From a09fd19e86794f7898a30e1c09e0c3055b651134 Mon Sep 17 00:00:00 2001 From: Ben Howard Date: Thu, 10 Apr 2014 14:04:44 -0600 Subject: Import patches-unapplied version 2.0.4-0ubuntu2 to ubuntu/trusty-proposed Imported using git-ubuntu import. Changelog parent: 75e067cb6f84d1834dea8aeab0722e9ffc651466 New changelog entries: * Fix for broken sshd configuration (LP: #1305418) - Change modification of sshd_config to address lack of newline at EOF --- debian/changelog | 7 +++++++ debian/patches/series | 1 + debian/patches/sshd_config_newline_fix.patch | 22 ++++++++++++++++++++++ 3 files changed, 30 insertions(+) create mode 100644 debian/patches/sshd_config_newline_fix.patch (limited to 'debian') diff --git a/debian/changelog b/debian/changelog index c42e5f4..dac7683 100644 --- a/debian/changelog +++ b/debian/changelog @@ -1,3 +1,10 @@ +walinuxagent (2.0.4-0ubuntu2) trusty; urgency=low + + * Fix for broken sshd configuration (LP: #1305418) + - Change modification of sshd_config to address lack of newline at EOF + + -- Ben Howard Thu, 10 Apr 2014 14:04:44 -0600 + walinuxagent (2.0.4-0ubuntu1) trusty; urgency=medium * Update to latest upstream version 2.0.4 (LP: #1304023). diff --git a/debian/patches/series b/debian/patches/series index 5879858..49ac87a 100644 --- a/debian/patches/series +++ b/debian/patches/series @@ -2,3 +2,4 @@ disable-udev-rules.patch disable_provisioning.patch fixup_setup_file.patch cloud-init-default-cfg.patch +sshd_config_newline_fix.patch diff --git a/debian/patches/sshd_config_newline_fix.patch b/debian/patches/sshd_config_newline_fix.patch new file mode 100644 index 0000000..a599c81 --- /dev/null +++ b/debian/patches/sshd_config_newline_fix.patch @@ -0,0 +1,22 @@ +Description: Fix for broken sshd configuration (LP: #1305418) + Change modification of sshd_config to address lack of newline at EOF. + Lack of newline resulted in appended config line on same line + as existing configuration option, breaking sshd_config. + +Author: Robert C Jennings +Bug-Ubuntu: https://bugs.launchpad.net/bugs/1305418 +--- + waagent | 2 +- + 1 file changed, 1 insertion(+), 1 deletion(-) + +--- a/waagent ++++ b/waagent +@@ -3353,7 +3353,7 @@ + # Disable RFC 4252 and RFC 4256 authentication schemes. + ReplaceFileContentsAtomic(filepath, "\n".join(filter(lambda a: not + (a.startswith("PasswordAuthentication") or a.startswith("ChallengeResponseAuthentication")), +- GetFileContents(filepath).split('\n'))) + "PasswordAuthentication no\nChallengeResponseAuthentication no\n") ++ GetFileContents(filepath).split('\n'))) + "\nPasswordAuthentication no\nChallengeResponseAuthentication no\n") + Log("Disabled SSH password-based authentication methods.") + if self.AdminPassword != None: + MyDistro.changePass('root',self.AdminPassword) -- cgit v1.2.3