|
|
|
@ -5,6 +5,11 @@ |
|
|
|
|
package user |
|
|
|
|
|
|
|
|
|
import ( |
|
|
|
|
"errors" |
|
|
|
|
"fmt" |
|
|
|
|
"io/ioutil" |
|
|
|
|
"os" |
|
|
|
|
"strconv" |
|
|
|
|
"strings" |
|
|
|
|
|
|
|
|
|
"github.com/gogits/gogs/models" |
|
|
|
@ -12,6 +17,7 @@ import ( |
|
|
|
|
"github.com/gogits/gogs/modules/base" |
|
|
|
|
"github.com/gogits/gogs/modules/log" |
|
|
|
|
"github.com/gogits/gogs/modules/middleware" |
|
|
|
|
"github.com/gogits/gogs/modules/process" |
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
const ( |
|
|
|
@ -23,6 +29,17 @@ const ( |
|
|
|
|
SECURITY base.TplName = "user/security" |
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
var ( |
|
|
|
|
MinimumKeySize = map[string]int{ |
|
|
|
|
"(ED25519)": 256, |
|
|
|
|
"(ECDSA)": 256, |
|
|
|
|
"(NTRU)": 1087, |
|
|
|
|
"(MCE)": 1702, |
|
|
|
|
"(McE)": 1702, |
|
|
|
|
"(RSA)": 2048, |
|
|
|
|
} |
|
|
|
|
) |
|
|
|
|
|
|
|
|
|
func Setting(ctx *middleware.Context) { |
|
|
|
|
ctx.Data["Title"] = "Setting" |
|
|
|
|
ctx.Data["PageIsUserSetting"] = true |
|
|
|
@ -142,6 +159,50 @@ func SettingPasswordPost(ctx *middleware.Context, form auth.UpdatePasswdForm) { |
|
|
|
|
ctx.Redirect("/user/settings/password") |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// Checks if the given public key string is recognized by SSH.
|
|
|
|
|
func CheckPublicKeyString(keyContent string) (ok bool, err error) { |
|
|
|
|
if strings.ContainsAny(keyContent, "\n\r") { |
|
|
|
|
return false, errors.New("Only a single line with a single key please") |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
// write the key to a file…
|
|
|
|
|
tmpFile, err := ioutil.TempFile(os.TempDir(), "keytest") |
|
|
|
|
if err != nil { |
|
|
|
|
return false, err |
|
|
|
|
} |
|
|
|
|
tmpPath := tmpFile.Name() |
|
|
|
|
defer os.Remove(tmpPath) |
|
|
|
|
tmpFile.WriteString(keyContent) |
|
|
|
|
tmpFile.Close() |
|
|
|
|
|
|
|
|
|
// … see if ssh-keygen recognizes its contents
|
|
|
|
|
stdout, stderr, err := process.Exec("CheckPublicKeyString", "ssh-keygen", "-l", "-f", tmpPath) |
|
|
|
|
if err != nil { |
|
|
|
|
return false, errors.New("ssh-keygen -l -f: " + stderr) |
|
|
|
|
} else if len(stdout) < 2 { |
|
|
|
|
return false, errors.New("ssh-keygen returned not enough output to evaluate the key") |
|
|
|
|
} |
|
|
|
|
sshKeygenOutput := strings.Split(stdout, " ") |
|
|
|
|
if len(sshKeygenOutput) < 4 { |
|
|
|
|
return false, errors.New("Not enough fields returned by ssh-keygen -l -f") |
|
|
|
|
} |
|
|
|
|
keySize, err := strconv.Atoi(sshKeygenOutput[0]) |
|
|
|
|
if err != nil { |
|
|
|
|
return false, errors.New("Cannot get key size of the given key") |
|
|
|
|
} |
|
|
|
|
keyType := strings.TrimSpace(sshKeygenOutput[len(sshKeygenOutput)-1]) |
|
|
|
|
|
|
|
|
|
if minimumKeySize := MinimumKeySize[keyType]; minimumKeySize == 0 { |
|
|
|
|
return false, errors.New("Sorry, unrecognized public key type") |
|
|
|
|
} else { |
|
|
|
|
if keySize < minimumKeySize { |
|
|
|
|
return false, fmt.Errorf("The minimum accepted size of a public key %s is %d", keyType, minimumKeySize) |
|
|
|
|
} |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
return true, nil |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
func SettingSSHKeys(ctx *middleware.Context, form auth.AddSSHKeyForm) { |
|
|
|
|
ctx.Data["Title"] = "SSH Keys" |
|
|
|
|
ctx.Data["PageIsUserSetting"] = true |
|
|
|
@ -189,8 +250,8 @@ func SettingSSHKeys(ctx *middleware.Context, form auth.AddSSHKeyForm) { |
|
|
|
|
return |
|
|
|
|
} |
|
|
|
|
|
|
|
|
|
if len(form.KeyContent) < 100 || !strings.HasPrefix(form.KeyContent, "ssh-rsa") { |
|
|
|
|
ctx.Flash.Error("SSH key content is not valid.") |
|
|
|
|
if ok, err := CheckPublicKeyString(form.KeyContent); !ok { |
|
|
|
|
ctx.Flash.Error(err.Error()) |
|
|
|
|
ctx.Redirect("/user/settings/ssh") |
|
|
|
|
return |
|
|
|
|
} |
|
|
|
|