aboutsummaryrefslogtreecommitdiff
path: root/ssh_server.go
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--ssh_server.go32
1 files changed, 16 insertions, 16 deletions
diff --git a/ssh_server.go b/ssh_server.go
index 42188fb..24495b8 100644
--- a/ssh_server.go
+++ b/ssh_server.go
@@ -9,42 +9,42 @@ import (
"os"
"strings"
- glider_ssh "github.com/gliderlabs/ssh"
+ gliderSSH "github.com/gliderlabs/ssh"
"go.lindenii.runxiyu.org/lindenii-common/ansiec"
"go.lindenii.runxiyu.org/lindenii-common/clog"
- go_ssh "golang.org/x/crypto/ssh"
+ goSSH "golang.org/x/crypto/ssh"
)
var (
- server_public_key_string string
- server_public_key_fingerprint string
- server_public_key go_ssh.PublicKey
+ serverPubkeyString string
+ serverPubkeyFP string
+ serverPubkey goSSH.PublicKey
)
func serveSSH(listener net.Listener) error {
var host_key_bytes []byte
- var host_key go_ssh.Signer
+ var host_key goSSH.Signer
var err error
- var server *glider_ssh.Server
+ var server *gliderSSH.Server
if host_key_bytes, err = os.ReadFile(config.SSH.Key); err != nil {
return err
}
- if host_key, err = go_ssh.ParsePrivateKey(host_key_bytes); err != nil {
+ if host_key, err = goSSH.ParsePrivateKey(host_key_bytes); err != nil {
return err
}
- server_public_key = host_key.PublicKey()
- server_public_key_string = string(go_ssh.MarshalAuthorizedKey(server_public_key))
- server_public_key_fingerprint = go_ssh.FingerprintSHA256(server_public_key)
+ serverPubkey = host_key.PublicKey()
+ serverPubkeyString = string(goSSH.MarshalAuthorizedKey(serverPubkey))
+ serverPubkeyFP = goSSH.FingerprintSHA256(serverPubkey)
- server = &glider_ssh.Server{
- Handler: func(session glider_ssh.Session) {
+ server = &gliderSSH.Server{
+ Handler: func(session gliderSSH.Session) {
client_public_key := session.PublicKey()
var client_public_key_string string
if client_public_key != nil {
- client_public_key_string = strings.TrimSuffix(string(go_ssh.MarshalAuthorizedKey(client_public_key)), "\n")
+ client_public_key_string = strings.TrimSuffix(string(goSSH.MarshalAuthorizedKey(client_public_key)), "\n")
}
clog.Info("Incoming SSH: " + session.RemoteAddr().String() + " " + client_public_key_string + " " + session.RawCommand())
@@ -79,8 +79,8 @@ func serveSSH(listener net.Listener) error {
return
}
},
- PublicKeyHandler: func(ctx glider_ssh.Context, key glider_ssh.PublicKey) bool { return true },
- KeyboardInteractiveHandler: func(ctx glider_ssh.Context, challenge go_ssh.KeyboardInteractiveChallenge) bool { return true },
+ PublicKeyHandler: func(ctx gliderSSH.Context, key gliderSSH.PublicKey) bool { return true },
+ KeyboardInteractiveHandler: func(ctx gliderSSH.Context, challenge goSSH.KeyboardInteractiveChallenge) bool { return true },
// It is intentional that we do not check any credentials and accept all connections.
// This allows all users to connect and clone repositories. However, the public key
// is passed to handlers, so e.g. the push handler could check the key and reject the