Page MenuHomePhabricator

Dirty the SSH key cache when usernames change
ClosedPublic

Authored by epriestley on Apr 14 2017, 12:09 PM.
Tags
None
Referenced Files
Unknown Object (File)
Thu, Apr 25, 1:33 AM
Unknown Object (File)
Thu, Apr 18, 5:13 AM
Unknown Object (File)
Thu, Apr 11, 9:08 AM
Unknown Object (File)
Mar 10 2024, 11:43 AM
Unknown Object (File)
Feb 9 2024, 5:56 PM
Unknown Object (File)
Jan 24 2024, 3:08 AM
Unknown Object (File)
Jan 9 2024, 7:49 AM
Unknown Object (File)
Dec 28 2023, 2:27 AM
Subscribers
None

Details

Summary

Fixes T12554. The SSH key cache contains usernames, but is not currently dirtied on username changes.

An alternative solution would be to use user PHIDs instead of usernames in the file, which would make this unnecessary, but that would make debugging a bit harder. For now, I think this small added complexity is worth the easier debugging, but we could look at this again if cache management gets harder in the future.

Test Plan
  • Added a key as ducksey, ran bin/ssh-auth, saw key immediately.
  • Renamed ducksey to ducker, ran bin/ssh-auth, saw username change immediately.
  • Added another key as ducker, ran bin/ssh-auth, saw key immediately.

Diff Detail

Repository
rP Phabricator
Lint
Lint Not Applicable
Unit
Tests Not Applicable