summaryrefslogtreecommitdiffstats
path: root/src/main/java/com/gitblit/transport/ssh
Commit message (Collapse)AuthorAgeFilesLines
* Fix issue with not serialisable ed25519 SSH keysFlorian Zschocke2022-11-161-0/+9
| | | | | | | | | Adding Ed25519 keys brings the problem that with the library currently used, the PublicKey instance of that key is not serialisable. This results in an exception when wicket tries to cache the UsersPage. So change the SshKeysPanel so that the PublicKey object is removed from the `SshKey` when the panel is detached. It can be regenerated from the raw key data.
* Skip SSH host key files that do not existFlorian Zschocke2022-10-251-0/+6
| | | | | | | | | | Since we now do not generate a DSA host key file anymore, but keep it in the list of potential keys so that existing keys still work, it can happen that the files for DSA (and Ed25519) are getting loaded but they do not exist. This results in an error in the log. So instead check if the file exists and only try to load files that exist. This prevents from errors (which are none) being spammed in the log.
* Add SSH host keys with ECDSA and Ed25519Florian Zschocke2022-10-252-14/+115
| | | | | | | | | Create new host keys, one with ECDSA and one with Ed25519 algorithms. For the Ed25519 currently the EdDSA library from i2p is used. This requires some quirks, compared to a modern BouncyCastle. But the SSHD library used cannot use BouncyCastle yet for Ed25519. No DSA key is generated anymore, but we still support existing ones.
* format: Cleanup formatting and whitespacesFlorian Zschocke2022-10-251-23/+41
|
* Update BouncyCastle to version 1.69Florian Zschocke2022-10-252-23/+2
| | | | | | | | | | | The version 1.69 is chosen instead of 1.70, because the moxie build would not download the jars, trying to download `...1.7.jar` instead. Three class deprecations are fixed. `PEMWriter` and `X509Extension` are replaced with their drop-in replacements `JcaPEMWriter` and `Extension`. The `PasswordFinder` deprecation note says that "it is no longer used". It also was never used in Gitblit's code, so it is removed from the key par provider class.
* Update dependency MINA SSHD to version 1.7.0Florian Zschocke2022-10-091-3/+6
|
* upgrade to sshd 1.6.0, add eddsa dependency, upgrade jgit to 4.1.2ricardop2022-10-084-20/+29
| | | | | | | | | (cherry picked from commit d8fbdda2ab3fa48e92bdf37399d4b75c48409c5c@rpardini:master) # Conflicts: # .classpath # build.moxie # src/test/java/com/gitblit/tests/SshUnitTest.java
* Update SSHD dependency to version 1.2.0.Florian Zschocke2019-11-103-3/+3
|
* Update SSHD dependency to version 1.1.0.Florian Zschocke2019-11-103-7/+9
|
* Merge pull request #6 from fzs/sshAuthMethodsFlorian Zschocke2017-01-211-6/+34
|\ | | | | Set list of offered SSH authentication methods.
| * Set list of offered SSH authentication methods.merged--sshAuthMethodsFlorian Zschocke2016-12-061-6/+34
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Make the SSH authentication methods used by the server configurable, so that for example password authentication can be turned off. For this, a `git.sshAuthenticationMethods` setting is added which is a space separated list of authentication method names. Only the methods listed will be enabled in the server. This is modeled after the option of the same name from sshd_config, but it does not offer listing multiple required methods. It leaves the door open, though, for a later extension to support such a multi-factor authentication. Since this also includes Kerberos authentication with GSS API, this obsoletes the `git.sshWithKrb5` property. The latter is removed. Instead, to enable Kerberos5 authentication, add the method name `gssapi-with-mic` to the authentication methods list.
* | Extend documentation in default.properties and LdapKeyManager.java.merged--sshLdapAuthenticatorFlorian Zschocke2016-12-061-1/+26
| |
* | The public key manager can disable writing keys, which hides commandsFlorian Zschocke2016-12-065-12/+54
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Some public key mangers may be read-only, i.e. not allow to add or delete keys, or to change the key comment or assigned permissions. In such a case the respective commands should not be available on the SSH shell and the SSH Keys panel should also not offer the possibility. The `IPublicKeyManager` gets three new methods, modelled after the `AuthenticationManager`: `supportsWritingKeys`, `supportsCommentChanges` and `supportsPermissionChanges`. They return true if a key manager allows for keys to be written or updated. For example the existing `FileKeyManager` will return true for all three since it allows to store and update keys in a file. The new `LdapKeyManager` returns false since it only accesses LDAP and can not add or update any keys in the directory. A future key manager might get keys from an LDAP directory but still keep comments and permissions for it in a local copy. If writing of keys is not supported: * the welcome shell does not suggest adding a key, * the `SshKeysDispatcher` does not offer the "add", "remove", "comment" and "permission" commands, and * the SSH keys panel hides the "delete" button in the key list, and the "Add Key" form. The hiding of the "Add key" form is not perfect since the surrounding div is still shown, but I don't know how to hide it and it didn't look too bad, either.
* | Retrieve public SSH keys from LDAP.Florian Zschocke2016-11-291-0/+397
|/ | | | | | | | | | | | Add new class `LdapPublicKeyManager` which retrieves public SSH keys from LDAP. The attribute can be configured with the new configuration option `realm.ldap.sshPublicKey`. The setting can be a simple attribute name, like `sshPublicKey`, or an attribute name and a prefix for the value, like `altSecurityIdentities:SshKey`, in which case attributes are selected that have the name `altSecurityIdentities` and whose values start with `SshKey:`.
* Log update for Fail2Ban usagePaul Martin2015-10-251-1/+1
| | | | | + Adds standard logging for all authentication providers + Updates help page to use default GitBlit SSH port
* Merge branch 'topic/pr-934' into developJames Moger2015-10-051-0/+10
|\
| * Address review commentsJames Moger2015-10-052-8/+14
| |
| * Allow to strip domain from kerberos usernamesVitaliy Filippov2015-10-012-3/+10
| |
* | Revert manual specification of ssh user auth factoriesJames Moger2015-10-052-61/+22
|/
* Update to SSHD 1.0.0James Moger2015-09-1810-46/+192
|
* Added better logging for fail2banEnrico2042015-08-101-1/+1
|
* Renamed ssh.Display(Host|Port) to ssh.Advertised(Host|Port)James Moger2015-06-153-13/+13
|
* Added git.sshDisplay{Port|Host} to hide port forward.Morten Bøgeskov2015-06-153-11/+30
| | | | | | Running gitblit in a container it's easy to expose the ssh on the default port. Using git.sshDisplayPort/git.sshDisplayHost you can expose the forwarded address as the official location.
* Invalid kerberos patches, works now and with a test.Fabrice Bacchella2015-05-262-1/+53
|
* Adding Kerberos5/GSS authentication to sshFabrice Bacchella2015-05-041-1/+57
| | | | Adding the possibility to define authentication method order for ssh
* Merge branch 'ticket/245' into developJames Moger2015-03-071-1/+3
|\
| * Strip line breaks from pasted SSH keysJames Moger2015-03-071-1/+3
| |
* | Merge branch 'ticket/194' into developJames Moger2014-09-301-0/+3
|\|
| * Register BouncyCastle as a JCE providerJames Moger2014-09-301-0/+3
| |
* | Renamed class to avoid confusion with FileKeyManagerJames Moger2014-09-262-5/+5
| |
* | Extract authenticate method from CachingPublicKeyAuthenticatorDavid Ostrovsky2014-09-262-39/+5
| |
* | Implement custom IPublicKeyManager providerJames Moger2014-07-033-0/+8
|/
* Fix invalid generated SSH url for port 22James Moger2014-06-091-1/+1
|
* Fix thread exhaustion in SSH daemonJames Moger2014-05-295-14/+29
|
* Catch UnsatisfiedLinkException when setting filemode of generated SSH keysJames Moger2014-05-121-2/+2
|
* Prevent adding empty or invalid SSH public keysJames Moger2014-04-253-7/+23
|
* Simplify current plugin release detection, ignore currentRelease registry fieldJames Moger2014-04-231-5/+5
|
* Update to Apache MINA/SSHD 0.11.0James Moger2014-04-231-0/+5
|
* Remove User parameter from SSH dispatch command setupJames Moger2014-04-175-52/+48
|
* Filter the current plugin release by the system versionJames Moger2014-04-171-4/+20
|
* [findbugs] Simplify the SshKey <-> PublicKey comparisonJames Moger2014-04-171-1/+1
|
* [findbugs] Fix missing 'throw' on plugin installation failureJames Moger2014-04-171-1/+1
|
* [findbugs] Fix throws signatureJames Moger2014-04-171-1/+1
|
* Organize importsJames Moger2014-04-171-8/+6
|
* Strip leading / from a repository name on ssh fetch/pushJames Moger2014-04-171-3/+2
|
* Add plugin (un)install lifecycle methodsJames Moger2014-04-171-1/+1
|
* Enforce plugin-requires attributeJames Moger2014-04-151-7/+33
|
* Update to pf4j 0.8.0James Moger2014-04-151-16/+16
|
* Add ssh command to update the permission for an SSH keyJames Moger2014-04-141-0/+38
|
* Update headersJames Moger2014-04-1317-69/+119
|