Page MenuHomePhabricator

Dirty the SSH key cache when usernames change
ClosedPublic

Authored by epriestley on Apr 14 2017, 12:09 PM.
Tags
None
Referenced Files
F19513957: D17687.id.diff
Tue, Jan 13, 8:08 PM
F19503647: D17687.id42541.diff
Fri, Jan 9, 12:57 AM
F19030637: D17687.id.diff
Nov 24 2025, 10:02 PM
F19030213: D17687.id.diff
Nov 24 2025, 8:25 PM
F18965269: D17687.id42538.diff
Nov 14 2025, 4:08 PM
F18878169: D17687.diff
Nov 6 2025, 3:28 PM
F18815294: D17687.id.diff
Oct 21 2025, 1:38 AM
F18809692: D17687.diff
Oct 19 2025, 4:12 PM
Subscribers
None

Details

Summary

Fixes T12554. The SSH key cache contains usernames, but is not currently dirtied on username changes.

An alternative solution would be to use user PHIDs instead of usernames in the file, which would make this unnecessary, but that would make debugging a bit harder. For now, I think this small added complexity is worth the easier debugging, but we could look at this again if cache management gets harder in the future.

Test Plan
  • Added a key as ducksey, ran bin/ssh-auth, saw key immediately.
  • Renamed ducksey to ducker, ran bin/ssh-auth, saw username change immediately.
  • Added another key as ducker, ran bin/ssh-auth, saw key immediately.

Diff Detail

Repository
rP Phabricator
Lint
Lint Not Applicable
Unit
Tests Not Applicable