sftp: allow inline ssh public certificate for sftp
Some checks failed
Docker beta build / Build image job (push) Has been cancelled

Currently rclone allows us to specify the path to a public ssh
certificate file.

That works great for cases where we can specify key path, like local
envs.

If users are using rclone with [volsync](https://github.com/backube/volsync/tree/main/docs/usage/rclone)
there currently is a limitation that users can specify only the rclone config file.
With this change users can pass the public certificate in the same fashion
as they can with `key_file`.
This commit is contained in:
Dimitar Ivanov 2024-10-25 12:40:57 +03:00 committed by GitHub
parent 16baa24964
commit 40159e7a16
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194
2 changed files with 34 additions and 7 deletions

View File

@ -99,6 +99,11 @@ Only PEM encrypted key files (old OpenSSH format) are supported. Encrypted keys
in the new OpenSSH format can't be used.`, in the new OpenSSH format can't be used.`,
IsPassword: true, IsPassword: true,
Sensitive: true, Sensitive: true,
}, {
Name: "pubkey",
Help: `SSH public certificate for public certificate based authentication.
Set this if you have a signed certificate you want to use for authentication.
If specified will override pubkey_file.`,
}, { }, {
Name: "pubkey_file", Name: "pubkey_file",
Help: `Optional path to public key file. Help: `Optional path to public key file.
@ -511,6 +516,7 @@ type Options struct {
KeyPem string `config:"key_pem"` KeyPem string `config:"key_pem"`
KeyFile string `config:"key_file"` KeyFile string `config:"key_file"`
KeyFilePass string `config:"key_file_pass"` KeyFilePass string `config:"key_file_pass"`
PubKey string `config:"pubkey"`
PubKeyFile string `config:"pubkey_file"` PubKeyFile string `config:"pubkey_file"`
KnownHostsFile string `config:"known_hosts_file"` KnownHostsFile string `config:"known_hosts_file"`
KeyUseAgent bool `config:"key_use_agent"` KeyUseAgent bool `config:"key_use_agent"`
@ -997,13 +1003,21 @@ func NewFs(ctx context.Context, name, root string, m configmap.Mapper) (fs.Fs, e
} }
// If a public key has been specified then use that // If a public key has been specified then use that
if pubkeyFile != "" { if pubkeyFile != "" || opt.PubKey != "" {
certfile, err := os.ReadFile(pubkeyFile) pubKeyRaw := []byte(opt.PubKey)
if err != nil { // Use this error if public key is provided inline and is not a certificate
return nil, fmt.Errorf("unable to read cert file: %w", err) // if public key file is provided instead, use the err in the if block
notACertError := errors.New("public key provided is not a certificate: " + opt.PubKey)
if opt.PubKey == "" {
notACertError = errors.New("public key file is not a certificate file: " + pubkeyFile)
err := error(nil)
pubKeyRaw, err = os.ReadFile(pubkeyFile)
if err != nil {
return nil, fmt.Errorf("unable to read cert file: %w", err)
}
} }
pk, _, _, _, err := ssh.ParseAuthorizedKey(certfile) pk, _, _, _, err := ssh.ParseAuthorizedKey(pubKeyRaw)
if err != nil { if err != nil {
return nil, fmt.Errorf("unable to parse cert file: %w", err) return nil, fmt.Errorf("unable to parse cert file: %w", err)
} }
@ -1017,7 +1031,7 @@ func NewFs(ctx context.Context, name, root string, m configmap.Mapper) (fs.Fs, e
// knows everything it needs. // knows everything it needs.
cert, ok := pk.(*ssh.Certificate) cert, ok := pk.(*ssh.Certificate)
if !ok { if !ok {
return nil, errors.New("public key file is not a certificate file: " + pubkeyFile) return nil, notACertError
} }
pubsigner, err := ssh.NewCertSigner(cert, signer) pubsigner, err := ssh.NewCertSigner(cert, signer)
if err != nil { if err != nil {

View File

@ -156,7 +156,7 @@ and the public key built into it will be used during the authentication process.
If you have a certificate you may use it to sign your public key, creating a If you have a certificate you may use it to sign your public key, creating a
separate SSH user certificate that should be used instead of the plain public key separate SSH user certificate that should be used instead of the plain public key
extracted from the private key. Then you must provide the path to the extracted from the private key. Then you must provide the path to the
user certificate public key file in `pubkey_file`. user certificate public key file in `pubkey_file` or the content of the file in `pubkey`.
Note: This is not the traditional public key paired with your private key, Note: This is not the traditional public key paired with your private key,
typically saved as `/home/$USER/.ssh/id_rsa.pub`. Setting this path in typically saved as `/home/$USER/.ssh/id_rsa.pub`. Setting this path in
@ -494,6 +494,19 @@ Properties:
- Type: string - Type: string
- Required: false - Required: false
#### --sftp-pubkey
SSH public certificate for public certificate based authentication.
Set this if you have a signed certificate you want to use for authentication.
If specified will override pubkey_file.
Properties:
- Config: pubkey
- Env Var: RCLONE_SFTP_PUBKEY
- Type: string
- Required: false
#### --sftp-pubkey-file #### --sftp-pubkey-file
Optional path to public key file. Optional path to public key file.