12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061 |
- package auth
- import (
- "bytes"
- "context"
- "crypto/rand"
- "encoding/base64"
- "fmt"
- "io"
- "log/slog"
- "os"
- "path/filepath"
- "golang.org/x/crypto/ssh"
- )
- const defaultPrivateKey = "id_ed25519"
- func NewNonce(r io.Reader, length int) (string, error) {
- nonce := make([]byte, length)
- if _, err := io.ReadFull(r, nonce); err != nil {
- return "", err
- }
- return base64.RawURLEncoding.EncodeToString(nonce), nil
- }
- func Sign(ctx context.Context, bts []byte) (string, error) {
- home, err := os.UserHomeDir()
- if err != nil {
- return "", err
- }
- keyPath := filepath.Join(home, ".ollama", defaultPrivateKey)
- privateKeyFile, err := os.ReadFile(keyPath)
- if err != nil {
- slog.Info(fmt.Sprintf("Failed to load private key: %v", err))
- return "", err
- }
- privateKey, err := ssh.ParsePrivateKey(privateKeyFile)
- if err != nil {
- return "", err
- }
- // get the pubkey, but remove the type
- publicKey := ssh.MarshalAuthorizedKey(privateKey.PublicKey())
- parts := bytes.Split(publicKey, []byte(" "))
- if len(parts) < 2 {
- return "", fmt.Errorf("malformed public key")
- }
- signedData, err := privateKey.Sign(rand.Reader, bts)
- if err != nil {
- return "", err
- }
- // signature is <pubkey>:<signature>
- return fmt.Sprintf("%s:%s", bytes.TrimSpace(parts[1]), base64.StdEncoding.EncodeToString(signedData.Blob)), nil
- }
|