diff options
author | Runxi Yu <me@runxiyu.org> | 2025-03-19 12:19:57 +0800 |
---|---|---|
committer | Runxi Yu <me@runxiyu.org> | 2025-03-19 12:19:57 +0800 |
commit | 9cf817e614a906c54990c74c28d4a6dcf9465731 (patch) | |
tree | 6d26a521af68c03f5f883a8ebe16b8842fd0db22 /ssh_server.go | |
parent | Remove underscores from Go code, pt 5 (diff) | |
download | forge-9cf817e614a906c54990c74c28d4a6dcf9465731.tar.gz forge-9cf817e614a906c54990c74c28d4a6dcf9465731.tar.zst forge-9cf817e614a906c54990c74c28d4a6dcf9465731.zip |
Remove underscores from Go code, pt 6
Diffstat (limited to '')
-rw-r--r-- | ssh_server.go | 32 |
1 files changed, 16 insertions, 16 deletions
diff --git a/ssh_server.go b/ssh_server.go index 42188fb..24495b8 100644 --- a/ssh_server.go +++ b/ssh_server.go @@ -9,42 +9,42 @@ import ( "os" "strings" - glider_ssh "github.com/gliderlabs/ssh" + gliderSSH "github.com/gliderlabs/ssh" "go.lindenii.runxiyu.org/lindenii-common/ansiec" "go.lindenii.runxiyu.org/lindenii-common/clog" - go_ssh "golang.org/x/crypto/ssh" + goSSH "golang.org/x/crypto/ssh" ) var ( - server_public_key_string string - server_public_key_fingerprint string - server_public_key go_ssh.PublicKey + serverPubkeyString string + serverPubkeyFP string + serverPubkey goSSH.PublicKey ) func serveSSH(listener net.Listener) error { var host_key_bytes []byte - var host_key go_ssh.Signer + var host_key goSSH.Signer var err error - var server *glider_ssh.Server + var server *gliderSSH.Server if host_key_bytes, err = os.ReadFile(config.SSH.Key); err != nil { return err } - if host_key, err = go_ssh.ParsePrivateKey(host_key_bytes); err != nil { + if host_key, err = goSSH.ParsePrivateKey(host_key_bytes); err != nil { return err } - server_public_key = host_key.PublicKey() - server_public_key_string = string(go_ssh.MarshalAuthorizedKey(server_public_key)) - server_public_key_fingerprint = go_ssh.FingerprintSHA256(server_public_key) + serverPubkey = host_key.PublicKey() + serverPubkeyString = string(goSSH.MarshalAuthorizedKey(serverPubkey)) + serverPubkeyFP = goSSH.FingerprintSHA256(serverPubkey) - server = &glider_ssh.Server{ - Handler: func(session glider_ssh.Session) { + server = &gliderSSH.Server{ + Handler: func(session gliderSSH.Session) { client_public_key := session.PublicKey() var client_public_key_string string if client_public_key != nil { - client_public_key_string = strings.TrimSuffix(string(go_ssh.MarshalAuthorizedKey(client_public_key)), "\n") + client_public_key_string = strings.TrimSuffix(string(goSSH.MarshalAuthorizedKey(client_public_key)), "\n") } clog.Info("Incoming SSH: " + session.RemoteAddr().String() + " " + client_public_key_string + " " + session.RawCommand()) @@ -79,8 +79,8 @@ func serveSSH(listener net.Listener) error { return } }, - PublicKeyHandler: func(ctx glider_ssh.Context, key glider_ssh.PublicKey) bool { return true }, - KeyboardInteractiveHandler: func(ctx glider_ssh.Context, challenge go_ssh.KeyboardInteractiveChallenge) bool { return true }, + PublicKeyHandler: func(ctx gliderSSH.Context, key gliderSSH.PublicKey) bool { return true }, + KeyboardInteractiveHandler: func(ctx gliderSSH.Context, challenge goSSH.KeyboardInteractiveChallenge) bool { return true }, // It is intentional that we do not check any credentials and accept all connections. // This allows all users to connect and clone repositories. However, the public key // is passed to handlers, so e.g. the push handler could check the key and reject the |