mirror of
https://github.com/ben-grande/qusal.git
synced 2025-02-06 10:05:20 -05:00
224312ed42
Make shell a little bit safer with: - add-default-case - check-extra-masked-returns - check-set-e-suppressed - quote-safe-variables - check-unassigned-uppercase Although there are some stylistic decisions for uniformity: - avoid-nullary-conditions - deprecated-which - require-variable-braces
39 lines
909 B
Bash
39 lines
909 B
Bash
#!/bin/sh
|
|
|
|
# SPDX-FileCopyrightText: 2023 - 2024 Benjamin Grande M. S. <ben.grande.b@gmail.com>
|
|
#
|
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
|
|
|
set -eu
|
|
|
|
die(){
|
|
echo "error: ${1}" >&2
|
|
exit 1
|
|
}
|
|
|
|
# shellcheck disable=SC2154
|
|
untrusted_agent="${QREXEC_SERVICE_ARGUMENT}"
|
|
|
|
if test -z "${untrusted_agent}"; then
|
|
die "Agent name is empty"
|
|
fi
|
|
|
|
if ! (echo "${untrusted_agent}" | grep -q "^[A-Za-z0-9][A-Za-z0-9_.-]\+$")
|
|
then
|
|
msg="Forbidden characters in agent name."
|
|
msg="${msg} Allowed chars: letters, numbers, hyphen, underscore and dot."
|
|
msg="${msg} Name cannot begin with hyphen, underscore or dot"
|
|
die "${msg}"
|
|
fi
|
|
|
|
## Length arbitrarily set.
|
|
if test "${#untrusted_agent}" -gt 128; then
|
|
die "Repository name is too long: ${#untrusted_agent}"
|
|
fi
|
|
|
|
agent="${untrusted_agent}"
|
|
socket="/tmp/qusal-ssh-agent/${agent}.sock"
|
|
|
|
qvm-ssh-agent add "${agent}" >/dev/null
|
|
exec socat STDIO UNIX-CLIENT:"${socket}"
|