You cannot select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
145 lines
3.1 KiB
Go
145 lines
3.1 KiB
Go
2 years ago
|
package main
|
||
|
|
||
|
import (
|
||
|
"crypto/rand"
|
||
|
"crypto/rsa"
|
||
|
"crypto/x509"
|
||
|
"encoding/binary"
|
||
|
"encoding/pem"
|
||
|
"io/ioutil"
|
||
|
"log"
|
||
|
|
||
|
ipfsapi "github.com/ipfs/go-ipfs-api"
|
||
|
"golang.org/x/crypto/ssh"
|
||
|
)
|
||
|
|
||
|
func generatePrivateKey(bitSize int) (*rsa.PrivateKey, error) {
|
||
|
// Private Key generation
|
||
|
privateKey, err := rsa.GenerateKey(rand.Reader, bitSize)
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
|
||
|
// Validate Private Key
|
||
|
err = privateKey.Validate()
|
||
|
if err != nil {
|
||
|
return nil, err
|
||
|
}
|
||
|
|
||
|
log.Println("Private Key generated")
|
||
|
return privateKey, nil
|
||
|
}
|
||
|
|
||
|
func encodePrivateKeyToPEM(privateKey *rsa.PrivateKey) []byte {
|
||
|
// Get ASN.1 DER format
|
||
|
privDER := x509.MarshalPKCS1PrivateKey(privateKey)
|
||
|
|
||
|
// pem.Block
|
||
|
privBlock := pem.Block{
|
||
|
Type: "RSA PRIVATE KEY",
|
||
|
Headers: nil,
|
||
|
Bytes: privDER,
|
||
|
}
|
||
|
|
||
|
// Private key in PEM format
|
||
|
privatePEM := pem.EncodeToMemory(&privBlock)
|
||
|
|
||
|
return privatePEM
|
||
|
}
|
||
|
|
||
|
// parseDims extracts two uint32s from the provided buffer.
|
||
|
func parseDims(b []byte) (uint32, uint32) {
|
||
|
w := binary.BigEndian.Uint32(b)
|
||
|
h := binary.BigEndian.Uint32(b[4:])
|
||
|
return w, h
|
||
|
}
|
||
|
|
||
|
const WebDir = "/hugo-website"
|
||
|
|
||
|
func main() {
|
||
|
// shell := ipfsapi.NewShell("127.0.0.1:5001")
|
||
|
|
||
|
// ctx, _ := context.WithDeadline(context.Background(), time.Now().Add(time.Hour))
|
||
|
// _, err := shell.KeyGen(ctx, "website-index")
|
||
|
// if err != nil {
|
||
|
// log.Fatal(err)
|
||
|
// }
|
||
|
|
||
|
// id, err := shell.Add(
|
||
|
// strings.NewReader(
|
||
|
// "<!DOCTYPE HTML>" +
|
||
|
// "<html><body><h1>heeeeeeeyaa</h1></body></html>",
|
||
|
// ),
|
||
|
// )
|
||
|
// if err != nil {
|
||
|
// log.Fatal(err)
|
||
|
// }
|
||
|
|
||
|
// log.Println("added file by name " + id)
|
||
|
|
||
|
// resp, err := shell.PublishWithDetails(id, "website/index.html", 24*365*10*time.Hour, time.Hour, true)
|
||
|
// if err != nil {
|
||
|
// log.Fatal(err)
|
||
|
// }
|
||
|
|
||
|
// log.Println(resp.Name)
|
||
|
|
||
|
// obj, err := shell.ObjectGet("QmbJSh4EQvxz6cD6NyZ92smxBYfwTU6zr6No5APjANZ92D")
|
||
|
|
||
|
// if err != nil {
|
||
|
// log.Fatal(err)
|
||
|
// }
|
||
|
|
||
|
// log.Println(obj.Links)
|
||
|
|
||
|
// err = shell.FilesMkdir(ctx, WebDir)
|
||
|
// if err!= nil {
|
||
|
// log.Fatal(err)
|
||
|
// }
|
||
|
|
||
|
// shell.FilesLs(ctx context.Context, path string, options ...ipfsapi.FilesOpt)
|
||
|
// stats, err := shell.FilesStat(ctx, WebDir)
|
||
|
// if err != nil {
|
||
|
// if ipfsErr, ok := err.(*ipfsapi.Error); ok {
|
||
|
// log.Println("IPFS error code: ", ipfsErr.Code, ipfsErr.Command)
|
||
|
|
||
|
// }
|
||
|
|
||
|
// log.Fatal(err)
|
||
|
// }
|
||
|
|
||
|
// log.Println(stats)
|
||
|
|
||
|
// Public key authentication is done by comparing
|
||
|
// the public key of a received connection
|
||
|
// with the entries in the authorized_keys file.
|
||
|
authorizedKeysBytes, err := ioutil.ReadFile("/home/hugo/.ssh/authorized_keys")
|
||
|
if err != nil {
|
||
|
log.Fatalf("Failed to load authorized_keys, err: %v", err)
|
||
|
}
|
||
|
|
||
|
authorizedKeysMap := map[string]bool{}
|
||
|
for len(authorizedKeysBytes) > 0 {
|
||
|
pubKey, _, _, rest, err := ssh.ParseAuthorizedKey(authorizedKeysBytes)
|
||
|
if err != nil {
|
||
|
log.Fatal(err)
|
||
|
}
|
||
|
|
||
|
authorizedKeysMap[string(pubKey.Marshal())] = true
|
||
|
authorizedKeysBytes = rest
|
||
|
}
|
||
|
|
||
|
// shell :=
|
||
|
filestore, err := NewIPFSFilestore(ipfsapi.NewShell("127.0.0.1:5001"), WebDir)
|
||
|
if err != nil {
|
||
|
log.Fatal(err)
|
||
|
}
|
||
|
|
||
|
server := &Sshd{
|
||
|
AuthorizedKeysMap: authorizedKeysMap,
|
||
|
Filestore: filestore,
|
||
|
}
|
||
|
|
||
|
log.Fatal(server.Listen("0.0.0.0:2022"))
|
||
|
}
|