-
Notifications
You must be signed in to change notification settings - Fork 821
Description
Hi,
The changes introduced in c35b808 breaks the ability to ignore the client host key check. In our case, we're using ssh.InsecureIgnoreHostKey()
for integration testing where we don't care about validating the host key. The changes made in the commit deprecate the HostKeyCallbackHelper
interface and don't provide any workaround.
Implementing a ssh.AuthMethod
with a custom HostKeyCallback
won't work either since the associated ssh.ClientConfig
will be overwritten by ssh.SetConfigHostKeyFields()
when establishing the connection.
Before these changes were introduced, you could pass a HostKeyCallbackHelper
to any ssh AuthMethod and it will set the HostKeyCallback
function to be used to validate the host key.
pks, _ := ssht.NewPublicKeysFromFile("git", filepath, "")
pks.HostKeyCallbackHelper = ssht.HostKeyCallbackHelper{
HostKeyCallback: ssh.InsecureIgnoreHostKey(),
}
err = r.Push(&git.PushOptions{
RemoteName: "origin",
Auth: pks,
})
I tried wrapping the PublicKeys
AuthMethod and modifying the HostKeyCallback
, but it gets overwritten before the connection happens.
type pkAuthMethod struct {
*ssht.PublicKeys
}
func (p *pkAuthMethod) ClientConfig() (*ssh.ClientConfig, error) {
cc, err := p.PublicKeys.ClientConfig()
if err != nil {
return nil, err
}
cc.HostKeyCallback = ssh.InsecureIgnoreHostKey()
return cc, nil
}
func main() {
pks, _ := gssh.NewPublicKeysFromFile("git", pkPath, "")
auth := &pkAuthMethod{pks}
err = r.Push(&git.PushOptions{
RemoteName: "origin",
Auth: auth,
})
}