]> source.dussan.org Git - gitblit.git/commitdiff
Renamed class to avoid confusion with FileKeyManager 90/190/1
authorJames Moger <james.moger@gitblit.com>
Fri, 26 Sep 2014 14:49:39 +0000 (10:49 -0400)
committerJames Moger <james.moger@gitblit.com>
Fri, 26 Sep 2014 14:49:39 +0000 (10:49 -0400)
src/main/java/com/gitblit/transport/ssh/FileBasedPubKeyAuth.java [deleted file]
src/main/java/com/gitblit/transport/ssh/SshDaemon.java
src/main/java/com/gitblit/transport/ssh/SshKeyAuthenticator.java [new file with mode: 0644]

diff --git a/src/main/java/com/gitblit/transport/ssh/FileBasedPubKeyAuth.java b/src/main/java/com/gitblit/transport/ssh/FileBasedPubKeyAuth.java
deleted file mode 100644 (file)
index b6a52f9..0000000
+++ /dev/null
@@ -1,77 +0,0 @@
-/*
- * Copyright 2014 gitblit.com.
- *
- * Licensed under the Apache License, Version 2.0 (the "License"); you may not
- * use this file except in compliance with the License. You may obtain a copy of
- * the License at
- *
- * http://www.apache.org/licenses/LICENSE-2.0
- *
- * Unless required by applicable law or agreed to in writing, software
- * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
- * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
- * License for the specific language governing permissions and limitations under
- * the License.
- */
-package com.gitblit.transport.ssh;
-
-import java.security.PublicKey;
-import java.util.List;
-import java.util.Locale;
-
-import org.apache.sshd.server.PublickeyAuthenticator;
-import org.apache.sshd.server.session.ServerSession;
-import org.slf4j.Logger;
-import org.slf4j.LoggerFactory;
-
-import com.gitblit.manager.IAuthenticationManager;
-import com.gitblit.models.UserModel;
-import com.google.common.base.Preconditions;
-
-/**
- * Authenticates an SSH session against a public key.
- *
- */
-public class FileBasedPubKeyAuth implements PublickeyAuthenticator {
-
-       protected final Logger log = LoggerFactory.getLogger(getClass());
-
-       protected final IPublicKeyManager keyManager;
-
-       protected final IAuthenticationManager authManager;
-
-       public FileBasedPubKeyAuth(IPublicKeyManager keyManager, IAuthenticationManager authManager) {
-               this.keyManager = keyManager;
-               this.authManager = authManager;
-       }
-
-       @Override
-       public boolean authenticate(String username, PublicKey suppliedKey, ServerSession session) {
-               SshDaemonClient client = session.getAttribute(SshDaemonClient.KEY);
-               Preconditions.checkState(client.getUser() == null);
-               username = username.toLowerCase(Locale.US);
-               List<SshKey> keys = keyManager.getKeys(username);
-               if (keys.isEmpty()) {
-                       log.info("{} has not added any public keys for ssh authentication", username);
-                       return false;
-               }
-
-               SshKey pk = new SshKey(suppliedKey);
-               log.debug("auth supplied {}", pk.getFingerprint());
-
-               for (SshKey key : keys) {
-                       log.debug("auth compare to {}", key.getFingerprint());
-                       if (key.getPublicKey().equals(suppliedKey)) {
-                               UserModel user = authManager.authenticate(username, key);
-                               if (user != null) {
-                                       client.setUser(user);
-                                       client.setKey(key);
-                                       return true;
-                               }
-                       }
-               }
-
-               log.warn("could not authenticate {} for SSH using the supplied public key", username);
-               return false;
-       }
-}
index 2740e915c0bd90d7ae6c6bf92dec3d77a3448860..d0b7490e5680b88dce202bfab987ce7909278116 100644 (file)
@@ -96,8 +96,8 @@ public class SshDaemon {
                hostKeyPairProvider.setFiles(new String [] { rsaKeyStore.getPath(), dsaKeyStore.getPath(), dsaKeyStore.getPath() });
 
                // Client public key authenticator
-               CachingPublicKeyAuthenticator keyAuthenticator =
-                               new CachingPublicKeyAuthenticator(new FileBasedPubKeyAuth(gitblit.getPublicKeyManager(), gitblit));
+               SshKeyAuthenticator keyAuthenticator =
+                               new SshKeyAuthenticator(gitblit.getPublicKeyManager(), gitblit);
 
                // Configure the preferred SSHD backend
                String sshBackendStr = settings.getString(Keys.git.sshBackend,
@@ -123,7 +123,7 @@ public class SshDaemon {
                sshd.setPort(addr.getPort());
                sshd.setHost(addr.getHostName());
                sshd.setKeyPairProvider(hostKeyPairProvider);
-               sshd.setPublickeyAuthenticator(keyAuthenticator);
+               sshd.setPublickeyAuthenticator(new CachingPublicKeyAuthenticator(keyAuthenticator));
                sshd.setPasswordAuthenticator(new UsernamePasswordAuthenticator(gitblit));
                sshd.setSessionFactory(new SshServerSessionFactory());
                sshd.setFileSystemFactory(new DisabledFilesystemFactory());
diff --git a/src/main/java/com/gitblit/transport/ssh/SshKeyAuthenticator.java b/src/main/java/com/gitblit/transport/ssh/SshKeyAuthenticator.java
new file mode 100644 (file)
index 0000000..c28a2ed
--- /dev/null
@@ -0,0 +1,77 @@
+/*
+ * Copyright 2014 gitblit.com.
+ *
+ * Licensed under the Apache License, Version 2.0 (the "License"); you may not
+ * use this file except in compliance with the License. You may obtain a copy of
+ * the License at
+ *
+ * http://www.apache.org/licenses/LICENSE-2.0
+ *
+ * Unless required by applicable law or agreed to in writing, software
+ * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
+ * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
+ * License for the specific language governing permissions and limitations under
+ * the License.
+ */
+package com.gitblit.transport.ssh;
+
+import java.security.PublicKey;
+import java.util.List;
+import java.util.Locale;
+
+import org.apache.sshd.server.PublickeyAuthenticator;
+import org.apache.sshd.server.session.ServerSession;
+import org.slf4j.Logger;
+import org.slf4j.LoggerFactory;
+
+import com.gitblit.manager.IAuthenticationManager;
+import com.gitblit.models.UserModel;
+import com.google.common.base.Preconditions;
+
+/**
+ * Authenticates an SSH session against a public key.
+ *
+ */
+public class SshKeyAuthenticator implements PublickeyAuthenticator {
+
+       protected final Logger log = LoggerFactory.getLogger(getClass());
+
+       protected final IPublicKeyManager keyManager;
+
+       protected final IAuthenticationManager authManager;
+
+       public SshKeyAuthenticator(IPublicKeyManager keyManager, IAuthenticationManager authManager) {
+               this.keyManager = keyManager;
+               this.authManager = authManager;
+       }
+
+       @Override
+       public boolean authenticate(String username, PublicKey suppliedKey, ServerSession session) {
+               SshDaemonClient client = session.getAttribute(SshDaemonClient.KEY);
+               Preconditions.checkState(client.getUser() == null);
+               username = username.toLowerCase(Locale.US);
+               List<SshKey> keys = keyManager.getKeys(username);
+               if (keys.isEmpty()) {
+                       log.info("{} has not added any public keys for ssh authentication", username);
+                       return false;
+               }
+
+               SshKey pk = new SshKey(suppliedKey);
+               log.debug("auth supplied {}", pk.getFingerprint());
+
+               for (SshKey key : keys) {
+                       log.debug("auth compare to {}", key.getFingerprint());
+                       if (key.getPublicKey().equals(suppliedKey)) {
+                               UserModel user = authManager.authenticate(username, key);
+                               if (user != null) {
+                                       client.setUser(user);
+                                       client.setKey(key);
+                                       return true;
+                               }
+                       }
+               }
+
+               log.warn("could not authenticate {} for SSH using the supplied public key", username);
+               return false;
+       }
+}