Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Various login/beiboot preparations/cleanups #20967

Merged
merged 8 commits into from
Sep 2, 2024

Commits on Sep 1, 2024

  1. protocol: sequential IDs for auth messages

    Having a random "cookie" here brings absolutely no security — it just
    makes it more difficult to test.  Use predictable sequence numbers
    instead.
    allisonkarlitskaya authored and martinpitt committed Sep 1, 2024
    Configuration menu
    Copy the full SHA
    fd3d8ea View commit details
    Browse the repository at this point in the history
  2. protocol: add request_authorization_object API

    This lets you get access to the underlying response object, in case you
    want to get extra fields out of it.
    allisonkarlitskaya authored and martinpitt committed Sep 1, 2024
    Configuration menu
    Copy the full SHA
    465ab3b View commit details
    Browse the repository at this point in the history
  3. beiboot: split flatpak and bastion code paths

    These have diverged enough that splitting them out from each other
    substantially improves readability.
    allisonkarlitskaya authored and martinpitt committed Sep 1, 2024
    Configuration menu
    Copy the full SHA
    5b7c441 View commit details
    Browse the repository at this point in the history

Commits on Sep 2, 2024

  1. beiboot: Fix error code for changed host key

    We don't use this anywhere right now, but soon will.
    martinpitt committed Sep 2, 2024
    Configuration menu
    Copy the full SHA
    0cfdeec View commit details
    Browse the repository at this point in the history
  2. static: Fix confusing key_key variable name

    The first component of the `host-key` protocol field is the host
    name/IP, which is used to index the known_hosts key database. It's
    confusing to call this `key_key`, as it's really not the key (nor
    fingerprint) material.
    martinpitt committed Sep 2, 2024
    Configuration menu
    Copy the full SHA
    674e142 View commit details
    Browse the repository at this point in the history
  3. selinux: Allow cockpit-ws to read systemd config files

    In Fedora 41, systemd ships a new file
    /etc/ssh/ssh_config.d/20-systemd-ssh-proxy.conf which is owned by
    systemd_conf_t. Allow cockpit-ws to read that, otherwise the whole `ssh`
    command fails with a SELinux denial as it can't read that config file.
    martinpitt committed Sep 2, 2024
    Configuration menu
    Copy the full SHA
    cc3fd60 View commit details
    Browse the repository at this point in the history
  4. login: Introduce state variable for "Connect to:" remote host

    This factorizes the current value and pins it down to a single query at
    the time when clicking the "Login" button. That avoids a small race
    condition where the user may change the field while the asynchronous
    login process is running.
    martinpitt committed Sep 2, 2024
    Configuration menu
    Copy the full SHA
    382847d View commit details
    Browse the repository at this point in the history
  5. Configuration menu
    Copy the full SHA
    971b727 View commit details
    Browse the repository at this point in the history