func sshConfig(state multistep.StateBag) (*ssh.ClientConfig, error) { config := state.Get("config").(config) clientConfig := ssh.ClientConfig{User: config.SSHUsername} if config.OsSnapshot == "" && config.IpxeUrl == "" { // default case where vultr generated the password password := state.Get("default_password").(string) clientConfig.Auth = []ssh.AuthMethod{ssh.Password(password)} } else if config.SSHPassword != "" { // special case but we got a password clientConfig.Auth = []ssh.AuthMethod{ssh.Password(config.SSHPassword)} } else { // special case and we got a key signer, err := ssh.ParsePrivateKey([]byte(config.SSHPrivateKey)) if err != nil { return nil, fmt.Errorf("Error setting up SSH config: %s", err) } clientConfig.Auth = []ssh.AuthMethod{ssh.PublicKeys(signer)} } return &clientConfig, nil }
func TestAuth(t *testing.T) { a, b, err := netPipe() if err != nil { t.Fatalf("netPipe: %v", err) } defer a.Close() defer b.Close() agent, _, cleanup := startAgent(t) defer cleanup() if err := agent.Add(testPrivateKeys["rsa"], nil, "comment"); err != nil { t.Errorf("Add: %v", err) } serverConf := ssh.ServerConfig{} serverConf.AddHostKey(testSigners["rsa"]) serverConf.PublicKeyCallback = func(c ssh.ConnMetadata, key ssh.PublicKey) (*ssh.Permissions, error) { if bytes.Equal(key.Marshal(), testPublicKeys["rsa"].Marshal()) { return nil, nil } return nil, errors.New("pubkey rejected") } go func() { conn, _, _, err := ssh.NewServerConn(a, &serverConf) if err != nil { t.Fatalf("Server: %v", err) } conn.Close() }() conf := ssh.ClientConfig{} conf.Auth = append(conf.Auth, ssh.PublicKeysCallback(agent.Signers)) conn, _, _, err := ssh.NewClientConn(b, "", &conf) if err != nil { t.Fatalf("NewClientConn: %v", err) } conn.Close() }