ssh/agent: ensure to not add duplicated keys

When adding a new key, if we already have a Signer with the same public
key, we now replace it with the new one instead of duplicating it.

Before this change we had this:

$ ssh-add -l
3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA)
3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA-CERT)

$ ssh-add /home/nicola/ssh_certs/id_rsa
Identity added: /home/nicola/ssh_certs/id_rsa (nicola@p1)
Certificate added: /home/nicola/ssh_certs/id_rsa-cert.pub (myid)

$ ssh-add -l
3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA)
3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA-CERT)
3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA)
3072 SHA256:bsBRHC/xgiqBJdSuvSTNpJNLTISP/G356jNMCRYC5Es nicola@p1 (RSA-CERT)

Change-Id: Iad1b1a6dc94f68f53f05d7d1172f0017839976fc
Reviewed-on: https://go-review.googlesource.com/c/crypto/+/602955
Reviewed-by: Filippo Valsorda <filippo@golang.org>
Auto-Submit: Nicola Murino <nicola.murino@gmail.com>
Reviewed-by: David Chase <drchase@google.com>
Reviewed-by: Michael Knyszek <mknyszek@google.com>
LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com>
This commit is contained in:
Nicola Murino 2024-08-04 16:01:34 +02:00 коммит произвёл Gopher Robot
Родитель 5bcd010f1c
Коммит b2d3a6a4b4
2 изменённых файлов: 55 добавлений и 0 удалений

Просмотреть файл

@ -175,6 +175,15 @@ func (r *keyring) Add(key AddedKey) error {
p.expire = &t
}
// If we already have a Signer with the same public key, replace it with the
// new one.
for idx, k := range r.keys {
if bytes.Equal(k.signer.PublicKey().Marshal(), p.signer.PublicKey().Marshal()) {
r.keys[idx] = p
return nil
}
}
r.keys = append(r.keys, p)
return nil

Просмотреть файл

@ -29,6 +29,10 @@ func validateListedKeys(t *testing.T, a Agent, expectedKeys []string) {
t.Fatalf("failed to list keys: %v", err)
return
}
if len(listedKeys) != len(expectedKeys) {
t.Fatalf("expeted %d key, got %d", len(expectedKeys), len(listedKeys))
return
}
actualKeys := make(map[string]bool)
for _, key := range listedKeys {
actualKeys[key.Comment] = true
@ -74,3 +78,45 @@ func TestKeyringAddingAndRemoving(t *testing.T) {
}
validateListedKeys(t, k, []string{})
}
func TestAddDuplicateKey(t *testing.T) {
keyNames := []string{"rsa", "user"}
k := NewKeyring()
for _, keyName := range keyNames {
addTestKey(t, k, keyName)
}
validateListedKeys(t, k, keyNames)
// Add the keys again.
for _, keyName := range keyNames {
addTestKey(t, k, keyName)
}
validateListedKeys(t, k, keyNames)
// Add an existing key with an updated comment.
keyName := keyNames[0]
addedKey := AddedKey{
PrivateKey: testPrivateKeys[keyName],
Comment: "comment updated",
}
err := k.Add(addedKey)
if err != nil {
t.Fatalf("failed to add key %q: %v", keyName, err)
}
// Check the that key is found and the comment was updated.
keys, err := k.List()
if err != nil {
t.Fatalf("failed to list keys: %v", err)
}
if len(keys) != len(keyNames) {
t.Fatalf("expected %d keys, got %d", len(keyNames), len(keys))
}
isFound := false
for _, key := range keys {
if key.Comment == addedKey.Comment {
isFound = true
}
}
if !isFound {
t.Fatal("key with the updated comment not found")
}
}