aboutsummaryrefslogtreecommitdiff
path: root/weed/sftpd/auth/publickey.go
diff options
context:
space:
mode:
Diffstat (limited to 'weed/sftpd/auth/publickey.go')
-rw-r--r--weed/sftpd/auth/publickey.go68
1 files changed, 68 insertions, 0 deletions
diff --git a/weed/sftpd/auth/publickey.go b/weed/sftpd/auth/publickey.go
new file mode 100644
index 000000000..83c5092a1
--- /dev/null
+++ b/weed/sftpd/auth/publickey.go
@@ -0,0 +1,68 @@
+package auth
+
+import (
+ "crypto/subtle"
+ "fmt"
+
+ "github.com/seaweedfs/seaweedfs/weed/sftpd/user"
+ "golang.org/x/crypto/ssh"
+)
+
+// PublicKeyAuthenticator handles public key-based authentication
+type PublicKeyAuthenticator struct {
+ userStore user.Store
+ enabled bool
+}
+
+// NewPublicKeyAuthenticator creates a new public key authenticator
+func NewPublicKeyAuthenticator(userStore user.Store, enabled bool) *PublicKeyAuthenticator {
+ return &PublicKeyAuthenticator{
+ userStore: userStore,
+ enabled: enabled,
+ }
+}
+
+// Enabled returns whether public key authentication is enabled
+func (a *PublicKeyAuthenticator) Enabled() bool {
+ return a.enabled
+}
+
+// Authenticate validates a public key for a user
+func (a *PublicKeyAuthenticator) Authenticate(conn ssh.ConnMetadata, key ssh.PublicKey) (*ssh.Permissions, error) {
+ username := conn.User()
+
+ // Check if public key auth is enabled
+ if !a.enabled {
+ return nil, fmt.Errorf("public key authentication disabled")
+ }
+
+ // Convert key to string format for comparison
+ keyData := string(key.Marshal())
+
+ // Validate public key
+ if ValidatePublicKey(a.userStore, username, keyData) {
+ return &ssh.Permissions{
+ Extensions: map[string]string{
+ "username": username,
+ },
+ }, nil
+ }
+
+ return nil, fmt.Errorf("authentication failed")
+}
+
+// ValidatePublicKey checks if the provided public key is valid for the user
+func ValidatePublicKey(store user.Store, username string, keyData string) bool {
+ user, err := store.GetUser(username)
+ if err != nil {
+ return false
+ }
+
+ for _, key := range user.PublicKeys {
+ if subtle.ConstantTimeCompare([]byte(key), []byte(keyData)) == 1 {
+ return true
+ }
+ }
+
+ return false
+}