update go app
This commit is contained in:
3
.gitignore
vendored
3
.gitignore
vendored
@@ -1,3 +1,4 @@
|
|||||||
go.mod
|
go.mod
|
||||||
go.sum
|
go.sum
|
||||||
tui-ssh-app
|
tui-ssh-app
|
||||||
|
app.log
|
||||||
20
config/logger.go
Normal file
20
config/logger.go
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
package config
|
||||||
|
|
||||||
|
import (
|
||||||
|
"log"
|
||||||
|
"os"
|
||||||
|
)
|
||||||
|
|
||||||
|
// InitializeLogger sets up logging to a file.
|
||||||
|
func InitializeLogger(logFileName string) {
|
||||||
|
// Open the log file for writing (create if it doesn't exist, append if it does)
|
||||||
|
file, err := os.OpenFile(logFileName, os.O_APPEND|os.O_CREATE|os.O_WRONLY, 0666)
|
||||||
|
if err != nil {
|
||||||
|
log.Fatalf("Failed to open log file: %v", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Set the output of the default logger to the file
|
||||||
|
log.SetOutput(file)
|
||||||
|
log.SetFlags(log.Ldate | log.Ltime | log.Lshortfile)
|
||||||
|
log.Println("Logging initialized")
|
||||||
|
}
|
||||||
12
main.go
12
main.go
@@ -1,13 +1,25 @@
|
|||||||
package main
|
package main
|
||||||
|
|
||||||
import (
|
import (
|
||||||
|
"log"
|
||||||
"tui-ssh-app/config"
|
"tui-ssh-app/config"
|
||||||
"tui-ssh-app/db"
|
"tui-ssh-app/db"
|
||||||
"tui-ssh-app/tui"
|
"tui-ssh-app/tui"
|
||||||
)
|
)
|
||||||
|
|
||||||
func main() {
|
func main() {
|
||||||
|
// Initialize logging
|
||||||
|
config.InitializeLogger("app.log")
|
||||||
|
|
||||||
|
// Load environment variables
|
||||||
|
log.Println("Loading environment variables...")
|
||||||
config.LoadEnv()
|
config.LoadEnv()
|
||||||
|
|
||||||
|
// Connect to the database
|
||||||
|
log.Println("Connecting to the database...")
|
||||||
db.ConnectDB()
|
db.ConnectDB()
|
||||||
|
|
||||||
|
// Start the TUI
|
||||||
|
log.Println("Starting TUI...")
|
||||||
tui.StartTUI()
|
tui.StartTUI()
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -3,6 +3,7 @@ package ssh
|
|||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
|
"log"
|
||||||
|
|
||||||
"golang.org/x/crypto/ssh"
|
"golang.org/x/crypto/ssh"
|
||||||
)
|
)
|
||||||
@@ -15,35 +16,60 @@ type SSHConfig struct {
|
|||||||
PrivateKey string
|
PrivateKey string
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// ConnectSSH handles both key-based and password authentication dynamically.
|
||||||
func ConnectSSH(config SSHConfig) error {
|
func ConnectSSH(config SSHConfig) error {
|
||||||
var auth ssh.AuthMethod
|
log.Printf("Attempting SSH connection to %s@%s:%s", config.User, config.Host, config.Port)
|
||||||
|
|
||||||
|
// Build SSH authentication methods
|
||||||
|
var authMethods []ssh.AuthMethod
|
||||||
|
|
||||||
|
// Add key-based authentication if a private key is provided
|
||||||
if config.PrivateKey != "" {
|
if config.PrivateKey != "" {
|
||||||
|
log.Println("Attempting key-based authentication...")
|
||||||
key, err := ioutil.ReadFile(config.PrivateKey)
|
key, err := ioutil.ReadFile(config.PrivateKey)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to read private key: %v", err)
|
log.Printf("Error reading private key: %v", err)
|
||||||
|
return fmt.Errorf("failed to read private key: %w", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
signer, err := ssh.ParsePrivateKey(key)
|
signer, err := ssh.ParsePrivateKey(key)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to parse private key: %v", err)
|
log.Printf("Error parsing private key: %v", err)
|
||||||
|
return fmt.Errorf("failed to parse private key: %w", err)
|
||||||
}
|
}
|
||||||
auth = ssh.PublicKeys(signer)
|
|
||||||
} else {
|
authMethods = append(authMethods, ssh.PublicKeys(signer))
|
||||||
auth = ssh.Password(config.Password)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Add password-based authentication if a password is provided
|
||||||
|
if config.Password != "" {
|
||||||
|
log.Println("Attempting password-based authentication...")
|
||||||
|
authMethods = append(authMethods, ssh.Password(config.Password))
|
||||||
|
}
|
||||||
|
|
||||||
|
// Ensure at least one authentication method is configured
|
||||||
|
if len(authMethods) == 0 {
|
||||||
|
return fmt.Errorf("no authentication method provided (password or private key)")
|
||||||
|
}
|
||||||
|
|
||||||
|
// Configure SSH client
|
||||||
clientConfig := &ssh.ClientConfig{
|
clientConfig := &ssh.ClientConfig{
|
||||||
User: config.User,
|
User: config.User,
|
||||||
Auth: []ssh.AuthMethod{auth},
|
Auth: authMethods,
|
||||||
HostKeyCallback: ssh.InsecureIgnoreHostKey(), // Use a proper callback for production!
|
HostKeyCallback: ssh.InsecureIgnoreHostKey(), // Use a proper host key callback for production!
|
||||||
}
|
}
|
||||||
|
|
||||||
client, err := ssh.Dial("tcp", fmt.Sprintf("%s:%s", config.Host, config.Port), clientConfig)
|
// Dial the SSH server
|
||||||
|
address := fmt.Sprintf("%s:%s", config.Host, config.Port)
|
||||||
|
log.Printf("Connecting to SSH server at %s...", address)
|
||||||
|
|
||||||
|
client, err := ssh.Dial("tcp", address, clientConfig)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("failed to connect to SSH: %v", err)
|
log.Printf("Failed to connect to SSH server: %v", err)
|
||||||
|
return fmt.Errorf("failed to connect to SSH server: %w", err)
|
||||||
}
|
}
|
||||||
defer client.Close()
|
defer client.Close()
|
||||||
|
|
||||||
fmt.Println("Connected to SSH successfully!")
|
log.Printf("Successfully connected to %s@%s:%s", config.User, config.Host, config.Port)
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user