mirror of https://github.com/gogits/gogs.git
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
184 lines
3.6 KiB
184 lines
3.6 KiB
// Copyright 2014 The Go Authors. All rights reserved. |
|
// Use of this source code is governed by a BSD-style |
|
// license that can be found in the LICENSE file. |
|
|
|
package agent |
|
|
|
import ( |
|
"bytes" |
|
"crypto/rand" |
|
"crypto/subtle" |
|
"errors" |
|
"fmt" |
|
"sync" |
|
|
|
"github.com/gogits/gogs/modules/crypto/ssh" |
|
) |
|
|
|
type privKey struct { |
|
signer ssh.Signer |
|
comment string |
|
} |
|
|
|
type keyring struct { |
|
mu sync.Mutex |
|
keys []privKey |
|
|
|
locked bool |
|
passphrase []byte |
|
} |
|
|
|
var errLocked = errors.New("agent: locked") |
|
|
|
// NewKeyring returns an Agent that holds keys in memory. It is safe |
|
// for concurrent use by multiple goroutines. |
|
func NewKeyring() Agent { |
|
return &keyring{} |
|
} |
|
|
|
// RemoveAll removes all identities. |
|
func (r *keyring) RemoveAll() error { |
|
r.mu.Lock() |
|
defer r.mu.Unlock() |
|
if r.locked { |
|
return errLocked |
|
} |
|
|
|
r.keys = nil |
|
return nil |
|
} |
|
|
|
// Remove removes all identities with the given public key. |
|
func (r *keyring) Remove(key ssh.PublicKey) error { |
|
r.mu.Lock() |
|
defer r.mu.Unlock() |
|
if r.locked { |
|
return errLocked |
|
} |
|
|
|
want := key.Marshal() |
|
found := false |
|
for i := 0; i < len(r.keys); { |
|
if bytes.Equal(r.keys[i].signer.PublicKey().Marshal(), want) { |
|
found = true |
|
r.keys[i] = r.keys[len(r.keys)-1] |
|
r.keys = r.keys[len(r.keys)-1:] |
|
continue |
|
} else { |
|
i++ |
|
} |
|
} |
|
|
|
if !found { |
|
return errors.New("agent: key not found") |
|
} |
|
return nil |
|
} |
|
|
|
// Lock locks the agent. Sign and Remove will fail, and List will empty an empty list. |
|
func (r *keyring) Lock(passphrase []byte) error { |
|
r.mu.Lock() |
|
defer r.mu.Unlock() |
|
if r.locked { |
|
return errLocked |
|
} |
|
|
|
r.locked = true |
|
r.passphrase = passphrase |
|
return nil |
|
} |
|
|
|
// Unlock undoes the effect of Lock |
|
func (r *keyring) Unlock(passphrase []byte) error { |
|
r.mu.Lock() |
|
defer r.mu.Unlock() |
|
if !r.locked { |
|
return errors.New("agent: not locked") |
|
} |
|
if len(passphrase) != len(r.passphrase) || 1 != subtle.ConstantTimeCompare(passphrase, r.passphrase) { |
|
return fmt.Errorf("agent: incorrect passphrase") |
|
} |
|
|
|
r.locked = false |
|
r.passphrase = nil |
|
return nil |
|
} |
|
|
|
// List returns the identities known to the agent. |
|
func (r *keyring) List() ([]*Key, error) { |
|
r.mu.Lock() |
|
defer r.mu.Unlock() |
|
if r.locked { |
|
// section 2.7: locked agents return empty. |
|
return nil, nil |
|
} |
|
|
|
var ids []*Key |
|
for _, k := range r.keys { |
|
pub := k.signer.PublicKey() |
|
ids = append(ids, &Key{ |
|
Format: pub.Type(), |
|
Blob: pub.Marshal(), |
|
Comment: k.comment}) |
|
} |
|
return ids, nil |
|
} |
|
|
|
// Insert adds a private key to the keyring. If a certificate |
|
// is given, that certificate is added as public key. Note that |
|
// any constraints given are ignored. |
|
func (r *keyring) Add(key AddedKey) error { |
|
r.mu.Lock() |
|
defer r.mu.Unlock() |
|
if r.locked { |
|
return errLocked |
|
} |
|
signer, err := ssh.NewSignerFromKey(key.PrivateKey) |
|
|
|
if err != nil { |
|
return err |
|
} |
|
|
|
if cert := key.Certificate; cert != nil { |
|
signer, err = ssh.NewCertSigner(cert, signer) |
|
if err != nil { |
|
return err |
|
} |
|
} |
|
|
|
r.keys = append(r.keys, privKey{signer, key.Comment}) |
|
|
|
return nil |
|
} |
|
|
|
// Sign returns a signature for the data. |
|
func (r *keyring) Sign(key ssh.PublicKey, data []byte) (*ssh.Signature, error) { |
|
r.mu.Lock() |
|
defer r.mu.Unlock() |
|
if r.locked { |
|
return nil, errLocked |
|
} |
|
|
|
wanted := key.Marshal() |
|
for _, k := range r.keys { |
|
if bytes.Equal(k.signer.PublicKey().Marshal(), wanted) { |
|
return k.signer.Sign(rand.Reader, data) |
|
} |
|
} |
|
return nil, errors.New("not found") |
|
} |
|
|
|
// Signers returns signers for all the known keys. |
|
func (r *keyring) Signers() ([]ssh.Signer, error) { |
|
r.mu.Lock() |
|
defer r.mu.Unlock() |
|
if r.locked { |
|
return nil, errLocked |
|
} |
|
|
|
s := make([]ssh.Signer, 0, len(r.keys)) |
|
for _, k := range r.keys { |
|
s = append(s, k.signer) |
|
} |
|
return s, nil |
|
}
|
|
|