From a502d96a860456ec5e8c96761db70f7cabb74751 Mon Sep 17 00:00:00 2001
From: Paul Martin <paul@paulsputer.com>
Date: Sat, 30 Apr 2016 04:19:14 -0400
Subject: [PATCH] Merge pull request #1073 from gitblit/1062-DocEditorUpdates

---
 src/main/java/com/gitblit/transport/ssh/FileKeyManager.java |  201 +++++++++++++++++++++++++++++++++++++++----------
 1 files changed, 158 insertions(+), 43 deletions(-)

diff --git a/src/main/java/com/gitblit/transport/ssh/FileKeyManager.java b/src/main/java/com/gitblit/transport/ssh/FileKeyManager.java
index 87912ca..1a2cd68 100644
--- a/src/main/java/com/gitblit/transport/ssh/FileKeyManager.java
+++ b/src/main/java/com/gitblit/transport/ssh/FileKeyManager.java
@@ -17,67 +17,89 @@
 
 import java.io.File;
 import java.io.IOException;
-import java.security.PublicKey;
 import java.text.MessageFormat;
 import java.util.ArrayList;
 import java.util.List;
+import java.util.Map;
+import java.util.concurrent.ConcurrentHashMap;
 
-import org.apache.commons.codec.binary.Base64;
-import org.apache.sshd.common.util.Buffer;
-import org.eclipse.jgit.lib.Constants;
-
+import com.gitblit.Constants.AccessPermission;
 import com.gitblit.Keys;
 import com.gitblit.manager.IRuntimeManager;
 import com.google.common.base.Charsets;
+import com.google.common.base.Joiner;
 import com.google.common.io.Files;
+import com.google.inject.Inject;
 
 /**
- * Manages SSH keys on the filesystem.
- * 
+ * Manages public keys on the filesystem.
+ *
  * @author James Moger
  *
  */
-public class FileKeyManager implements IKeyManager {
+public class FileKeyManager extends IPublicKeyManager {
 
 	protected final IRuntimeManager runtimeManager;
-	
+
+	protected final Map<File, Long> lastModifieds;
+
+	@Inject
 	public FileKeyManager(IRuntimeManager runtimeManager) {
 		this.runtimeManager = runtimeManager;
+		this.lastModifieds = new ConcurrentHashMap<File, Long>();
 	}
-	
+
 	@Override
 	public String toString() {
 		File dir = runtimeManager.getFileOrFolder(Keys.git.sshKeysFolder, "${baseFolder}/ssh");
 		return MessageFormat.format("{0} ({1})", getClass().getSimpleName(), dir);
 	}
-	
+
 	@Override
 	public FileKeyManager start() {
+		log.info(toString());
 		return this;
 	}
-	
+
 	@Override
 	public boolean isReady() {
 		return true;
 	}
-	
+
 	@Override
 	public FileKeyManager stop() {
 		return this;
 	}
 
 	@Override
-	public List<PublicKey> getKeys(String username) {
+	protected boolean isStale(String username) {
+		File keystore = getKeystore(username);
+		if (!keystore.exists()) {
+			// keystore may have been deleted
+			return true;
+		}
+
+		if (lastModifieds.containsKey(keystore)) {
+			// compare modification times
+			long lastModified = lastModifieds.get(keystore);
+			return lastModified != keystore.lastModified();
+		}
+
+		// assume stale
+		return true;
+	}
+
+	@Override
+	protected List<SshKey> getKeysImpl(String username) {
 		try {
-			File keys = getKeystore(username);
-			if (!keys.exists()) {
+			log.info("loading ssh keystore for {}", username);
+			File keystore = getKeystore(username);
+			if (!keystore.exists()) {
 				return null;
 			}
-			if (keys.exists()) {
-				String str = Files.toString(keys, Charsets.ISO_8859_1);
-				String [] entries = str.split("\n");
-				List<PublicKey> list = new ArrayList<PublicKey>();
-				for (String entry : entries) {
+			if (keystore.exists()) {
+				List<SshKey> list = new ArrayList<SshKey>();
+				for (String entry : Files.readLines(keystore, Charsets.ISO_8859_1)) {
 					if (entry.trim().length() == 0) {
 						// skip blanks
 						continue;
@@ -86,57 +108,124 @@
 						// skip comments
 						continue;
 					}
-					final String[] parts = entry.split(" ");
-					final byte[] bin = Base64.decodeBase64(Constants.encodeASCII(parts[1]));
-					list.add(new Buffer(bin).getRawPublicKey());
+					String [] parts = entry.split(" ", 2);
+					AccessPermission perm = AccessPermission.fromCode(parts[0]);
+					if (perm.equals(AccessPermission.NONE)) {
+						// ssh-rsa DATA COMMENT
+						SshKey key = new SshKey(entry);
+						list.add(key);
+					} else if (perm.exceeds(AccessPermission.NONE)) {
+						// PERMISSION ssh-rsa DATA COMMENT
+						SshKey key = new SshKey(parts[1]);
+						key.setPermission(perm);
+						list.add(key);
+					}
 				}
-				
+
 				if (list.isEmpty()) {
 					return null;
 				}
+
+				lastModifieds.put(keystore, keystore.lastModified());
 				return list;
 			}
 		} catch (IOException e) {
-			throw new RuntimeException("Canot read ssh keys", e);
+			throw new RuntimeException("Cannot read ssh keys", e);
 		}
 		return null;
 	}
 
+	/**
+	 * Adds a unique key to the keystore.  This function determines uniqueness
+	 * by disregarding the comment/description field during key comparisons.
+	 */
 	@Override
-	public boolean addKey(String username, String data) {
+	public boolean addKey(String username, SshKey key) {
 		try {
-			File keys = getKeystore(username);
-			Files.append(data + '\n', keys, Charsets.ISO_8859_1);
+			boolean replaced = false;
+			List<String> lines = new ArrayList<String>();
+			File keystore = getKeystore(username);
+			if (keystore.exists()) {
+				for (String entry : Files.readLines(keystore, Charsets.ISO_8859_1)) {
+					String line = entry.trim();
+					if (line.length() == 0) {
+						// keep blanks
+						lines.add(entry);
+						continue;
+					}
+					if (line.charAt(0) == '#') {
+						// keep comments
+						lines.add(entry);
+						continue;
+					}
+
+					SshKey oldKey = parseKey(line);
+					if (key.equals(oldKey)) {
+						// replace key
+						lines.add(key.getPermission() + " " + key.getRawData());
+						replaced = true;
+					} else {
+						// retain key
+						lines.add(entry);
+					}
+				}
+			}
+
+			if (!replaced) {
+				// new key, append
+				lines.add(key.getPermission() + " " + key.getRawData());
+			}
+
+			// write keystore
+			String content = Joiner.on("\n").join(lines).trim().concat("\n");
+			Files.write(content, keystore, Charsets.ISO_8859_1);
+
+			lastModifieds.remove(keystore);
+			keyCache.invalidate(username);
 			return true;
 		} catch (IOException e) {
 			throw new RuntimeException("Cannot add ssh key", e);
 		}
 	}
-	
+
+	/**
+	 * Removes the specified key from the keystore.
+	 */
 	@Override
-	public boolean removeKey(String username, String data) {
+	public boolean removeKey(String username, SshKey key) {
 		try {
 			File keystore = getKeystore(username);
 			if (keystore.exists()) {
-				String str = Files.toString(keystore, Charsets.ISO_8859_1);
-				List<String> keep = new ArrayList<String>();
-				String [] entries = str.split("\n");
-				for (String entry : entries) {
-					if (entry.trim().length() == 0) {
+				List<String> lines = new ArrayList<String>();
+				for (String entry : Files.readLines(keystore, Charsets.ISO_8859_1)) {
+					String line = entry.trim();
+					if (line.length() == 0) {
 						// keep blanks
-						keep.add(entry);
+						lines.add(entry);
 						continue;
 					}
-					if (entry.charAt(0) == '#') {
+					if (line.charAt(0) == '#') {
 						// keep comments
-						keep.add(entry);
+						lines.add(entry);
 						continue;
 					}
-					final String[] parts = entry.split(" ");
-					if (!parts[1].equals(data)) {
-						keep.add(entry);
+
+					// only include keys that are NOT rmKey
+					SshKey oldKey = parseKey(line);
+					if (!key.equals(oldKey)) {
+						lines.add(entry);
 					}
 				}
+				if (lines.isEmpty()) {
+					keystore.delete();
+				} else {
+					// write keystore
+					String content = Joiner.on("\n").join(lines).trim().concat("\n");
+					Files.write(content, keystore, Charsets.ISO_8859_1);
+				}
+
+				lastModifieds.remove(keystore);
+				keyCache.invalidate(username);
 				return true;
 			}
 		} catch (IOException e) {
@@ -144,11 +233,37 @@
 		}
 		return false;
 	}
-	
+
+	@Override
+	public boolean removeAllKeys(String username) {
+		File keystore = getKeystore(username);
+		if (keystore.delete()) {
+			lastModifieds.remove(keystore);
+			keyCache.invalidate(username);
+			return true;
+		}
+		return false;
+	}
+
 	protected File getKeystore(String username) {
 		File dir = runtimeManager.getFileOrFolder(Keys.git.sshKeysFolder, "${baseFolder}/ssh");
 		dir.mkdirs();
 		File keys = new File(dir, username + ".keys");
 		return keys;
 	}
+
+	protected SshKey parseKey(String line) {
+		String [] parts = line.split(" ", 2);
+		AccessPermission perm = AccessPermission.fromCode(parts[0]);
+		if (perm.equals(AccessPermission.NONE)) {
+			// ssh-rsa DATA COMMENT
+			SshKey key = new SshKey(line);
+			return key;
+		} else {
+			// PERMISSION ssh-rsa DATA COMMENT
+			SshKey key = new SshKey(parts[1]);
+			key.setPermission(perm);
+			return key;
+		}
+	}
 }

--
Gitblit v1.9.1