sailesh1993 / rpms / cloud-init

Forked from rpms/cloud-init a year ago
Clone
ea00c4
From b84a1e6d246bbb758f0530038612bd18eff71767 Mon Sep 17 00:00:00 2001
ea00c4
From: Eduardo Otubo <otubo@redhat.com>
ea00c4
Date: Tue, 8 Dec 2020 13:27:22 +0100
ea00c4
Subject: [PATCH 4/4] ssh_util: handle non-default AuthorizedKeysFile config
ea00c4
 (#586)
ea00c4
ea00c4
RH-Author: Eduardo Terrell Ferrari Otubo (eterrell)
ea00c4
RH-MergeRequest: 28: ssh_util: handle non-default AuthorizedKeysFile config (#586)
ea00c4
RH-Commit: [1/1] f7ce396e3002c53a3504e653b58810efb956aa26 (eterrell/cloud-init)
ea00c4
RH-Bugzilla: 1862967
ea00c4
ea00c4
commit b0e73814db4027dba0b7dc0282e295b7f653325c
ea00c4
Author: Eduardo Otubo <otubo@redhat.com>
ea00c4
Date:   Tue Oct 20 18:04:59 2020 +0200
ea00c4
ea00c4
    ssh_util: handle non-default AuthorizedKeysFile config (#586)
ea00c4
ea00c4
    The following commit merged all ssh keys into a default user file
ea00c4
    `~/.ssh/authorized_keys` in sshd_config had multiple files configured for
ea00c4
    AuthorizedKeysFile:
ea00c4
ea00c4
    commit f1094b1a539044c0193165a41501480de0f8df14
ea00c4
    Author: Eduardo Otubo <otubo@redhat.com>
ea00c4
    Date:   Thu Dec 5 17:37:35 2019 +0100
ea00c4
ea00c4
        Multiple file fix for AuthorizedKeysFile config (#60)
ea00c4
ea00c4
    This commit ignored the case when sshd_config would have a single file for
ea00c4
    AuthorizedKeysFile, but a non default configuration, for example
ea00c4
    `~/.ssh/authorized_keys_foobar`. In this case cloud-init would grab all keys
ea00c4
    from this file and write a new one, the default `~/.ssh/authorized_keys`
ea00c4
    causing the bug.
ea00c4
ea00c4
    rhbz: #1862967
ea00c4
ea00c4
    Signed-off-by: Eduardo Otubo <otubo@redhat.com>
ea00c4
ea00c4
Signed-off-by: Eduardo Otubo <otubo@redhat.com>
ea00c4
---
ea00c4
 cloudinit/ssh_util.py           | 6 +++---
ea00c4
 tests/unittests/test_sshutil.py | 6 +++---
ea00c4
 2 files changed, 6 insertions(+), 6 deletions(-)
ea00c4
ea00c4
diff --git a/cloudinit/ssh_util.py b/cloudinit/ssh_util.py
ea00c4
index c08042d6..d5113996 100644
ea00c4
--- a/cloudinit/ssh_util.py
ea00c4
+++ b/cloudinit/ssh_util.py
ea00c4
@@ -262,13 +262,13 @@ def extract_authorized_keys(username, sshd_cfg_file=DEF_SSHD_CFG):
ea00c4
 
ea00c4
         except (IOError, OSError):
ea00c4
             # Give up and use a default key filename
ea00c4
-            auth_key_fns[0] = default_authorizedkeys_file
ea00c4
+            auth_key_fns.append(default_authorizedkeys_file)
ea00c4
             util.logexc(LOG, "Failed extracting 'AuthorizedKeysFile' in SSH "
ea00c4
                         "config from %r, using 'AuthorizedKeysFile' file "
ea00c4
                         "%r instead", DEF_SSHD_CFG, auth_key_fns[0])
ea00c4
 
ea00c4
-    # always store all the keys in the user's private file
ea00c4
-    return (default_authorizedkeys_file, parse_authorized_keys(auth_key_fns))
ea00c4
+    # always store all the keys in the first file configured on sshd_config
ea00c4
+    return (auth_key_fns[0], parse_authorized_keys(auth_key_fns))
ea00c4
 
ea00c4
 
ea00c4
 def setup_user_keys(keys, username, options=None):
ea00c4
diff --git a/tests/unittests/test_sshutil.py b/tests/unittests/test_sshutil.py
ea00c4
index fd1d1bac..88a111e3 100644
ea00c4
--- a/tests/unittests/test_sshutil.py
ea00c4
+++ b/tests/unittests/test_sshutil.py
ea00c4
@@ -593,7 +593,7 @@ class TestMultipleSshAuthorizedKeysFile(test_helpers.CiTestCase):
ea00c4
             fpw.pw_name, sshd_config)
ea00c4
         content = ssh_util.update_authorized_keys(auth_key_entries, [])
ea00c4
 
ea00c4
-        self.assertEqual("%s/.ssh/authorized_keys" % fpw.pw_dir, auth_key_fn)
ea00c4
+        self.assertEqual(authorized_keys, auth_key_fn)
ea00c4
         self.assertTrue(VALID_CONTENT['rsa'] in content)
ea00c4
         self.assertTrue(VALID_CONTENT['dsa'] in content)
ea00c4
 
ea00c4
@@ -610,7 +610,7 @@ class TestMultipleSshAuthorizedKeysFile(test_helpers.CiTestCase):
ea00c4
         sshd_config = self.tmp_path('sshd_config')
ea00c4
         util.write_file(
ea00c4
             sshd_config,
ea00c4
-            "AuthorizedKeysFile %s %s" % (authorized_keys, user_keys)
ea00c4
+            "AuthorizedKeysFile %s %s" % (user_keys, authorized_keys)
ea00c4
         )
ea00c4
 
ea00c4
         (auth_key_fn, auth_key_entries) = ssh_util.extract_authorized_keys(
ea00c4
@@ -618,7 +618,7 @@ class TestMultipleSshAuthorizedKeysFile(test_helpers.CiTestCase):
ea00c4
         )
ea00c4
         content = ssh_util.update_authorized_keys(auth_key_entries, [])
ea00c4
 
ea00c4
-        self.assertEqual("%s/.ssh/authorized_keys" % fpw.pw_dir, auth_key_fn)
ea00c4
+        self.assertEqual(user_keys, auth_key_fn)
ea00c4
         self.assertTrue(VALID_CONTENT['rsa'] in content)
ea00c4
         self.assertTrue(VALID_CONTENT['dsa'] in content)
ea00c4
 
ea00c4
-- 
ea00c4
2.18.4
ea00c4