Merge lp://staging/~allenap/maas/other-ssh-key-types--bug-1590081 into lp://staging/~maas-committers/maas/trunk
Proposed by
Gavin Panella
Status: | Merged |
---|---|
Approved by: | Gavin Panella |
Approved revision: | no longer in the source branch. |
Merged at revision: | 5118 |
Proposed branch: | lp://staging/~allenap/maas/other-ssh-key-types--bug-1590081 |
Merge into: | lp://staging/~maas-committers/maas/trunk |
Diff against target: |
463 lines (+354/-24) 8 files modified
src/maasserver/models/sshkey.py (+5/-17) src/maasserver/models/tests/test_sshkey.py (+28/-7) src/maasserver/tests/data/test_ecdsa256.pub (+1/-0) src/maasserver/tests/data/test_ecdsa384.pub (+1/-0) src/maasserver/tests/data/test_ecdsa521.pub (+1/-0) src/maasserver/tests/data/test_ed25519.pub (+1/-0) src/provisioningserver/utils/sshkey.py (+161/-0) src/provisioningserver/utils/tests/test_sshkey.py (+156/-0) |
To merge this branch: | bzr merge lp://staging/~allenap/maas/other-ssh-key-types--bug-1590081 |
Related bugs: |
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Mike Pontillo (community) | Approve | ||
Review via email: mp+297093@code.staging.launchpad.net |
Commit message
Permit use of ECDSA and ED25519 SSH keys.
To post a comment you must log in.
I would rather see this fixed upstream than hack around it in MAAS. I checked the twisted code[1] and saw that it was decoding the base64 and parsing the expected ASN1, which I agree is probably too much work for us to take on at this time.
But I'm not convinced that calling Twisted to validate the key for us was the right thing to do in the first place. After all, SSH would be better at telling us whether or not we have a valid key. We should do this instead:
(1) Write key to <tempfile
(2) Check the result of: ssh-keygen -l -f <tempfile>
[1]: /github. com/twisted/ twisted/ blob/trunk/ twisted/ conch/ssh/ keys.py
https:/