ssh_cert_parser 0.1.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml ADDED
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA1:
3
+ metadata.gz: 4d49f58f0a5a4ba748abf13a0decdd203658b3c2
4
+ data.tar.gz: 02c58ba84ac166539edd6b0a3d495832309c3785
5
+ SHA512:
6
+ metadata.gz: d257c79c5f557a48595ba0e39c36761aabd301bdf685d6c69442fe7b16072b57fedc1ac3a5a42b16e539eacbc3b1d75ba2efa354134272582d21ce9630b0127e
7
+ data.tar.gz: be8cb46705721583ec870eda85724c58a19cb91dc04a6dcf5c8a903f551ebb4d0780701119bad4012006f533cf128190c7febee7dd1833d7615eeb6ce1b082a3
data/.gitignore ADDED
@@ -0,0 +1,11 @@
1
+ /.bundle/
2
+ /.yardoc
3
+ /_yardoc/
4
+ /coverage/
5
+ /doc/
6
+ /pkg/
7
+ /spec/reports/
8
+ /tmp/
9
+
10
+ # rspec failure tracking
11
+ .rspec_status
data/.rspec ADDED
@@ -0,0 +1,3 @@
1
+ --format documentation
2
+ --color
3
+ --require spec_helper
data/.travis.yml ADDED
@@ -0,0 +1,5 @@
1
+ sudo: false
2
+ language: ruby
3
+ rvm:
4
+ - 2.3.4
5
+ before_install: gem install bundler -v 1.16.1
@@ -0,0 +1,74 @@
1
+ # Contributor Covenant Code of Conduct
2
+
3
+ ## Our Pledge
4
+
5
+ In the interest of fostering an open and welcoming environment, we as
6
+ contributors and maintainers pledge to making participation in our project and
7
+ our community a harassment-free experience for everyone, regardless of age, body
8
+ size, disability, ethnicity, gender identity and expression, level of experience,
9
+ nationality, personal appearance, race, religion, or sexual identity and
10
+ orientation.
11
+
12
+ ## Our Standards
13
+
14
+ Examples of behavior that contributes to creating a positive environment
15
+ include:
16
+
17
+ * Using welcoming and inclusive language
18
+ * Being respectful of differing viewpoints and experiences
19
+ * Gracefully accepting constructive criticism
20
+ * Focusing on what is best for the community
21
+ * Showing empathy towards other community members
22
+
23
+ Examples of unacceptable behavior by participants include:
24
+
25
+ * The use of sexualized language or imagery and unwelcome sexual attention or
26
+ advances
27
+ * Trolling, insulting/derogatory comments, and personal or political attacks
28
+ * Public or private harassment
29
+ * Publishing others' private information, such as a physical or electronic
30
+ address, without explicit permission
31
+ * Other conduct which could reasonably be considered inappropriate in a
32
+ professional setting
33
+
34
+ ## Our Responsibilities
35
+
36
+ Project maintainers are responsible for clarifying the standards of acceptable
37
+ behavior and are expected to take appropriate and fair corrective action in
38
+ response to any instances of unacceptable behavior.
39
+
40
+ Project maintainers have the right and responsibility to remove, edit, or
41
+ reject comments, commits, code, wiki edits, issues, and other contributions
42
+ that are not aligned to this Code of Conduct, or to ban temporarily or
43
+ permanently any contributor for other behaviors that they deem inappropriate,
44
+ threatening, offensive, or harmful.
45
+
46
+ ## Scope
47
+
48
+ This Code of Conduct applies both within project spaces and in public spaces
49
+ when an individual is representing the project or its community. Examples of
50
+ representing a project or community include using an official project e-mail
51
+ address, posting via an official social media account, or acting as an appointed
52
+ representative at an online or offline event. Representation of a project may be
53
+ further defined and clarified by project maintainers.
54
+
55
+ ## Enforcement
56
+
57
+ Instances of abusive, harassing, or otherwise unacceptable behavior may be
58
+ reported by contacting the project team at haseebeqx@yahoo.com. All
59
+ complaints will be reviewed and investigated and will result in a response that
60
+ is deemed necessary and appropriate to the circumstances. The project team is
61
+ obligated to maintain confidentiality with regard to the reporter of an incident.
62
+ Further details of specific enforcement policies may be posted separately.
63
+
64
+ Project maintainers who do not follow or enforce the Code of Conduct in good
65
+ faith may face temporary or permanent repercussions as determined by other
66
+ members of the project's leadership.
67
+
68
+ ## Attribution
69
+
70
+ This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4,
71
+ available at [http://contributor-covenant.org/version/1/4][version]
72
+
73
+ [homepage]: http://contributor-covenant.org
74
+ [version]: http://contributor-covenant.org/version/1/4/
data/Gemfile ADDED
@@ -0,0 +1,6 @@
1
+ source "https://rubygems.org"
2
+
3
+ git_source(:github) {|repo_name| "https://github.com/#{repo_name}" }
4
+
5
+ # Specify your gem's dependencies in ssh_cert_parser.gemspec
6
+ gemspec
data/Gemfile.lock ADDED
@@ -0,0 +1,35 @@
1
+ PATH
2
+ remote: .
3
+ specs:
4
+ ssh_cert_parser (0.1.0)
5
+
6
+ GEM
7
+ remote: https://rubygems.org/
8
+ specs:
9
+ diff-lcs (1.3)
10
+ rake (10.5.0)
11
+ rspec (3.7.0)
12
+ rspec-core (~> 3.7.0)
13
+ rspec-expectations (~> 3.7.0)
14
+ rspec-mocks (~> 3.7.0)
15
+ rspec-core (3.7.1)
16
+ rspec-support (~> 3.7.0)
17
+ rspec-expectations (3.7.0)
18
+ diff-lcs (>= 1.2.0, < 2.0)
19
+ rspec-support (~> 3.7.0)
20
+ rspec-mocks (3.7.0)
21
+ diff-lcs (>= 1.2.0, < 2.0)
22
+ rspec-support (~> 3.7.0)
23
+ rspec-support (3.7.1)
24
+
25
+ PLATFORMS
26
+ ruby
27
+
28
+ DEPENDENCIES
29
+ bundler (~> 1.16)
30
+ rake (~> 10.0)
31
+ rspec (~> 3.0)
32
+ ssh_cert_parser!
33
+
34
+ BUNDLED WITH
35
+ 1.16.1
data/LICENSE.txt ADDED
@@ -0,0 +1,21 @@
1
+ The MIT License (MIT)
2
+
3
+ Copyright (c) 2018 haseeb
4
+
5
+ Permission is hereby granted, free of charge, to any person obtaining a copy
6
+ of this software and associated documentation files (the "Software"), to deal
7
+ in the Software without restriction, including without limitation the rights
8
+ to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
9
+ copies of the Software, and to permit persons to whom the Software is
10
+ furnished to do so, subject to the following conditions:
11
+
12
+ The above copyright notice and this permission notice shall be included in
13
+ all copies or substantial portions of the Software.
14
+
15
+ THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
16
+ IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
17
+ FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
18
+ AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
19
+ LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
20
+ OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
21
+ THE SOFTWARE.
data/README.md ADDED
@@ -0,0 +1,57 @@
1
+ # SSHCertParser
2
+
3
+ based on [https://github.com/EasyPost/ssh_certificate_parser](https://github.com/EasyPost/ssh_certificate_parser)
4
+
5
+ parses [OpenSSH certificates](https://code.facebook.com/posts/365787980419535/scalable-and-secure-access-with-ssh/). it s capable of parsing both user certificates and host certificates. currently the following certifcate types are supported.
6
+
7
+ * ssh-rsa-cert-v01@openssh.com
8
+
9
+ ## Installation
10
+
11
+ Add this line to your application's Gemfile:
12
+
13
+ ```ruby
14
+ gem 'ssh_cert_parser'
15
+ ```
16
+
17
+ And then execute:
18
+
19
+ $ bundle
20
+
21
+ Or install it yourself as:
22
+
23
+ $ gem install ssh_cert_parser
24
+
25
+ ## Usage
26
+
27
+ ### from File
28
+
29
+ ```ruby
30
+ cert = SSHCertParser.from_file('path/to/some/file')
31
+ cert.as_hash
32
+ ```
33
+
34
+ ### from string
35
+
36
+ ```ruby
37
+ cert = SSHCertParser.from_string(File.read('path/to/some/file'))
38
+ cert.as_hash
39
+ ```
40
+
41
+ ## Development
42
+
43
+ After checking out the repo, run `bin/setup` to install dependencies. Then, run `rake spec` to run the tests. You can also run `bin/console` for an interactive prompt that will allow you to experiment.
44
+
45
+ To install this gem onto your local machine, run `bundle exec rake install`. To release a new version, update the version number in `version.rb`, and then run `bundle exec rake release`, which will create a git tag for the version, push git commits and tags, and push the `.gem` file to [rubygems.org](https://rubygems.org).
46
+
47
+ ## Contributing
48
+
49
+ Bug reports and pull requests are welcome on GitHub at https://github.com/[USERNAME]/ssh_cert_parser. This project is intended to be a safe, welcoming space for collaboration, and contributors are expected to adhere to the [Contributor Covenant](http://contributor-covenant.org) code of conduct.
50
+
51
+ ## License
52
+
53
+ The gem is available as open source under the terms of the [MIT License](https://opensource.org/licenses/MIT).
54
+
55
+ ## Code of Conduct
56
+
57
+ Everyone interacting in the SSHCertParser project’s codebases, issue trackers, chat rooms and mailing lists is expected to follow the [code of conduct](https://github.com/[USERNAME]/ssh_cert_parser/blob/master/CODE_OF_CONDUCT.md).
data/Rakefile ADDED
@@ -0,0 +1,6 @@
1
+ require "bundler/gem_tasks"
2
+ require "rspec/core/rake_task"
3
+
4
+ RSpec::Core::RakeTask.new(:spec)
5
+
6
+ task :default => :spec
data/bin/console ADDED
@@ -0,0 +1,14 @@
1
+ #!/usr/bin/env ruby
2
+
3
+ require "bundler/setup"
4
+ require "ssh_cert_parser"
5
+
6
+ # You can add fixtures and/or initialization code here to make experimenting
7
+ # with your gem easier. You can also use a different console, if you like.
8
+
9
+ # (If you use this, don't forget to add pry to your Gemfile!)
10
+ # require "pry"
11
+ # Pry.start
12
+
13
+ require "irb"
14
+ IRB.start(__FILE__)
data/bin/setup ADDED
@@ -0,0 +1,8 @@
1
+ #!/usr/bin/env bash
2
+ set -euo pipefail
3
+ IFS=$'\n\t'
4
+ set -vx
5
+
6
+ bundle install
7
+
8
+ # Do any other automated setup that you need to do here
@@ -0,0 +1,13 @@
1
+ module SSHCertParser
2
+ module PublicKeys
3
+ class PublicKey
4
+ def initialize(raw)
5
+ @raw = raw
6
+ end
7
+
8
+ def fingerprint
9
+ "SHA256:#{Digest::SHA256.base64digest(raw).partition("=")[0]}"
10
+ end
11
+ end
12
+ end
13
+ end
@@ -0,0 +1,15 @@
1
+ require 'ssh_cert_parser/public_keys/public_key'
2
+
3
+ module SSHCertParser
4
+ module PublicKeys
5
+ class RSAPublicKey < PublicKey
6
+ attr_accessor :modulus, :exponent, :raw
7
+
8
+ def initialize(modulus, exponent, raw = nil)
9
+ @modulus = modulus
10
+ @exponent = exponent
11
+ @raw = raw
12
+ end
13
+ end
14
+ end
15
+ end
@@ -0,0 +1,124 @@
1
+ require 'base64'
2
+ require 'digest'
3
+ require 'date'
4
+ require 'ssh_cert_parser/public_keys/rsa_public_key'
5
+
6
+ module SSHCertParser
7
+ class SSHCertificate
8
+ attr_accessor :serial, :cert_type, :key_id, :principals, :valid_after, :valid_before,
9
+ :crits, :exts, :ca, :signature
10
+
11
+ def initialize(*args)
12
+ @serial, @cert_type, @key_id, @principals, @valid_after, @valid_before,
13
+ @crits, @exts, @ca, @signature = args
14
+ end
15
+
16
+ def as_hash
17
+ {
18
+ serial: serial,
19
+ cert_type: cert_type,
20
+ key_id: key_id,
21
+ principals: principals,
22
+ valid_after: valid_after,
23
+ valid_before: valid_before,
24
+ crits: crits,
25
+ exts: exts,
26
+ ca_fingerprint: ca.fingerprint,
27
+ signature: Base64.encode64(signature)
28
+ }
29
+ end
30
+
31
+ class << self
32
+ def from_bytes(byte_array)
33
+ blob = if byte_array.include? ' '
34
+ byte_array.split(' ')[1]
35
+ else
36
+ byte_array
37
+ end
38
+ blob = Base64.decode64(blob)
39
+ key_type, blob = take_pascal_string(blob)
40
+ if key_type != 'ssh-rsa-cert-v01@openssh.com'
41
+ raise "Cannot parse certificate of type #{key_type}"
42
+ end
43
+ nonce, blob = take_pascal_bytestring(blob)
44
+ public_n, blob = take_pascal_bytestring(blob)
45
+ public_e, blob = take_pascal_bytestring(blob)
46
+ serial, blob = take_u64(blob)
47
+ cert_type, blob = take_u32(blob)
48
+ cert_type = if cert_type == 1
49
+ 'user'
50
+ else
51
+ 'host'
52
+ end
53
+ key_id, blob = take_pascal_string(blob)
54
+ principals, blob = take_list(blob, method(:take_pascal_string))
55
+ valid_after, blob = take_u64(blob)
56
+ begin
57
+ valid_after = DateTime.strptime(valid_after, '%s')
58
+ rescue StandardError
59
+ end
60
+ valid_before, blob = take_u64(blob)
61
+ begin
62
+ valid_before = DateTime.strptime(valid_before, '%s')
63
+ rescue StandardError
64
+ valid_before = "forever"
65
+ end
66
+
67
+ crits, blob = take_list(blob, method(:take_pascal_string))
68
+ exts, blob = take_list(blob, method(:take_pascal_string))
69
+ unknown, blob = take_pascal_bytestring(blob)
70
+ raw_ca, blob = take_pascal_bytestring(blob)
71
+ ca_cert_type, raw_ca_rest = take_pascal_string(raw_ca)
72
+ if ca_cert_type == 'ssh-rsa'
73
+ ca_cert = take_rsa_cert(raw_ca, raw_ca_rest)
74
+ else
75
+ raise "Unsupported cert type #{ca_cert_type}"
76
+ end
77
+ signature = blob
78
+ new(
79
+ serial, cert_type, key_id, principals, valid_after, valid_before,
80
+ crits, exts, ca_cert, signature
81
+ )
82
+ end
83
+
84
+ def take_u32(string)
85
+ [string[0..4].unpack('L>')[0], string[4..-1]]
86
+ end
87
+
88
+ def take_u64(string)
89
+ [string[0..8].unpack('Q>')[0], string[8..-1]]
90
+ end
91
+
92
+ def take_pascal_bytestring(string)
93
+ string_len, rest = take_u32(string)
94
+ [rest[0..string_len], rest[string_len..-1]]
95
+ end
96
+
97
+ def take_pascal_string(string)
98
+ string_len, rest = take_u32(string)
99
+ p string if string_len.nil?
100
+ [rest[0..string_len].encode('utf-8').strip, rest[string_len..-1]]
101
+ end
102
+
103
+ def take_list(string, per_item_callback)
104
+ overall, rest = take_pascal_bytestring(string)
105
+ overall = overall.strip!
106
+ l = []
107
+ while overall && overall != ''
108
+ item, overall = per_item_callback.call(overall)
109
+ l << item if item != ''
110
+ end
111
+ [l, rest]
112
+ end
113
+
114
+ def take_rsa_cert(raw_pubkey, byte_array)
115
+ modulus_len, byte_array = take_u32(byte_array)
116
+ modulus = byte_array[0..modulus_len]
117
+ byte_array = byte_array[modulus_len..-1]
118
+ exponent_len, byte_array = take_u32(byte_array)
119
+ exponent = byte_array[0..exponent_len]
120
+ PublicKeys::RSAPublicKey.new(modulus = modulus, exponent = exponent, raw = raw_pubkey)
121
+ end
122
+ end
123
+ end
124
+ end
@@ -0,0 +1,3 @@
1
+ module SSHCertParser
2
+ VERSION = "0.1.0"
3
+ end
@@ -0,0 +1,14 @@
1
+ require 'ssh_cert_parser/version'
2
+ require 'ssh_cert_parser/ssh_certificate'
3
+
4
+ module SSHCertParser
5
+ class << self
6
+ def from_file(file)
7
+ SSHCertificate.from_bytes(File.read(file))
8
+ end
9
+
10
+ def from_string(string)
11
+ SSHCertificate.from_bytes(string)
12
+ end
13
+ end
14
+ end
@@ -0,0 +1,24 @@
1
+ lib = File.expand_path('lib', __dir__)
2
+ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
3
+ require 'ssh_cert_parser/version'
4
+
5
+ Gem::Specification.new do |spec|
6
+ spec.name = 'ssh_cert_parser'
7
+ spec.version = SSHCertParser::VERSION
8
+ spec.authors = ['haseeb']
9
+ spec.email = ['haseebeqx@yahoo.com']
10
+
11
+ spec.summary = 'parses ssh certificates'
12
+ spec.homepage = 'https://github.com/haseebeqx/ssh_cert_parser'
13
+ spec.license = 'MIT'
14
+
15
+ spec.files = `git ls-files -z`.split("\x0").reject do |f|
16
+ f.match(%r{^(test|spec|features)/})
17
+ end
18
+
19
+ spec.require_paths = ['lib']
20
+
21
+ spec.add_development_dependency 'bundler', '~> 1.16'
22
+ spec.add_development_dependency 'rake', '~> 10.0'
23
+ spec.add_development_dependency 'rspec', '~> 3.0'
24
+ end
metadata ADDED
@@ -0,0 +1,103 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: ssh_cert_parser
3
+ version: !ruby/object:Gem::Version
4
+ version: 0.1.0
5
+ platform: ruby
6
+ authors:
7
+ - haseeb
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2018-05-06 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: bundler
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: '1.16'
20
+ type: :development
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: '1.16'
27
+ - !ruby/object:Gem::Dependency
28
+ name: rake
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '10.0'
34
+ type: :development
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '10.0'
41
+ - !ruby/object:Gem::Dependency
42
+ name: rspec
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - "~>"
46
+ - !ruby/object:Gem::Version
47
+ version: '3.0'
48
+ type: :development
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - "~>"
53
+ - !ruby/object:Gem::Version
54
+ version: '3.0'
55
+ description:
56
+ email:
57
+ - haseebeqx@yahoo.com
58
+ executables: []
59
+ extensions: []
60
+ extra_rdoc_files: []
61
+ files:
62
+ - ".gitignore"
63
+ - ".rspec"
64
+ - ".travis.yml"
65
+ - CODE_OF_CONDUCT.md
66
+ - Gemfile
67
+ - Gemfile.lock
68
+ - LICENSE.txt
69
+ - README.md
70
+ - Rakefile
71
+ - bin/console
72
+ - bin/setup
73
+ - lib/ssh_cert_parser.rb
74
+ - lib/ssh_cert_parser/public_keys/public_key.rb
75
+ - lib/ssh_cert_parser/public_keys/rsa_public_key.rb
76
+ - lib/ssh_cert_parser/ssh_certificate.rb
77
+ - lib/ssh_cert_parser/version.rb
78
+ - ssh_cert_parser.gemspec
79
+ homepage: https://github.com/haseebeqx/ssh_cert_parser
80
+ licenses:
81
+ - MIT
82
+ metadata: {}
83
+ post_install_message:
84
+ rdoc_options: []
85
+ require_paths:
86
+ - lib
87
+ required_ruby_version: !ruby/object:Gem::Requirement
88
+ requirements:
89
+ - - ">="
90
+ - !ruby/object:Gem::Version
91
+ version: '0'
92
+ required_rubygems_version: !ruby/object:Gem::Requirement
93
+ requirements:
94
+ - - ">="
95
+ - !ruby/object:Gem::Version
96
+ version: '0'
97
+ requirements: []
98
+ rubyforge_project:
99
+ rubygems_version: 2.6.14
100
+ signing_key:
101
+ specification_version: 4
102
+ summary: parses ssh certificates
103
+ test_files: []