255,6 +260,7 @@ impl RtrService {
authorized_keys_path, authorized_keys_path,
username, username,
subsystem_name, subsystem_name,
auth_mode,
password, password,
); );

View File

@ -9,6 +9,32 @@ use russh::keys::ssh_key::{self, AuthorizedKeys};
use russh::server::Config as RusshServerConfig; use russh::server::Config as RusshServerConfig;
use russh::{MethodKind, MethodSet}; use russh::{MethodKind, MethodSet};
#[derive(Debug, Clone, Copy, PartialEq, Eq)]
pub enum SshAuthMode {
Key,
Password,
Both,
}
impl SshAuthMode {
pub fn parse(value: &str) -> Option<Self> {
match value.trim().to_ascii_lowercase().as_str() {
"key" | "publickey" => Some(Self::Key),
"password" => Some(Self::Password),
"both" => Some(Self::Both),
_ => None,
}
}
pub fn as_str(self) -> &'static str {
match self {
Self::Key => "key",
Self::Password => "password",
Self::Both => "both",
}
}
}
#[derive(Debug, Clone)] #[derive(Debug, Clone)]
pub struct RtrSshRuntimeConfig { pub struct RtrSshRuntimeConfig {
pub server_config: Arc<RusshServerConfig>, pub server_config: Arc<RusshServerConfig>,
@ -23,6 +49,7 @@ pub fn load_rtr_ssh_runtime_config(
authorized_keys_path: impl AsRef<Path>, authorized_keys_path: impl AsRef<Path>,
username: &str, username: &str,
subsystem_name: &str, subsystem_name: &str,
auth_mode: SshAuthMode,
password: Option<&str>, password: Option<&str>,
inactivity_timeout: Option<Duration>, inactivity_timeout: Option<Duration>,
keepalive_interval: Option<Duration>, keepalive_interval: Option<Duration>,
@ -35,12 +62,21 @@ pub fn load_rtr_ssh_runtime_config(
} }
let host_key = load_host_key(host_key_path.as_ref())?; let host_key = load_host_key(host_key_path.as_ref())?;
let authorized_keys = load_authorized_keys(authorized_keys_path.as_ref())?; let authorized_keys = if matches!(auth_mode, SshAuthMode::Key | SshAuthMode::Both) {
load_authorized_keys(authorized_keys_path.as_ref())?
} else {
Vec::new()
};
let password = password.map(str::trim).filter(|value| !value.is_empty()); let password = password.map(str::trim).filter(|value| !value.is_empty());
if matches!(auth_mode, SshAuthMode::Password | SshAuthMode::Both) && password.is_none() {
bail!("SSH auth mode '{}' requires non-empty password", auth_mode.as_str());
}
let mut methods = MethodSet::empty(); let mut methods = MethodSet::empty();
methods.push(MethodKind::PublicKey); if matches!(auth_mode, SshAuthMode::Key | SshAuthMode::Both) {
if password.is_some() { methods.push(MethodKind::PublicKey);
}
if matches!(auth_mode, SshAuthMode::Password | SshAuthMode::Both) {
methods.push(MethodKind::Password); methods.push(MethodKind::Password);
} }

View File

@ -16,6 +16,7 @@ use tokio_rustls::TlsConnector;
use rpki::rtr::cache::{RtrCacheBuilder, SessionIds, SharedRtrCache}; use rpki::rtr::cache::{RtrCacheBuilder, SessionIds, SharedRtrCache};
use rpki::rtr::payload::Timing; use rpki::rtr::payload::Timing;
use rpki::rtr::pdu::{CacheResponse, EndOfDataV1, ResetQuery}; use rpki::rtr::pdu::{CacheResponse, EndOfDataV1, ResetQuery};
use rpki::rtr::server::ssh::SshAuthMode;
use rpki::rtr::server::RtrService; use rpki::rtr::server::RtrService;
use russh::client; use russh::client;
use russh::keys; use russh::keys;
@ -201,6 +202,7 @@ async fn unified_server_ssh_opens_listener_and_emits_banner() {
&authorized_keys_path, &authorized_keys_path,
"rpki-rtr", "rpki-rtr",
"rpki-rtr", "rpki-rtr",
SshAuthMode::Key,
None, None,
); );
wait_for_port(ssh_addr).await; wait_for_port(ssh_addr).await;
@ -249,6 +251,7 @@ async fn unified_server_ssh_accepts_password_when_configured() {
&authorized_keys_path, &authorized_keys_path,
"rpki-rtr", "rpki-rtr",
"rpki-rtr", "rpki-rtr",
SshAuthMode::Both,
Some("test-password"), Some("test-password"),
); );
wait_for_port(ssh_addr).await; wait_for_port(ssh_addr).await;
@ -323,6 +326,7 @@ async fn unified_server_ssh_rejects_password_when_not_configured() {
&authorized_keys_path, &authorized_keys_path,
"rpki-rtr", "rpki-rtr",
"rpki-rtr", "rpki-rtr",
SshAuthMode::Key,
None, None,
); );
wait_for_port(ssh_addr).await; wait_for_port(ssh_addr).await;