HostKeyProvider: Use AbstractFileKeyPairProvider
MINA SSHD didn't remove the FileKeyPairProvider in SSHD-1.0.0; it apparently got refactored a bit. By changing how HostKeyProvider works, we can take advantage of their new API and remove our copy of FileKeyPairProvider. Inspired-By: Lyor Goldstein <lgoldstein@vmware.com> Change-Id: Idfdcb947740a455619a9b6de2b07a4b1df7b1437
This commit is contained in:
		
				
					committed by
					
						
						David Pursehouse
					
				
			
			
				
	
			
			
			
						parent
						
							4efa2efa07
						
					
				
				
					commit
					31e921b028
				
			@@ -32,7 +32,6 @@ java_library(
 | 
			
		||||
    '@jgit//org.eclipse.jgit.archive:jgit-archive',
 | 
			
		||||
  ],
 | 
			
		||||
  provided_deps = [
 | 
			
		||||
    '//lib/bouncycastle:bcpkix',
 | 
			
		||||
    '//lib/bouncycastle:bcprov',
 | 
			
		||||
  ],
 | 
			
		||||
  visibility = ['PUBLIC'],
 | 
			
		||||
 
 | 
			
		||||
@@ -1,150 +0,0 @@
 | 
			
		||||
/*
 | 
			
		||||
 * Licensed to the Apache Software Foundation (ASF) under one
 | 
			
		||||
 * or more contributor license agreements.  See the NOTICE file
 | 
			
		||||
 * distributed with this work for additional information
 | 
			
		||||
 * regarding copyright ownership.  The ASF licenses this file
 | 
			
		||||
 * to you under the Apache License, Version 2.0 (the
 | 
			
		||||
 * "License"); you may not use this file except in compliance
 | 
			
		||||
 * with the License.  You may obtain a copy of the License at
 | 
			
		||||
 *
 | 
			
		||||
 *   http://www.apache.org/licenses/LICENSE-2.0
 | 
			
		||||
 *
 | 
			
		||||
 * Unless required by applicable law or agreed to in writing,
 | 
			
		||||
 * software distributed under the License is distributed on an
 | 
			
		||||
 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 | 
			
		||||
 * KIND, either express or implied.  See the License for the
 | 
			
		||||
 * specific language governing permissions and limitations
 | 
			
		||||
 * under the License.
 | 
			
		||||
 */
 | 
			
		||||
package com.google.gerrit.sshd;
 | 
			
		||||
 | 
			
		||||
import org.apache.sshd.common.keyprovider.AbstractKeyPairProvider;
 | 
			
		||||
import org.apache.sshd.common.util.SecurityUtils;
 | 
			
		||||
import org.bouncycastle.openssl.PEMDecryptorProvider;
 | 
			
		||||
import org.bouncycastle.openssl.PEMEncryptedKeyPair;
 | 
			
		||||
import org.bouncycastle.openssl.PEMKeyPair;
 | 
			
		||||
import org.bouncycastle.openssl.PEMParser;
 | 
			
		||||
import org.bouncycastle.openssl.PasswordFinder;
 | 
			
		||||
import org.bouncycastle.openssl.jcajce.JcaPEMKeyConverter;
 | 
			
		||||
import org.bouncycastle.openssl.jcajce.JcePEMDecryptorProviderBuilder;
 | 
			
		||||
 | 
			
		||||
import java.io.FileInputStream;
 | 
			
		||||
import java.io.InputStreamReader;
 | 
			
		||||
import java.security.KeyPair;
 | 
			
		||||
import java.util.Arrays;
 | 
			
		||||
import java.util.Iterator;
 | 
			
		||||
import java.util.NoSuchElementException;
 | 
			
		||||
 | 
			
		||||
/**
 | 
			
		||||
 * This host key provider loads private keys from the specified files.
 | 
			
		||||
 *
 | 
			
		||||
 * Note that this class has a direct dependency on BouncyCastle and won't work
 | 
			
		||||
 * unless it has been correctly registered as a security provider.
 | 
			
		||||
 *
 | 
			
		||||
 * @author <a href="mailto:dev@mina.apache.org">Apache MINA SSHD Project</a>
 | 
			
		||||
 */
 | 
			
		||||
public class FileKeyPairProvider extends AbstractKeyPairProvider {
 | 
			
		||||
 | 
			
		||||
    private String[] files;
 | 
			
		||||
    private PasswordFinder passwordFinder;
 | 
			
		||||
 | 
			
		||||
    public FileKeyPairProvider() {
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    public FileKeyPairProvider(String[] files) {
 | 
			
		||||
        this.files = files;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    public FileKeyPairProvider(String[] files, PasswordFinder passwordFinder) {
 | 
			
		||||
        this.files = files;
 | 
			
		||||
        this.passwordFinder = passwordFinder;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    public String[] getFiles() {
 | 
			
		||||
        return files;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    public void setFiles(String[] files) {
 | 
			
		||||
        this.files = files;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    public PasswordFinder getPasswordFinder() {
 | 
			
		||||
        return passwordFinder;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    public void setPasswordFinder(PasswordFinder passwordFinder) {
 | 
			
		||||
        this.passwordFinder = passwordFinder;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    @Override
 | 
			
		||||
    public Iterable<KeyPair> loadKeys() {
 | 
			
		||||
        if (!SecurityUtils.isBouncyCastleRegistered()) {
 | 
			
		||||
            throw new IllegalStateException("BouncyCastle must be registered as a JCE provider");
 | 
			
		||||
        }
 | 
			
		||||
        return new Iterable<KeyPair>() {
 | 
			
		||||
            @Override
 | 
			
		||||
            public Iterator<KeyPair> iterator() {
 | 
			
		||||
                return new Iterator<KeyPair>() {
 | 
			
		||||
                    private final Iterator<String> iterator = Arrays.asList(files).iterator();
 | 
			
		||||
                    private KeyPair nextKeyPair;
 | 
			
		||||
                    private boolean nextKeyPairSet = false;
 | 
			
		||||
                    @Override
 | 
			
		||||
                    public boolean hasNext() {
 | 
			
		||||
                        return nextKeyPairSet || setNextObject();
 | 
			
		||||
                    }
 | 
			
		||||
                    @Override
 | 
			
		||||
                    public KeyPair next() {
 | 
			
		||||
                        if (!nextKeyPairSet) {
 | 
			
		||||
                            if (!setNextObject()) {
 | 
			
		||||
                                throw new NoSuchElementException();
 | 
			
		||||
                            }
 | 
			
		||||
                        }
 | 
			
		||||
                        nextKeyPairSet = false;
 | 
			
		||||
                        return nextKeyPair;
 | 
			
		||||
                    }
 | 
			
		||||
                    @Override
 | 
			
		||||
                    public void remove() {
 | 
			
		||||
                        throw new UnsupportedOperationException();
 | 
			
		||||
                    }
 | 
			
		||||
                    private boolean setNextObject() {
 | 
			
		||||
                        while (iterator.hasNext()) {
 | 
			
		||||
                            String file = iterator.next();
 | 
			
		||||
                            nextKeyPair = doLoadKey(file);
 | 
			
		||||
                            if (nextKeyPair != null) {
 | 
			
		||||
                                nextKeyPairSet = true;
 | 
			
		||||
                                return true;
 | 
			
		||||
                            }
 | 
			
		||||
                        }
 | 
			
		||||
                        return false;
 | 
			
		||||
                    }
 | 
			
		||||
 | 
			
		||||
                };
 | 
			
		||||
            }
 | 
			
		||||
        };
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    protected KeyPair doLoadKey(String file) {
 | 
			
		||||
        try (PEMParser r = new PEMParser(new InputStreamReader(
 | 
			
		||||
            new FileInputStream(file)))) {
 | 
			
		||||
            Object o = r.readObject();
 | 
			
		||||
            JcaPEMKeyConverter pemConverter = new JcaPEMKeyConverter();
 | 
			
		||||
            pemConverter.setProvider("BC");
 | 
			
		||||
            if (passwordFinder != null && o instanceof PEMEncryptedKeyPair) {
 | 
			
		||||
                JcePEMDecryptorProviderBuilder decryptorBuilder = new JcePEMDecryptorProviderBuilder();
 | 
			
		||||
                PEMDecryptorProvider pemDecryptor = decryptorBuilder.build(passwordFinder.getPassword());
 | 
			
		||||
                o = pemConverter.getKeyPair(((PEMEncryptedKeyPair) o).decryptKeyPair(pemDecryptor));
 | 
			
		||||
            }
 | 
			
		||||
 | 
			
		||||
            if (o instanceof PEMKeyPair) {
 | 
			
		||||
                o = pemConverter.getKeyPair((PEMKeyPair)o);
 | 
			
		||||
                return (KeyPair) o;
 | 
			
		||||
            } else if (o instanceof KeyPair) {
 | 
			
		||||
                return (KeyPair) o;
 | 
			
		||||
            }
 | 
			
		||||
        } catch (Exception e) {
 | 
			
		||||
            log.warn("Unable to read key " + file, e);
 | 
			
		||||
        }
 | 
			
		||||
        return null;
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
}
 | 
			
		||||
@@ -19,10 +19,12 @@ import com.google.inject.Inject;
 | 
			
		||||
import com.google.inject.Provider;
 | 
			
		||||
import com.google.inject.ProvisionException;
 | 
			
		||||
 | 
			
		||||
import org.apache.sshd.common.keyprovider.AbstractFileKeyPairProvider;
 | 
			
		||||
import org.apache.sshd.common.keyprovider.KeyPairProvider;
 | 
			
		||||
import org.apache.sshd.common.util.SecurityUtils;
 | 
			
		||||
import org.apache.sshd.server.keyprovider.SimpleGeneratorHostKeyProvider;
 | 
			
		||||
 | 
			
		||||
import java.io.File;
 | 
			
		||||
import java.nio.file.Files;
 | 
			
		||||
import java.nio.file.Path;
 | 
			
		||||
import java.util.ArrayList;
 | 
			
		||||
@@ -42,12 +44,12 @@ class HostKeyProvider implements Provider<KeyPairProvider> {
 | 
			
		||||
    Path rsaKey = site.ssh_rsa;
 | 
			
		||||
    Path dsaKey = site.ssh_dsa;
 | 
			
		||||
 | 
			
		||||
    final List<String> stdKeys = new ArrayList<>(2);
 | 
			
		||||
    final List<File> stdKeys = new ArrayList<>(2);
 | 
			
		||||
    if (Files.exists(rsaKey)) {
 | 
			
		||||
      stdKeys.add(rsaKey.toAbsolutePath().toString());
 | 
			
		||||
      stdKeys.add(rsaKey.toAbsolutePath().toFile());
 | 
			
		||||
    }
 | 
			
		||||
    if (Files.exists(dsaKey)) {
 | 
			
		||||
      stdKeys.add(dsaKey.toAbsolutePath().toString());
 | 
			
		||||
      stdKeys.add(dsaKey.toAbsolutePath().toFile());
 | 
			
		||||
    }
 | 
			
		||||
 | 
			
		||||
    if (Files.exists(objKey)) {
 | 
			
		||||
@@ -60,7 +62,7 @@ class HostKeyProvider implements Provider<KeyPairProvider> {
 | 
			
		||||
        // Both formats of host key exist, we don't know which format
 | 
			
		||||
        // should be authoritative. Complain and abort.
 | 
			
		||||
        //
 | 
			
		||||
        stdKeys.add(objKey.toAbsolutePath().toString());
 | 
			
		||||
        stdKeys.add(objKey.toAbsolutePath().toFile());
 | 
			
		||||
        throw new ProvisionException("Multiple host keys exist: " + stdKeys);
 | 
			
		||||
      }
 | 
			
		||||
 | 
			
		||||
@@ -72,8 +74,9 @@ class HostKeyProvider implements Provider<KeyPairProvider> {
 | 
			
		||||
        throw new ProvisionException("Bouncy Castle Crypto not installed;"
 | 
			
		||||
            + " needed to read server host keys: " + stdKeys + "");
 | 
			
		||||
      }
 | 
			
		||||
      return new FileKeyPairProvider(stdKeys
 | 
			
		||||
          .toArray(new String[stdKeys.size()]));
 | 
			
		||||
      AbstractFileKeyPairProvider kp = SecurityUtils.createFileKeyPairProvider();
 | 
			
		||||
      kp.setFiles(stdKeys);
 | 
			
		||||
      return kp;
 | 
			
		||||
    }
 | 
			
		||||
  }
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -23,7 +23,7 @@ log4j.appender.stderr.layout.ConversionPattern=[%d] [%t] %-5p %c %x: %m%n
 | 
			
		||||
log4j.logger.org.apache.mina=WARN
 | 
			
		||||
log4j.logger.org.apache.sshd.common=WARN
 | 
			
		||||
log4j.logger.org.apache.sshd.server=WARN
 | 
			
		||||
log4j.logger.org.apache.sshd.common.keyprovider.FileKeyPairProvider=INFO
 | 
			
		||||
log4j.logger.org.apache.sshd.common.keyprovider.AbstractFileKeyPairProvider=INFO
 | 
			
		||||
log4j.logger.com.google.gerrit.sshd.GerritServerSession=WARN
 | 
			
		||||
 | 
			
		||||
# Silence non-critical messages from mime-util.
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user