Add the possibility to save mtn public keys per user
* src/IDF/Key.php: new column "type" which is either "ssh" or "mtn"; utility functions to query the mtn key name and id as well as all available key types for the current IDF installation * src/IDF/Migrations/16KeyType.php: needed migration script * src/IDF/Plugin/SyncGit/Cron.php: ensure only SSH keys are handled * adapt forms and templates accordingly
This commit is contained in:
parent
ce436cc6ec
commit
e47d51d14c
@ -77,21 +77,27 @@ class IDF_Form_Admin_UserCreate extends Pluf_Form
|
|||||||
'initial' => '',
|
'initial' => '',
|
||||||
'widget' => 'Pluf_Form_Widget_SelectInput',
|
'widget' => 'Pluf_Form_Widget_SelectInput',
|
||||||
'widget_attrs' => array(
|
'widget_attrs' => array(
|
||||||
'choices' =>
|
'choices' =>
|
||||||
Pluf_L10n::getInstalledLanguages()
|
Pluf_L10n::getInstalledLanguages()
|
||||||
),
|
),
|
||||||
));
|
));
|
||||||
|
|
||||||
$this->fields['ssh_key'] = new Pluf_Form_Field_Varchar(
|
$this->fields['public_key'] = new Pluf_Form_Field_Varchar(
|
||||||
array('required' => false,
|
array('required' => false,
|
||||||
'label' => __('Add a public SSH key'),
|
'label' => __('Add a public key'),
|
||||||
'initial' => '',
|
'initial' => '',
|
||||||
'widget_attrs' => array('rows' => 3,
|
'widget_attrs' => array('rows' => 3,
|
||||||
'cols' => 40),
|
'cols' => 40),
|
||||||
'widget' => 'Pluf_Form_Widget_TextareaInput',
|
'widget' => 'Pluf_Form_Widget_TextareaInput',
|
||||||
'help_text' => __('Be careful to provide the public key and not the private key!')
|
'help_text' => __('Be careful to provide the public key and not the private key!')
|
||||||
));
|
));
|
||||||
|
$this->fields['public_key_type'] = new Pluf_Form_Field_Varchar(
|
||||||
|
array('required' => true,
|
||||||
|
'label' => __('Key type'),
|
||||||
|
'initial' => 'ssh',
|
||||||
|
'widget_attrs' => array('choices' => IDF_Key::getAvailableKeyTypes()),
|
||||||
|
'widget' => 'Pluf_Form_Widget_SelectInput',
|
||||||
|
));
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -138,10 +144,11 @@ class IDF_Form_Admin_UserCreate extends Pluf_Form
|
|||||||
Pluf_Signal::send('Pluf_User::passwordUpdated',
|
Pluf_Signal::send('Pluf_User::passwordUpdated',
|
||||||
'IDF_Form_Admin_UserCreate', $params);
|
'IDF_Form_Admin_UserCreate', $params);
|
||||||
// Create the ssh key as needed
|
// Create the ssh key as needed
|
||||||
if ('' !== $this->cleaned_data['ssh_key']) {
|
if ('' !== $this->cleaned_data['public_key']) {
|
||||||
$key = new IDF_Key();
|
$key = new IDF_Key();
|
||||||
$key->user = $user;
|
$key->user = $user;
|
||||||
$key->content = $this->cleaned_data['ssh_key'];
|
$key->content = $this->cleaned_data['public_key'];
|
||||||
|
$key->type = $this->cleaned_data['public_key_type'];
|
||||||
$key->create();
|
$key->create();
|
||||||
}
|
}
|
||||||
// Send an email to the user with the password
|
// Send an email to the user with the password
|
||||||
@ -162,16 +169,11 @@ class IDF_Form_Admin_UserCreate extends Pluf_Form
|
|||||||
return $user;
|
return $user;
|
||||||
}
|
}
|
||||||
|
|
||||||
function clean_ssh_key()
|
|
||||||
{
|
|
||||||
return IDF_Form_UserAccount::checkSshKey($this->cleaned_data['ssh_key']);
|
|
||||||
}
|
|
||||||
|
|
||||||
function clean_last_name()
|
function clean_last_name()
|
||||||
{
|
{
|
||||||
$last_name = trim($this->cleaned_data['last_name']);
|
$last_name = trim($this->cleaned_data['last_name']);
|
||||||
if ($last_name == mb_strtoupper($last_name)) {
|
if ($last_name == mb_strtoupper($last_name)) {
|
||||||
return mb_convert_case(mb_strtolower($last_name),
|
return mb_convert_case(mb_strtolower($last_name),
|
||||||
MB_CASE_TITLE, 'UTF-8');
|
MB_CASE_TITLE, 'UTF-8');
|
||||||
}
|
}
|
||||||
return $last_name;
|
return $last_name;
|
||||||
@ -181,7 +183,7 @@ class IDF_Form_Admin_UserCreate extends Pluf_Form
|
|||||||
{
|
{
|
||||||
$first_name = trim($this->cleaned_data['first_name']);
|
$first_name = trim($this->cleaned_data['first_name']);
|
||||||
if ($first_name == mb_strtoupper($first_name)) {
|
if ($first_name == mb_strtoupper($first_name)) {
|
||||||
return mb_convert_case(mb_strtolower($first_name),
|
return mb_convert_case(mb_strtolower($first_name),
|
||||||
MB_CASE_TITLE, 'UTF-8');
|
MB_CASE_TITLE, 'UTF-8');
|
||||||
}
|
}
|
||||||
return $first_name;
|
return $first_name;
|
||||||
@ -211,4 +213,16 @@ class IDF_Form_Admin_UserCreate extends Pluf_Form
|
|||||||
}
|
}
|
||||||
return $this->cleaned_data['login'];
|
return $this->cleaned_data['login'];
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Checks whether any given public key is valid
|
||||||
|
*/
|
||||||
|
public function clean()
|
||||||
|
{
|
||||||
|
$this->cleaned_data['public_key'] =
|
||||||
|
IDF_Form_UserAccount::checkPublicKey($this->cleaned_data['public_key'],
|
||||||
|
$this->cleaned_data['public_key_type']);
|
||||||
|
|
||||||
|
return $this->cleaned_data;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
@ -65,7 +65,7 @@ class IDF_Form_UserAccount extends Pluf_Form
|
|||||||
'initial' => $this->user->language,
|
'initial' => $this->user->language,
|
||||||
'widget' => 'Pluf_Form_Widget_SelectInput',
|
'widget' => 'Pluf_Form_Widget_SelectInput',
|
||||||
'widget_attrs' => array(
|
'widget_attrs' => array(
|
||||||
'choices' =>
|
'choices' =>
|
||||||
Pluf_L10n::getInstalledLanguages()
|
Pluf_L10n::getInstalledLanguages()
|
||||||
),
|
),
|
||||||
));
|
));
|
||||||
@ -92,16 +92,22 @@ class IDF_Form_UserAccount extends Pluf_Form
|
|||||||
),
|
),
|
||||||
));
|
));
|
||||||
|
|
||||||
$this->fields['ssh_key'] = new Pluf_Form_Field_Varchar(
|
$this->fields['public_key'] = new Pluf_Form_Field_Varchar(
|
||||||
array('required' => false,
|
array('required' => false,
|
||||||
'label' => __('Add a public SSH key'),
|
'label' => __('Add a public key'),
|
||||||
'initial' => '',
|
'initial' => '',
|
||||||
'widget_attrs' => array('rows' => 3,
|
'widget_attrs' => array('rows' => 3,
|
||||||
'cols' => 40),
|
'cols' => 40),
|
||||||
'widget' => 'Pluf_Form_Widget_TextareaInput',
|
'widget' => 'Pluf_Form_Widget_TextareaInput',
|
||||||
'help_text' => __('Be careful to provide your public key and not your private key!')
|
'help_text' => __('Be careful to provide your public key and not your private key!')
|
||||||
));
|
));
|
||||||
|
$this->fields['public_key_type'] = new Pluf_Form_Field_Varchar(
|
||||||
|
array('required' => true,
|
||||||
|
'label' => __('Key type'),
|
||||||
|
'initial' => 'ssh',
|
||||||
|
'widget_attrs' => array('choices' => IDF_Key::getAvailableKeyTypes()),
|
||||||
|
'widget' => 'Pluf_Form_Widget_SelectInput',
|
||||||
|
));
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -151,10 +157,11 @@ class IDF_Form_UserAccount extends Pluf_Form
|
|||||||
}
|
}
|
||||||
$this->user->setFromFormData($this->cleaned_data);
|
$this->user->setFromFormData($this->cleaned_data);
|
||||||
// Add key as needed.
|
// Add key as needed.
|
||||||
if ('' !== $this->cleaned_data['ssh_key']) {
|
if ('' !== $this->cleaned_data['public_key']) {
|
||||||
$key = new IDF_Key();
|
$key = new IDF_Key();
|
||||||
$key->user = $this->user;
|
$key->user = $this->user;
|
||||||
$key->content = $this->cleaned_data['ssh_key'];
|
$key->content = $this->cleaned_data['public_key'];
|
||||||
|
$key->type = $this->cleaned_data['public_key_type'];
|
||||||
if ($commit) {
|
if ($commit) {
|
||||||
$key->create();
|
$key->create();
|
||||||
}
|
}
|
||||||
@ -190,61 +197,111 @@ class IDF_Form_UserAccount extends Pluf_Form
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Check an ssh key.
|
* Check arbitrary public keys.
|
||||||
*
|
*
|
||||||
* It will throw a Pluf_Form_Invalid exception if it cannot
|
* It will throw a Pluf_Form_Invalid exception if it cannot
|
||||||
* validate the key.
|
* validate the key.
|
||||||
*
|
*
|
||||||
* @param $key string The key
|
* @param $key string The key
|
||||||
|
* @param $key string The type ('ssh' or 'mtn')
|
||||||
* @param $user int The user id of the user of the key (0)
|
* @param $user int The user id of the user of the key (0)
|
||||||
* @return string The clean key
|
* @return string The clean key
|
||||||
*/
|
*/
|
||||||
public static function checkSshKey($key, $user=0)
|
public static function checkPublicKey($key, $type, $user=0)
|
||||||
{
|
{
|
||||||
$key = trim($key);
|
$key = trim($key);
|
||||||
if (strlen($key) == 0) {
|
if (strlen($key) == 0)
|
||||||
|
{
|
||||||
return '';
|
return '';
|
||||||
}
|
}
|
||||||
$key = str_replace(array("\n", "\r"), '', $key);
|
|
||||||
if (!preg_match('#^ssh\-[a-z]{3}\s(\S+)\s\S+$#', $key, $matches)) {
|
if ($type == 'ssh')
|
||||||
throw new Pluf_Form_Invalid(__('The format of the key is not valid. It must start with ssh-dss or ssh-rsa, a long string on a single line and at the end a comment.'));
|
{
|
||||||
}
|
$key = str_replace(array("\n", "\r"), '', $key);
|
||||||
if (Pluf::f('idf_strong_key_check', false)) {
|
if (!preg_match('#^ssh\-[a-z]{3}\s\S+\s\S+$#', $key))
|
||||||
$tmpfile = Pluf::f('tmp_folder', '/tmp').'/'.$user.'-key';
|
{
|
||||||
file_put_contents($tmpfile, $key, LOCK_EX);
|
throw new Pluf_Form_Invalid(
|
||||||
$cmd = Pluf::f('idf_exec_cmd_prefix', '').
|
__('The format of the key is not valid. It must start '.
|
||||||
'ssh-keygen -l -f '.escapeshellarg($tmpfile).' > /dev/null 2>&1';
|
'with ssh-dss or ssh-rsa, a long string on a single '.
|
||||||
exec($cmd, $out, $return);
|
'line and at the end a comment.')
|
||||||
unlink($tmpfile);
|
);
|
||||||
if ($return != 0) {
|
}
|
||||||
throw new Pluf_Form_Invalid(__('Please check the key as it does not appears to be a valid key.'));
|
if (Pluf::f('idf_strong_key_check', false))
|
||||||
|
{
|
||||||
|
$tmpfile = Pluf::f('tmp_folder', '/tmp').'/'.$user.'-key';
|
||||||
|
file_put_contents($tmpfile, $key, LOCK_EX);
|
||||||
|
$cmd = Pluf::f('idf_exec_cmd_prefix', '').
|
||||||
|
'ssh-keygen -l -f '.escapeshellarg($tmpfile).' > /dev/null 2>&1';
|
||||||
|
exec($cmd, $out, $return);
|
||||||
|
unlink($tmpfile);
|
||||||
|
if ($return != 0)
|
||||||
|
{
|
||||||
|
throw new Pluf_Form_Invalid(
|
||||||
|
__('Please check the key as it does not appears '.
|
||||||
|
'to be a valid key.')
|
||||||
|
);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
else if ($type == 'mtn')
|
||||||
|
{
|
||||||
|
if (!preg_match('#^\[pubkey [^\]]+\]\s*\S+\s*\[end\]$#', $key))
|
||||||
|
{
|
||||||
|
throw new Pluf_Form_Invalid(
|
||||||
|
__('The format of the key is not valid. It must start '.
|
||||||
|
'with [pubkey KEYNAME], contain a long string on a single '.
|
||||||
|
'line and end with [end] in the final third line.')
|
||||||
|
);
|
||||||
|
}
|
||||||
|
if (Pluf::f('idf_strong_key_check', false))
|
||||||
|
{
|
||||||
|
// if monotone can read it, it should be valid
|
||||||
|
$mtn_opts = implode(' ', Pluf::f('mtn_opts', array()));
|
||||||
|
$cmd = Pluf::f('idf_exec_cmd_prefix', '').
|
||||||
|
sprintf('%s %s -d :memory: read >/tmp/php-out 2>&1',
|
||||||
|
Pluf::f('mtn_path', 'mtn'), $mtn_opts);
|
||||||
|
$fp = popen($cmd, 'w');
|
||||||
|
fwrite($fp, $key);
|
||||||
|
$return = pclose($fp);
|
||||||
|
|
||||||
|
if ($return != 0)
|
||||||
|
{
|
||||||
|
throw new Pluf_Form_Invalid(
|
||||||
|
__('Please check the key as it does not appears '.
|
||||||
|
'to be a valid key.')
|
||||||
|
);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
else
|
||||||
|
{
|
||||||
|
throw new Pluf_Form_Invalid(__('Unknown key type'));
|
||||||
|
}
|
||||||
|
|
||||||
// If $user, then check if not the same key stored
|
// If $user, then check if not the same key stored
|
||||||
if ($user) {
|
if ($user)
|
||||||
|
{
|
||||||
$ruser = Pluf::factory('Pluf_User', $user);
|
$ruser = Pluf::factory('Pluf_User', $user);
|
||||||
if ($ruser->id > 0) {
|
if ($ruser->id > 0)
|
||||||
$sql = new Pluf_SQL('content=%s', array($key));
|
{
|
||||||
|
$sql = new Pluf_SQL('content=%s AND type=%s', array($key, $type));
|
||||||
$keys = Pluf::factory('IDF_Key')->getList(array('filter' => $sql->gen()));
|
$keys = Pluf::factory('IDF_Key')->getList(array('filter' => $sql->gen()));
|
||||||
if (count($keys) > 0) {
|
if (count($keys) > 0)
|
||||||
throw new Pluf_Form_Invalid(__('You already have uploaded this SSH key.'));
|
{
|
||||||
|
throw new Pluf_Form_Invalid(
|
||||||
|
__('You already have uploaded this key.')
|
||||||
|
);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return $key;
|
return $key;
|
||||||
}
|
}
|
||||||
|
|
||||||
function clean_ssh_key()
|
|
||||||
{
|
|
||||||
return self::checkSshKey($this->cleaned_data['ssh_key'],
|
|
||||||
$this->user->id);
|
|
||||||
}
|
|
||||||
|
|
||||||
function clean_last_name()
|
function clean_last_name()
|
||||||
{
|
{
|
||||||
$last_name = trim($this->cleaned_data['last_name']);
|
$last_name = trim($this->cleaned_data['last_name']);
|
||||||
if ($last_name == mb_strtoupper($last_name)) {
|
if ($last_name == mb_strtoupper($last_name)) {
|
||||||
return mb_convert_case(mb_strtolower($last_name),
|
return mb_convert_case(mb_strtolower($last_name),
|
||||||
MB_CASE_TITLE, 'UTF-8');
|
MB_CASE_TITLE, 'UTF-8');
|
||||||
}
|
}
|
||||||
return $last_name;
|
return $last_name;
|
||||||
@ -254,7 +311,7 @@ class IDF_Form_UserAccount extends Pluf_Form
|
|||||||
{
|
{
|
||||||
$first_name = trim($this->cleaned_data['first_name']);
|
$first_name = trim($this->cleaned_data['first_name']);
|
||||||
if ($first_name == mb_strtoupper($first_name)) {
|
if ($first_name == mb_strtoupper($first_name)) {
|
||||||
return mb_convert_case(mb_strtolower($first_name),
|
return mb_convert_case(mb_strtolower($first_name),
|
||||||
MB_CASE_TITLE, 'UTF-8');
|
MB_CASE_TITLE, 'UTF-8');
|
||||||
}
|
}
|
||||||
return $first_name;
|
return $first_name;
|
||||||
@ -264,7 +321,7 @@ class IDF_Form_UserAccount extends Pluf_Form
|
|||||||
{
|
{
|
||||||
$this->cleaned_data['email'] = mb_strtolower(trim($this->cleaned_data['email']));
|
$this->cleaned_data['email'] = mb_strtolower(trim($this->cleaned_data['email']));
|
||||||
$guser = new Pluf_User();
|
$guser = new Pluf_User();
|
||||||
$sql = new Pluf_SQL('email=%s AND id!=%s',
|
$sql = new Pluf_SQL('email=%s AND id!=%s',
|
||||||
array($this->cleaned_data['email'], $this->user->id));
|
array($this->cleaned_data['email'], $this->user->id));
|
||||||
if ($guser->getCount(array('filter' => $sql->gen())) > 0) {
|
if ($guser->getCount(array('filter' => $sql->gen())) > 0) {
|
||||||
throw new Pluf_Form_Invalid(sprintf(__('The email "%s" is already used.'), $this->cleaned_data['email']));
|
throw new Pluf_Form_Invalid(sprintf(__('The email "%s" is already used.'), $this->cleaned_data['email']));
|
||||||
@ -273,11 +330,12 @@ class IDF_Form_UserAccount extends Pluf_Form
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Check to see if the 2 passwords are the same.
|
* Check to see if the 2 passwords are the same and if any
|
||||||
|
* given public key is valid
|
||||||
*/
|
*/
|
||||||
public function clean()
|
public function clean()
|
||||||
{
|
{
|
||||||
if (!isset($this->errors['password'])
|
if (!isset($this->errors['password'])
|
||||||
&& !isset($this->errors['password2'])) {
|
&& !isset($this->errors['password2'])) {
|
||||||
$password1 = $this->cleaned_data['password'];
|
$password1 = $this->cleaned_data['password'];
|
||||||
$password2 = $this->cleaned_data['password2'];
|
$password2 = $this->cleaned_data['password2'];
|
||||||
@ -285,6 +343,12 @@ class IDF_Form_UserAccount extends Pluf_Form
|
|||||||
throw new Pluf_Form_Invalid(__('The passwords do not match. Please give them again.'));
|
throw new Pluf_Form_Invalid(__('The passwords do not match. Please give them again.'));
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
$this->cleaned_data['public_key'] =
|
||||||
|
self::checkPublicKey($this->cleaned_data['public_key'],
|
||||||
|
$this->cleaned_data['public_key_type'],
|
||||||
|
$this->user->id);
|
||||||
|
|
||||||
return $this->cleaned_data;
|
return $this->cleaned_data;
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -22,7 +22,7 @@
|
|||||||
# ***** END LICENSE BLOCK ***** */
|
# ***** END LICENSE BLOCK ***** */
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Storage of the SSH keys.
|
* Storage of the public keys (ssh or monotone).
|
||||||
*
|
*
|
||||||
*/
|
*/
|
||||||
class IDF_Key extends Pluf_Model
|
class IDF_Key extends Pluf_Model
|
||||||
@ -39,9 +39,9 @@ class IDF_Key extends Pluf_Model
|
|||||||
array(
|
array(
|
||||||
'type' => 'Pluf_DB_Field_Sequence',
|
'type' => 'Pluf_DB_Field_Sequence',
|
||||||
//It is automatically added.
|
//It is automatically added.
|
||||||
'blank' => true,
|
'blank' => true,
|
||||||
),
|
),
|
||||||
'user' =>
|
'user' =>
|
||||||
array(
|
array(
|
||||||
'type' => 'Pluf_DB_Field_Foreignkey',
|
'type' => 'Pluf_DB_Field_Foreignkey',
|
||||||
'model' => 'Pluf_User',
|
'model' => 'Pluf_User',
|
||||||
@ -52,14 +52,21 @@ class IDF_Key extends Pluf_Model
|
|||||||
array(
|
array(
|
||||||
'type' => 'Pluf_DB_Field_Text',
|
'type' => 'Pluf_DB_Field_Text',
|
||||||
'blank' => false,
|
'blank' => false,
|
||||||
'verbose' => __('ssh key'),
|
'verbose' => __('public key'),
|
||||||
|
),
|
||||||
|
'type' =>
|
||||||
|
array(
|
||||||
|
'type' => 'Pluf_DB_Field_Varchar',
|
||||||
|
'size' => 3,
|
||||||
|
'blank' => false,
|
||||||
|
'verbose' => __('key type'),
|
||||||
),
|
),
|
||||||
);
|
);
|
||||||
// WARNING: Not using getSqlTable on the Pluf_User object to
|
// WARNING: Not using getSqlTable on the Pluf_User object to
|
||||||
// avoid recursion.
|
// avoid recursion.
|
||||||
$t_users = $this->_con->pfx.'users';
|
$t_users = $this->_con->pfx.'users';
|
||||||
$this->_a['views'] = array(
|
$this->_a['views'] = array(
|
||||||
'join_user' =>
|
'join_user' =>
|
||||||
array(
|
array(
|
||||||
'join' => 'LEFT JOIN '.$t_users
|
'join' => 'LEFT JOIN '.$t_users
|
||||||
.' ON '.$t_users.'.id='.$this->_con->qn('user'),
|
.' ON '.$t_users.'.id='.$this->_con->qn('user'),
|
||||||
@ -75,6 +82,46 @@ class IDF_Key extends Pluf_Model
|
|||||||
return Pluf_Template::markSafe(Pluf_esc(substr($this->content, 0, 25)).' [...] '.Pluf_esc(substr($this->content, -55)));
|
return Pluf_Template::markSafe(Pluf_esc(substr($this->content, 0, 25)).' [...] '.Pluf_esc(substr($this->content, -55)));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private function parseMonotoneKeyData()
|
||||||
|
{
|
||||||
|
if ($this->type != "mtn")
|
||||||
|
throw new IDF_Exception("key is not a monotone key type");
|
||||||
|
|
||||||
|
preg_match("#^\[pubkey ([^\]]+)\]\s*(\S+)\s*\[end\]$#", $this->content, $m);
|
||||||
|
if (count($m) != 3)
|
||||||
|
throw new IDF_Exception("invalid key data detected");
|
||||||
|
|
||||||
|
return array($m[1], $m[2]);
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the key name of the key, i.e. most of the time the email
|
||||||
|
* address, which not neccessarily has to be unique across a project.
|
||||||
|
*
|
||||||
|
* @return string
|
||||||
|
*/
|
||||||
|
function getMonotoneKeyName()
|
||||||
|
{
|
||||||
|
list($keyName, ) = $this->parseMonotoneKeyData();
|
||||||
|
return $keyName;
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* This function should be used to calculate the key id from the
|
||||||
|
* public key hash for authentication purposes. This avoids clashes
|
||||||
|
* in case the key name is not unique across the project
|
||||||
|
*
|
||||||
|
* And yes, this is actually how monotone itself calculates the key
|
||||||
|
* id...
|
||||||
|
*
|
||||||
|
* @return string
|
||||||
|
*/
|
||||||
|
function getMonotoneKeyId()
|
||||||
|
{
|
||||||
|
list($keyName, $keyData) = $this->parseMonotoneKeyData();
|
||||||
|
return sha1($keyName.":".$keyData);
|
||||||
|
}
|
||||||
|
|
||||||
function postSave($create=false)
|
function postSave($create=false)
|
||||||
{
|
{
|
||||||
/**
|
/**
|
||||||
@ -89,7 +136,7 @@ class IDF_Key extends Pluf_Model
|
|||||||
* [description]
|
* [description]
|
||||||
*
|
*
|
||||||
* This signal allows an application to perform special
|
* This signal allows an application to perform special
|
||||||
* operations after the saving of a SSH Key.
|
* operations after the saving of a public Key.
|
||||||
*
|
*
|
||||||
* [parameters]
|
* [parameters]
|
||||||
*
|
*
|
||||||
@ -128,4 +175,19 @@ class IDF_Key extends Pluf_Model
|
|||||||
'IDF_Key', $params);
|
'IDF_Key', $params);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns an associative array with available key types for this
|
||||||
|
* idf installation, ready for consumption for a <select> widget
|
||||||
|
*
|
||||||
|
* @return array
|
||||||
|
*/
|
||||||
|
public static function getAvailableKeyTypes()
|
||||||
|
{
|
||||||
|
$key_types = array(__("SSH") => 'ssh');
|
||||||
|
if (array_key_exists('mtn', Pluf::f('allowed_scm', array())))
|
||||||
|
{
|
||||||
|
$key_types[__("monotone")] = 'mtn';
|
||||||
|
}
|
||||||
|
return $key_types;
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
55
src/IDF/Migrations/16KeyType.php
Normal file
55
src/IDF/Migrations/16KeyType.php
Normal file
@ -0,0 +1,55 @@
|
|||||||
|
<?php
|
||||||
|
/* -*- tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*- */
|
||||||
|
/*
|
||||||
|
# ***** BEGIN LICENSE BLOCK *****
|
||||||
|
# This file is part of InDefero, an open source project management application.
|
||||||
|
# Copyright (C) 2008 Céondo Ltd and contributors.
|
||||||
|
#
|
||||||
|
# InDefero is free software; you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation; either version 2 of the License, or
|
||||||
|
# (at your option) any later version.
|
||||||
|
#
|
||||||
|
# InDefero is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with this program; if not, write to the Free Software
|
||||||
|
# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
|
||||||
|
#
|
||||||
|
# ***** END LICENSE BLOCK ***** */
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Add the type column in the keys table.
|
||||||
|
*/
|
||||||
|
|
||||||
|
function IDF_Migrations_16KeyType_up($params=null)
|
||||||
|
{
|
||||||
|
$table = Pluf::factory('IDF_Keys')->getSqlTable();
|
||||||
|
$sql = array();
|
||||||
|
$sql['PostgreSQL'] = 'ALTER TABLE '.$table.' ADD COLUMN "type" VARCHAR(3) DEFAULT \'ssh\'';
|
||||||
|
$sql['MySQL'] = 'ALTER TABLE '.$table.' ADD COLUMN `type` VARCHAR(3) DEFAULT \'ssh\'';
|
||||||
|
$db = Pluf::db();
|
||||||
|
$engine = Pluf::f('db_engine');
|
||||||
|
if (!isset($sql[$engine])) {
|
||||||
|
throw new Exception('SQLite complex migration not supported.');
|
||||||
|
}
|
||||||
|
$db->execute($sql[$engine]);
|
||||||
|
}
|
||||||
|
|
||||||
|
function IDF_Migrations_16KeyType_down($params=null)
|
||||||
|
{
|
||||||
|
$table = Pluf::factory('IDF_Keys')->getSqlTable();
|
||||||
|
$sql = array();
|
||||||
|
$sql['PostgreSQL'] = 'ALTER TABLE '.$table.' DROP COLUMN "type"';
|
||||||
|
$sql['MySQL'] = 'ALTER TABLE '.$table.' DROP COLUMN `type`';
|
||||||
|
$db = Pluf::db();
|
||||||
|
$engine = Pluf::f('db_engine');
|
||||||
|
if (!isset($sql[$engine])) {
|
||||||
|
throw new Exception('SQLite complex migration not supported.');
|
||||||
|
}
|
||||||
|
$db->execute($sql[$engine]);
|
||||||
|
|
||||||
|
}
|
@ -48,13 +48,13 @@ class IDF_Plugin_SyncGit_Cron
|
|||||||
$out = '';
|
$out = '';
|
||||||
$keys = Pluf::factory('IDF_Key')->getList(array('view'=>'join_user'));
|
$keys = Pluf::factory('IDF_Key')->getList(array('view'=>'join_user'));
|
||||||
foreach ($keys as $key) {
|
foreach ($keys as $key) {
|
||||||
if (strlen($key->content) > 40 // minimal check
|
if ($key->type == 'ssh' && strlen($key->content) > 40 // minimal check
|
||||||
and preg_match('/^[a-zA-Z][a-zA-Z0-9_.-]*(@[a-zA-Z][a-zA-Z0-9.-]*)?$/', $key->login)) {
|
and preg_match('/^[a-zA-Z][a-zA-Z0-9_.-]*(@[a-zA-Z][a-zA-Z0-9.-]*)?$/', $key->login)) {
|
||||||
$content = trim(str_replace(array("\n", "\r"), '', $key->content));
|
$content = trim(str_replace(array("\n", "\r"), '', $key->content));
|
||||||
$out .= sprintf($template, $cmd, $key->login, $content)."\n";
|
$out .= sprintf($template, $cmd, $key->login, $content)."\n";
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
file_put_contents($authorized_keys, $out, LOCK_EX);
|
file_put_contents($authorized_keys, $out, LOCK_EX);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@ -134,7 +134,7 @@ class IDF_Views_User
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Delete a SSH key.
|
* Delete a public key.
|
||||||
*
|
*
|
||||||
* This is redirecting to the preferences
|
* This is redirecting to the preferences
|
||||||
*/
|
*/
|
||||||
@ -148,7 +148,7 @@ class IDF_Views_User
|
|||||||
return new Pluf_HTTP_Response_Forbidden($request);
|
return new Pluf_HTTP_Response_Forbidden($request);
|
||||||
}
|
}
|
||||||
$key->delete();
|
$key->delete();
|
||||||
$request->user->setMessage(__('The SSH key has been deleted.'));
|
$request->user->setMessage(__('The public key has been deleted.'));
|
||||||
}
|
}
|
||||||
return new Pluf_HTTP_Response_Redirect($url);
|
return new Pluf_HTTP_Response_Redirect($url);
|
||||||
}
|
}
|
||||||
|
@ -43,10 +43,14 @@
|
|||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<th>{$form.f.ssh_key.labelTag}:</th>
|
<th>{$form.f.public_key.labelTag}:</th>
|
||||||
<td>{if $form.f.ssh_key.errors}{$form.f.ssh_key.fieldErrors}{/if}
|
<td>{if $form.f.public_key.errors}{$form.f.public_key.fieldErrors}{/if}
|
||||||
{$form.f.ssh_key|unsafe}<br />
|
{$form.f.public_key|unsafe}<br />
|
||||||
<span class="helptext">{$form.f.ssh_key.help_text}</span>
|
{$form.f.public_key_type.labelTag} {$form.f.public_key_type|unsafe}<br />
|
||||||
|
<span class="helptext">
|
||||||
|
{$form.f.public_key.help_text}
|
||||||
|
{$form.f.public_key_type.help_text}
|
||||||
|
</span>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
|
@ -54,10 +54,14 @@
|
|||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<th>{$form.f.ssh_key.labelTag}:</th>
|
<th>{$form.f.public_key.labelTag}:</th>
|
||||||
<td>{if $form.f.ssh_key.errors}{$form.f.ssh_key.fieldErrors}{/if}
|
<td>{if $form.f.public_key.errors}{$form.f.public_key.fieldErrors}{/if}
|
||||||
{$form.f.ssh_key|unsafe}<br />
|
{$form.f.public_key|unsafe}<br />
|
||||||
<span class="helptext">{$form.f.ssh_key.help_text}</span>
|
{$form.f.public_key_type.labelTag} {$form.f.public_key_type|unsafe}<br />
|
||||||
|
<span class="helptext">
|
||||||
|
{$form.f.public_key.help_text}
|
||||||
|
{$form.f.public_key_type.help_text}
|
||||||
|
</span>
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr class="pass-info" id="extra-password">
|
<tr class="pass-info" id="extra-password">
|
||||||
@ -82,7 +86,7 @@
|
|||||||
|
|
||||||
{if count($keys)}
|
{if count($keys)}
|
||||||
<table summary=" " class="recent-issues">
|
<table summary=" " class="recent-issues">
|
||||||
<tr><th colspan="2">{trans 'Your Current SSH Keys'}</th></tr>
|
<tr><th colspan="2">{trans 'Your Current Public Keys'}</th></tr>
|
||||||
{foreach $keys as $key}<tr><td>
|
{foreach $keys as $key}<tr><td>
|
||||||
<span class="mono">{$key.showCompact()}</span></td><td> <form class="star" method="post" action="{url 'IDF_Views_User::deleteKey', array($key.id)}"><input type="image" src="{media '/idf/img/trash.png'}" name="submit" value="{trans 'Delete this key'}" /></form>
|
<span class="mono">{$key.showCompact()}</span></td><td> <form class="star" method="post" action="{url 'IDF_Views_User::deleteKey', array($key.id)}"><input type="image" src="{media '/idf/img/trash.png'}" name="submit" value="{trans 'Delete this key'}" /></form>
|
||||||
</td>
|
</td>
|
||||||
|
Loading…
Reference in New Issue
Block a user