diff options
| author | Christian Poessinger <christian@poessinger.com> | 2022-02-28 14:28:55 +0100 | 
|---|---|---|
| committer | Christian Poessinger <christian@poessinger.com> | 2022-02-28 14:28:55 +0100 | 
| commit | 61fa1c95164e4222e79b078b1a796f41397e0ee3 (patch) | |
| tree | 332055c82559072cf6e3fea825264e5ebe7fb8df /src/migration-scripts/ssh | |
| parent | 17602c2d63aacc972d4e2f6f21aeeded243d4fa1 (diff) | |
| download | vyos-1x-61fa1c95164e4222e79b078b1a796f41397e0ee3.tar.gz vyos-1x-61fa1c95164e4222e79b078b1a796f41397e0ee3.zip | |
ssh: T4273: bugfix cipher and key-exchange multi nodes
After hardning the regex validator to be preceeded with ^ and ending with $
it was no longer possible to have a comma separated list as SSH ciphers. The
migrations cript is altered to migrate the previous comma separated list
to individual multi node entries - cipher and key-exchange always had been
multinodes - so this just re-arranges some values and does not break CLI
compatibility
Diffstat (limited to 'src/migration-scripts/ssh')
| -rwxr-xr-x | src/migration-scripts/ssh/1-to-2 | 50 | 
1 files changed, 38 insertions, 12 deletions
| diff --git a/src/migration-scripts/ssh/1-to-2 b/src/migration-scripts/ssh/1-to-2 index bc8815753..31c40df16 100755 --- a/src/migration-scripts/ssh/1-to-2 +++ b/src/migration-scripts/ssh/1-to-2 @@ -1,6 +1,6 @@  #!/usr/bin/env python3  # -# Copyright (C) 2020 VyOS maintainers and contributors +# Copyright (C) 2020-2022 VyOS maintainers and contributors  #  # This program is free software; you can redistribute it and/or modify  # it under the terms of the GNU General Public License version 2 or later as @@ -30,26 +30,52 @@ file_name = argv[1]  with open(file_name, 'r') as f:      config_file = f.read() -base = ['service', 'ssh', 'loglevel'] +base = ['service', 'ssh']  config = ConfigTree(config_file)  if not config.exists(base):      # Nothing to do      exit(0) -else: -    # red in configured loglevel and convert it to lower case -    tmp = config.return_value(base).lower() +path_loglevel = base + ['loglevel'] +if config.exists(path_loglevel): +    # red in configured loglevel and convert it to lower case +    tmp = config.return_value(path_loglevel).lower()      # VyOS 1.2 had no proper value validation on the CLI thus the      # user could use any arbitrary values - sanitize them      if tmp not in ['quiet', 'fatal', 'error', 'info', 'verbose']:          tmp = 'info' +    config.set(path_loglevel, value=tmp) + +# T4273: migrate ssh cipher list to multi node +path_ciphers = base + ['ciphers'] +if config.exists(path_ciphers): +    tmp = [] +    # get curtrent cipher list - comma delimited +    for cipher in config.return_values(path_ciphers): +        tmp.extend(cipher.split(',')) +    # delete old cipher suite representation +    config.delete(path_ciphers) -    config.set(base, value=tmp) +    for cipher in tmp: +        config.set(path_ciphers, value=cipher, replace=False) -    try: -        with open(file_name, 'w') as f: -            f.write(config.to_string()) -    except OSError as e: -        print("Failed to save the modified config: {}".format(e)) -        exit(1) +# T4273: migrate ssh key-exchange list to multi node +path_kex = base + ['key-exchange'] +if config.exists(path_kex): +    tmp = [] +    # get curtrent cipher list - comma delimited +    for kex in config.return_values(path_kex): +        tmp.extend(kex.split(',')) +    # delete old cipher suite representation +    config.delete(path_kex) + +    for kex in tmp: +        config.set(path_kex, value=kex, replace=False) + +try: +    with open(file_name, 'w') as f: +        f.write(config.to_string()) +except OSError as e: +    print("Failed to save the modified config: {}".format(e)) +    exit(1) | 
