[
https://issues.apache.org/jira/browse/KARAF-32?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=13196142#comment-13196142
]
Wolfgang Glas commented on KARAF-32:
------------------------------------
Guillaume,
ThX for your feedback.
Could you please describe the mentioned limitation in more detail.
These are the error messages I received in my log file:
************************
org.osgi.service.blueprint.container.ComponentDefinitionException: Error
setting property: PropertyDescriptor <name: userAuthFactories, getter: public
java.util.List org.apache.sshd.SshServer.getUserAuthFactories(), setter:
[public void org.apache.sshd.SshServer.setUserAuthFactories(java.util.List)]
Caused by: java.lang.Exception: Unable to convert from
[org.apache.sshd.server.auth.UserAuthPublicKey$Factory@78bdf2a] to
java.util.List<org.apache.sshd.common.NamedFactory<org.apache.sshd.server.UserAuth>>(error
converting collection entry)
Caused by: java.lang.Exception: Unable to convert value
org.apache.sshd.server.auth.UserAuthPublicKey$Factory@78bdf2a to type
org.apache.sshd.common.NamedFactory<org.apache.sshd.server.UserAuth>
************************
AFAICS, the inner Factory class of UserAuthPublicKey implements
NamedFactory<UserAuth>, so there should be no problem with isAssignableFrom()
and friends...
Is the limitation due to the fact, that the generic is doubly nested in this
case?
Or are the other limitations?
TIA, Wolfgang
> Support ssh public key authentication and agent forwarding
> ----------------------------------------------------------
>
> Key: KARAF-32
> URL: https://issues.apache.org/jira/browse/KARAF-32
> Project: Karaf
> Issue Type: New Feature
> Reporter: Guillaume Nodet
> Assignee: Jean-Baptiste Onofré
> Attachments:
> org.apache.karaf.shell.ssh-2.2.5-pubkey-userauthfactories.patch
>
>
> The karaf agent needs to be enhanced to be able to set up an ssh agent and
> use a public/private key.
> The ssh server need to be configured with a public key authentication that
> could delegate to the KeystoreInstance using certificates.
> The goal would be support the following use cases:
> * once a user is logged into a given karaf instance, he can connect to any
> other instance (provided that the public key is supported)
> * the stop script could use the ssh agent so that you don't need to launch
> it with a password on the command line
> A set of commands to administer the keystores might be interesting (maybe a
> console plugin too, but we need to check with what Geronimo provides in this
> area).
> Btw, I wonder if Apache Shiro would help in any way for all the security
> stuff.
>
--
This message is automatically generated by JIRA.
If you think it was sent incorrectly, please contact your JIRA administrators:
https://issues.apache.org/jira/secure/ContactAdministrators!default.jspa
For more information on JIRA, see: http://www.atlassian.com/software/jira