summaryrefslogtreecommitdiffstats
path: root/src/main/java/com/gitblit/transport/ssh/CachingPublicKeyAuthenticator.java
blob: 7d6066c794c97f89df5199312d2a6c43aee97a3d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
/*
 * Copyright 2014 gitblit.com.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */
package com.gitblit.transport.ssh;

import java.security.PublicKey;
import java.util.HashMap;
import java.util.List;
import java.util.Locale;
import java.util.Map;
import java.util.concurrent.ConcurrentHashMap;

import org.apache.sshd.common.Session;
import org.apache.sshd.common.SessionListener;
import org.apache.sshd.server.PublickeyAuthenticator;
import org.apache.sshd.server.session.ServerSession;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;

import com.gitblit.manager.IAuthenticationManager;
import com.gitblit.models.UserModel;
import com.google.common.base.Preconditions;

/**
 * 
 * @author Eric Myrhe
 * 
 */
public class CachingPublicKeyAuthenticator implements PublickeyAuthenticator,
		SessionListener {

	protected final Logger log = LoggerFactory.getLogger(getClass());

	protected final IKeyManager keyManager;

	protected final IAuthenticationManager authManager;

	private final Map<ServerSession, Map<PublicKey, Boolean>> cache =
			new ConcurrentHashMap<ServerSession, Map<PublicKey, Boolean>>();

	public CachingPublicKeyAuthenticator(IKeyManager keyManager,
			IAuthenticationManager authManager) {
		this.keyManager = keyManager;
		this.authManager = authManager;
	}

	@Override
	public boolean authenticate(String username, PublicKey key,
			ServerSession session) {
		Map<PublicKey, Boolean> map = cache.get(session);
		if (map == null) {
			map = new HashMap<PublicKey, Boolean>();
			cache.put(session, map);
			session.addListener(this);
		}
		if (map.containsKey(key)) {
			return map.get(key);
		}
		boolean result = doAuthenticate(username, key, session);
		map.put(key, result);
		return result;
	}

	protected boolean doAuthenticate(String username, PublicKey suppliedKey,
			ServerSession session) {
		SshDaemonClient client = session.getAttribute(SshDaemonClient.KEY);
		Preconditions.checkState(client.getUser() == null);
		username = username.toLowerCase(Locale.US);
		List<PublicKey> keys = keyManager.getKeys(username);
		if (keys == null || keys.isEmpty()) {
			log.info("{} has not added any public keys for ssh authentication",
					username);
			return false;
		}

		for (PublicKey key : keys) {
			if (key.equals(suppliedKey)) {
				UserModel user = authManager.authenticate(username, key);
				if (user != null) {
					client.setUser(user);
					return true;
				}
			}
		}

		log.warn(
				"could not authenticate {} for SSH using the supplied public key",
				username);
		return false;
	}

	public IKeyManager getKeyManager() {
		return keyManager;
	}

	public void sessionCreated(Session session) {
	}

	public void sessionEvent(Session sesssion, Event event) {
	}

	public void sessionClosed(Session session) {
		cache.remove(session);
	}
}