Skip to content

Conversation

@adamlazik1
Copy link
Contributor

No description provided.

@adamlazik1
Copy link
Contributor Author

@adamlazik1 adamlazik1 force-pushed the ssh-cert-support branch 5 times, most recently from 702e256 to 18db7e9 Compare July 11, 2025 07:12
@adamlazik1 adamlazik1 marked this pull request as ready for review July 11, 2025 07:14
@adamlazik1
Copy link
Contributor Author

This is now ready for review.

}
$known_hosts_file_option = $foreman_proxy::plugin::remote_execution::script::ssh_host_ca_public_key ? {
undef => '',
default => "-o UserKnownHostsFile=${foreman_proxy::plugin::remote_execution::script::ssh_identity_dir}/known_hosts -o UserKnownHostsFile=${foreman_proxy::plugin::remote_execution::script::ssh_ca_known_hosts_file}",
Copy link
Contributor Author

@adamlazik1 adamlazik1 Jul 11, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same issue as in remote execution. If we have host CA cert available, should we enforce StrictHostKeyChecking?

@evgeni
Copy link
Member

evgeni commented Jul 14, 2025

/packit build

@evgeni
Copy link
Member

evgeni commented Jul 14, 2025

@adamlazik1 could you rebase this please on latest master, so that Packit starts working?

@packit-as-a-service
Copy link

No config file for packit (e.g. .packit.yaml) found in theforeman/puppet-foreman_proxy on commit 18db7e9

For more info, please check out the documentation or contact the Packit team. You can also use our CLI command config validate or our pre-commit hooks for validation of the configuration.

@evgeni
Copy link
Member

evgeni commented Jul 14, 2025

/packit build

@adamlazik1 adamlazik1 force-pushed the ssh-cert-support branch 2 times, most recently from f6c78c1 to 5e673ed Compare July 14, 2025 15:05
@adamlazik1
Copy link
Contributor Author

Updated ansible ssh args to enforce strict host key checking if host CA is provided.

@lhellebr
Copy link
Contributor

/packit build

@packit-as-a-service
Copy link

Account lhellebr has no write access nor is author of PR!

@evgeni
Copy link
Member

evgeni commented Jul 15, 2025

/packit build

@adamlazik1
Copy link
Contributor Author

Switching back to draft since the feature got postponed to 3.16

@adamlazik1 adamlazik1 marked this pull request as draft July 21, 2025 09:06
# $ssh_identity_file:: Provide an alternative name for the SSH keys
#
# $ssh_keygen:: Location of the ssh-keygen binary
# $ssh_user_ca_public_key_file:: Public key file for the SSH CA certificate
Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we unify with the host CA key behavior and pass the public key contents instead of a path? I would solve issues with permissions.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

From security POV, it should be fine since the CA key is public. But how long is it? How long will it eventually be? Maybe the shell won't like a line that long. I think this kind of data shouldn't be passed in the command line. OTOH, if it's consistent with something we already have, it may be the least confusing.
The permission issues themselves can be solved by documentation + help text.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I see, thanks for your input. You have a good point with possible future length, so I will probably leave it as it is.

@lhellebr
Copy link
Contributor

/packit build

@packit-as-a-service
Copy link

Account lhellebr has no write access nor is author of PR!

@adamruzicka
Copy link
Contributor

/packit build

1 similar comment
@ekohl
Copy link
Member

ekohl commented Oct 30, 2025

/packit build

@packit-as-a-service
Copy link

Account adamruzicka has no write access nor is author of PR!

@adamlazik1
Copy link
Contributor Author

/packit build

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants