-
-
Notifications
You must be signed in to change notification settings - Fork 5.5k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
7 changed files
with
136 additions
and
19 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,85 @@ | ||
// Copyright 2018 The Gitea Authors. All rights reserved. | ||
// Use of this source code is governed by a MIT-style | ||
// license that can be found in the LICENSE file. | ||
|
||
package cmd | ||
|
||
import ( | ||
"errors" | ||
"fmt" | ||
"strings" | ||
|
||
"code.gitea.io/gitea/models" | ||
"code.gitea.io/gitea/modules/setting" | ||
|
||
"github.com/urfave/cli" | ||
) | ||
|
||
// CmdKeys represents the available keys sub-command | ||
var CmdKeys = cli.Command{ | ||
Name: "keys", | ||
Usage: "This command queries the Gitea database to get the authorized command for a given ssh key fingerprint", | ||
Action: runKeys, | ||
Flags: []cli.Flag{ | ||
cli.StringFlag{ | ||
Name: "expected, e", | ||
Value: "git", | ||
Usage: "Expected user for whom provide key commands", | ||
}, | ||
cli.StringFlag{ | ||
Name: "username, u", | ||
Value: "", | ||
Usage: "Username trying to log in by SSH", | ||
}, | ||
cli.StringFlag{ | ||
Name: "type, t", | ||
Value: "", | ||
Usage: "Type of the SSH key provided to the SSH Server (requires content to be provided too)", | ||
}, | ||
cli.StringFlag{ | ||
Name: "content, k", | ||
Value: "", | ||
Usage: "Base64 encoded content of the SSH key provided to the SSH Server (requires type to be provided too)", | ||
}, | ||
cli.StringFlag{ | ||
Name: "config, c", | ||
Value: "custom/conf/app.ini", | ||
Usage: "Custom configuration file path", | ||
}, | ||
}, | ||
} | ||
|
||
func runKeys(c *cli.Context) error { | ||
if c.IsSet("config") { | ||
setting.CustomConf = c.String("config") | ||
} | ||
|
||
if !c.IsSet("username") { | ||
return errors.New("No username provided") | ||
} | ||
// Check username matches the expected username | ||
if strings.TrimSpace(c.String("username")) != strings.TrimSpace(c.String("expected")) { | ||
return nil | ||
} | ||
|
||
content := "" | ||
|
||
if c.IsSet("type") && c.IsSet("content") { | ||
content = fmt.Sprintf("%s %s", strings.TrimSpace(c.String("type")), strings.TrimSpace(c.String("content"))) | ||
} | ||
|
||
if content == "" { | ||
return errors.New("No key type and content provided") | ||
} | ||
|
||
if err := initDBDisableConsole(true); err != nil { | ||
return err | ||
} | ||
|
||
publicKey, err := models.SearchPublicKeyByContent(content) | ||
if err != nil { | ||
return err | ||
} | ||
fmt.Println(publicKey.AuthorizedString()) | ||
return nil | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -154,6 +154,9 @@ SSH_PORT = 22 | |
SSH_LISTEN_PORT = %(SSH_PORT)s | ||
; Root path of SSH directory, default is '~/.ssh', but you have to use '/home/git/.ssh'. | ||
SSH_ROOT_PATH = | ||
; Gitea will create a authorized_keys file by default when it is not using the internal ssh server | ||
; If you intend to use the AuthorizedKeysCommand functionality then you should turn this off. | ||
SSH_CREATE_AUTHORIZED_KEYS_FILE = true | ||
; For the built-in SSH server, choose the ciphers to support for SSH connections, | ||
; for system SSH this setting has no effect | ||
SSH_SERVER_CIPHERS = aes128-ctr, aes192-ctr, aes256-ctr, [email protected], arcfour256, arcfour128 | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters