1package config
2
3import (
4 "log"
5
6 gm "github.com/charmbracelet/wish/git"
7 "github.com/gliderlabs/ssh"
8)
9
10func (cfg *Config) Push(repo string, pk ssh.PublicKey) {
11 log.Printf("git push: %s", repo)
12 err := cfg.reload()
13 if err != nil {
14 log.Printf("error reloading after push: %s", err)
15 }
16}
17
18func (cfg *Config) Fetch(repo string, pk ssh.PublicKey) {
19 log.Printf("git fetch: %s", repo)
20}
21
22func (cfg *Config) AuthRepo(repo string, pk ssh.PublicKey) gm.AccessLevel {
23 return cfg.accessForKey(repo, pk)
24}
25
26func (cfg *Config) PasswordHandler(ctx ssh.Context, password string) bool {
27 return (cfg.AnonAccess != "no-access") && cfg.AllowNoKeys
28}
29
30func (cfg *Config) PublicKeyHandler(ctx ssh.Context, pk ssh.PublicKey) bool {
31 if cfg.accessForKey("", pk) == gm.NoAccess {
32 return false
33 }
34 return true
35}
36
37func (cfg *Config) accessForKey(repo string, pk ssh.PublicKey) gm.AccessLevel {
38 for _, u := range cfg.Users {
39 apk, _, _, _, err := ssh.ParseAuthorizedKey([]byte(u.PublicKey))
40 if err != nil {
41 log.Printf("error: malformed authorized key: '%s'", u.PublicKey)
42 return gm.NoAccess
43 }
44 if ssh.KeysEqual(pk, apk) {
45 if u.Admin {
46 return gm.AdminAccess
47 }
48 for _, r := range u.CollabRepos {
49 if repo == r {
50 return gm.ReadWriteAccess
51 }
52 }
53 if repo != "config" {
54 return gm.ReadOnlyAccess
55 }
56 }
57 }
58 if repo == "config" && (cfg.AnonAccess != "read-write") {
59 return gm.NoAccess
60 }
61 switch cfg.AnonAccess {
62 case "no-access":
63 return gm.NoAccess
64 case "read-only":
65 return gm.ReadOnlyAccess
66 case "read-write":
67 return gm.ReadWriteAccess
68 default:
69 return gm.NoAccess
70 }
71}