package ssh import ( "io/ioutil" tls_util "github.com/go-gost/core/common/util/tls" mdata "github.com/go-gost/core/metadata" ssh_util "github.com/go-gost/x/internal/util/ssh" "golang.org/x/crypto/ssh" ) const ( defaultBacklog = 128 ) type metadata struct { signer ssh.Signer authorizedKeys map[string]bool backlog int } func (l *sshListener) parseMetadata(md mdata.Metadata) (err error) { const ( authorizedKeys = "authorizedKeys" privateKeyFile = "privateKeyFile" passphrase = "passphrase" backlog = "backlog" ) if key := mdata.GetString(md, privateKeyFile); key != "" { data, err := ioutil.ReadFile(key) if err != nil { return err } pp := mdata.GetString(md, passphrase) if pp == "" { l.md.signer, err = ssh.ParsePrivateKey(data) } else { l.md.signer, err = ssh.ParsePrivateKeyWithPassphrase(data, []byte(pp)) } if err != nil { return err } } if l.md.signer == nil { signer, err := ssh.NewSignerFromKey(tls_util.DefaultConfig.Clone().Certificates[0].PrivateKey) if err != nil { return err } l.md.signer = signer } if name := mdata.GetString(md, authorizedKeys); name != "" { m, err := ssh_util.ParseAuthorizedKeysFile(name) if err != nil { return err } l.md.authorizedKeys = m } l.md.backlog = mdata.GetInt(md, backlog) if l.md.backlog <= 0 { l.md.backlog = defaultBacklog } return }