summaryrefslogtreecommitdiffstats
path: root/MEMORIAM
diff options
context:
space:
mode:
authorSteve Sakoman <steve@sakoman.com>2021-10-18 13:17:29 -1000
committerSteve Sakoman <steve@sakoman.com>2021-10-19 04:04:49 -1000
commit5fc4f7896fb7af94cd0eeb6370128c861193a6ea (patch)
treed38da1bc3c086152ea6a67ccca780527e454f044 /MEMORIAM
parent917f800368c6d452670d3ccf74057afae98013b0 (diff)
downloadopenembedded-core-contrib-5fc4f7896fb7af94cd0eeb6370128c861193a6ea.tar.gz
target/ssh.py: add HostKeyAlgorithms option to test commands
After recent updates to the autobuilder tumbleweed workers there are tests where the client and server fail to agree on a public key algorithm for host authentication: DEBUG: [Running]$ ssh -l root -o PubkeyAcceptedKeyTypes=+ssh-rsa -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -o LogLevel=VERBOSE 192.168.7.6 export PATH=/usr/sbin:/sbin:/usr/bin:/bin; uname -a DEBUG: time: 1634578090.4632802, endtime: 1634578390.4592378 DEBUG: Partial data from SSH call: Unable to negotiate with 192.168.7.6 port 22: no matching host key type found. Their offer: ssh-rsa This appears to be an issue with recent versions of shh. Add -o HostKeyAlgorithms=+ssh-rsa to command invocation as suggested at: http://www.openssh.com/legacy.html Signed-off-by: Steve Sakoman <steve@sakoman.com>
Diffstat (limited to 'MEMORIAM')
0 files changed, 0 insertions, 0 deletions