From 5fc4f7896fb7af94cd0eeb6370128c861193a6ea Mon Sep 17 00:00:00 2001 From: Steve Sakoman Date: Mon, 18 Oct 2021 13:17:29 -1000 Subject: target/ssh.py: add HostKeyAlgorithms option to test commands After recent updates to the autobuilder tumbleweed workers there are tests where the client and server fail to agree on a public key algorithm for host authentication: DEBUG: [Running]$ ssh -l root -o PubkeyAcceptedKeyTypes=+ssh-rsa -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -o LogLevel=VERBOSE 192.168.7.6 export PATH=/usr/sbin:/sbin:/usr/bin:/bin; uname -a DEBUG: time: 1634578090.4632802, endtime: 1634578390.4592378 DEBUG: Partial data from SSH call: Unable to negotiate with 192.168.7.6 port 22: no matching host key type found. Their offer: ssh-rsa This appears to be an issue with recent versions of shh. Add -o HostKeyAlgorithms=+ssh-rsa to command invocation as suggested at: http://www.openssh.com/legacy.html Signed-off-by: Steve Sakoman --- meta/lib/oeqa/core/target/ssh.py | 1 + 1 file changed, 1 insertion(+) diff --git a/meta/lib/oeqa/core/target/ssh.py b/meta/lib/oeqa/core/target/ssh.py index aefb576805..af4a67f266 100644 --- a/meta/lib/oeqa/core/target/ssh.py +++ b/meta/lib/oeqa/core/target/ssh.py @@ -34,6 +34,7 @@ class OESSHTarget(OETarget): self.timeout = timeout self.user = user ssh_options = [ + '-o', 'HostKeyAlgorithms=+ssh-rsa', '-o', 'UserKnownHostsFile=/dev/null', '-o', 'StrictHostKeyChecking=no', '-o', 'LogLevel=ERROR' -- cgit 1.2.3-korg