feat: add ssh-verify.ts
This commit is contained in:
@@ -5,7 +5,7 @@
|
||||
// - https://docs.deno.com/api/node/crypto/~/X509Certificate#property_issuercertificate
|
||||
// - https://docs.deno.com/api/node/crypto/~/createPublicKey
|
||||
|
||||
const {X509Certificate, createPublicKey} = await import('node:crypto');
|
||||
const {X509Certificate, createPublicKey} = await import("node:crypto");
|
||||
|
||||
if (Deno.args.length === 0) {
|
||||
console.log("Usage: publickey.ts <certificate|publickey|jwk>");
|
||||
|
||||
97
single-scripts/ssh-verify.ts
Executable file
97
single-scripts/ssh-verify.ts
Executable file
@@ -0,0 +1,97 @@
|
||||
#!/usr/bin/env -S deno run --allow-env --allow-import --allow-read --allow-net
|
||||
|
||||
import { parseArgs } from "jsr:@std/cli/parse-args";
|
||||
import {
|
||||
fetchKeys,
|
||||
SshKey,
|
||||
} from "https://hatter.ink/script/fetch/library/deno-github-mod.ts?202501191443";
|
||||
import {
|
||||
SshSignature,
|
||||
} from "https://hatter.ink/script/fetch/library/deno-sshsig-mod.ts?202501191510";
|
||||
|
||||
const flags = parseArgs(Deno.args, {
|
||||
boolean: ["help", "debug"],
|
||||
string: ["username"],
|
||||
});
|
||||
|
||||
if (Deno.args.length === 0) {
|
||||
console.log("ssh-verify.ts --help for help");
|
||||
Deno.exit(1);
|
||||
}
|
||||
|
||||
if (flags.help) {
|
||||
console.log(`ssh-verify.ts - SSH verify tool
|
||||
|
||||
ssh-verify.ts --help
|
||||
ssh-verify.ts --username <github-username> <filename>
|
||||
`);
|
||||
Deno.exit(0);
|
||||
}
|
||||
|
||||
if (flags._.length === 0) {
|
||||
console.log("Requires filename.");
|
||||
Deno.exit(1);
|
||||
}
|
||||
|
||||
const filename = flags._[0] as string;
|
||||
const sshSigFilename = `${filename}.sshsig`;
|
||||
|
||||
if (flags.debug) {
|
||||
console.log(`SSH signature file: ${sshSigFilename}`);
|
||||
}
|
||||
const sshSignature = await SshSignature.parseFile(sshSigFilename);
|
||||
|
||||
const verifyResult = await sshSignature.verifyFile(filename);
|
||||
|
||||
if (!verifyResult) {
|
||||
console.log(
|
||||
`[ERROR] Verify ${filename}, signature: ${sshSigFilename} failed.`,
|
||||
);
|
||||
Deno.exit(1);
|
||||
}
|
||||
|
||||
const sshPublicKey = sshSignature.publicKey;
|
||||
const sshPublicKeyRawBase64 = sshSignature.publicKey.asRawBase64();
|
||||
const sshPublicKeySshFormat = sshPublicKey.toSshKeyFormat();
|
||||
|
||||
console.log(`[SUCCESS] File ${filename} verify success.`);
|
||||
console.log(`[SUCCESS] Signing SSH key: ${sshPublicKeySshFormat}`);
|
||||
|
||||
if (flags.username) {
|
||||
let matches = false;
|
||||
try {
|
||||
console.log(`[INFO] Fetch SSH keys for user: ${flags.username}`);
|
||||
const keys: Array<SshKey> = await fetchKeys(flags.username);
|
||||
|
||||
if (flags.debug) {
|
||||
for (let i = 0; i < keys.length; i++) {
|
||||
const key = keys[i];
|
||||
console.log(
|
||||
`[DEBUG] Found SSH key: ${key.algorithm} ${key.material}`,
|
||||
);
|
||||
}
|
||||
}
|
||||
for (let i = 0; i < keys.length; i++) {
|
||||
const key = keys[i];
|
||||
if (key.material == sshPublicKeyRawBase64) {
|
||||
matches = true;
|
||||
break;
|
||||
}
|
||||
}
|
||||
} catch (e) {
|
||||
console.error(
|
||||
`[ERROR] Fetch SSH keys for ${flags.username} failed: ${e}`,
|
||||
);
|
||||
}
|
||||
if (matches) {
|
||||
console.log(
|
||||
`[SUCCESS] SSH key matches for GitHub user: ${flags.username} success.`,
|
||||
);
|
||||
} else {
|
||||
console.log(
|
||||
`[ERROR] SSH key NOT matched for GitHub user: ${flags.username}.`,
|
||||
);
|
||||
}
|
||||
} else {
|
||||
console.log("[WARN] GitHub user is not assigned.");
|
||||
}
|
||||
Reference in New Issue
Block a user