summaryrefslogtreecommitdiffstats
path: root/src/main/java/com/gitblit/transport/ssh/SshKeyAuthenticator.java
blob: d41afdd09fc526305fd6b2fc5c2f140489f30d73 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
/*
 * Copyright 2014 gitblit.com.
 *
 * Licensed under the Apache License, Version 2.0 (the "License"); you may not
 * use this file except in compliance with the License. You may obtain a copy of
 * the License at
 *
 * http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
 * WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
 * License for the specific language governing permissions and limitations under
 * the License.
 */
package com.gitblit.transport.ssh;

import java.security.PublicKey;
import java.util.List;
import java.util.Locale;
import java.util.concurrent.ExecutionException;
import java.util.concurrent.TimeUnit;

import org.apache.sshd.server.PublickeyAuthenticator;
import org.apache.sshd.server.session.ServerSession;

import com.gitblit.manager.IAuthenticationManager;
import com.gitblit.models.UserModel;
import com.google.common.cache.CacheBuilder;
import com.google.common.cache.CacheLoader;
import com.google.common.cache.LoadingCache;

/**
 *
 * @author Eric Myrhe
 *
 */
public class SshKeyAuthenticator implements PublickeyAuthenticator {

	protected final IKeyManager keyManager;
	
	protected final IAuthenticationManager authManager;

	LoadingCache<String, List<PublicKey>> sshKeyCache = CacheBuilder
			.newBuilder().
			expireAfterAccess(15, TimeUnit.MINUTES).
			maximumSize(100)
			.build(new CacheLoader<String, List<PublicKey>>() {
				public List<PublicKey> load(String username) {
					return keyManager.getKeys(username);
				}
			});

	public SshKeyAuthenticator(IKeyManager keyManager, IAuthenticationManager authManager) {
		this.keyManager = keyManager;
		this.authManager = authManager;
	}

	@Override
	public boolean authenticate(String username, final PublicKey suppliedKey,
			final ServerSession session) {
		final SshSession sd = session.getAttribute(SshSession.KEY);

		username = username.toLowerCase(Locale.US);
		try {
			List<PublicKey> keys = sshKeyCache.get(username);
			if (keys == null || keys.isEmpty()) {
				sd.authenticationError(username, "no-matching-key");
				return false;
			}
			for (PublicKey key : keys) {
				if (key.equals(suppliedKey)) {
					return validate(username, sd);
				}
			}
			return false;
		} catch (ExecutionException e) {
			sd.authenticationError(username, "user-not-found");
			return false;
		}
	}

	boolean validate(String username, SshSession sd) {
		// now that the key has been validated, check with the authentication
		// manager to ensure that this user exists and can authenticate
		sd.authenticationSuccess(username);
		UserModel user = authManager.authenticate(sd);
		if (user != null) {
			return true;
		}
		sd.authenticationError(username, "user-not-found");
		return false;
	}
}