mirror of
https://github.com/PowerShell/openssh-portable.git
synced 2025-08-24 11:18:41 +02:00
- Updated code to dynamic load Lsa functions until RS5 SDK includes them - Add conpty support in openssh - Fixed Wierd characters (?25l) are seen, when logged in from ssh client - Backspace doesn't work in powershell window - Changes to support ssh-shellhost as an alternative shell - Added support to have ssh-shellhost work as a standby shell (ssh-shellhost -c "cmdline") simply executes cmdline via CreateProcess - Added E2E test cases and fixed unittests broken from prior changes - Added PTY launch interface that supports both conpty and ssh-shellhost pty. - Implemented PTY control channel in ssh-shellhost that supports Window resize events. - Fixed regression with starting a PTY session with an explicit command - modified ssh-shellhost pty argument to ---pty to remove ambiguity in cases when both -p and -c are present in commandline. Ex. ssh-shellhost.exe -c "myprogram -p -c argument"
41 lines
1.3 KiB
Bash
41 lines
1.3 KiB
Bash
# $OpenBSD: forcecommand.sh,v 1.4 2017/04/30 23:34:55 djm Exp $
|
|
# Placed in the Public Domain.
|
|
|
|
tid="forced command"
|
|
|
|
cp $OBJ/sshd_proxy $OBJ/sshd_proxy_bak
|
|
|
|
cp /dev/null $OBJ/authorized_keys_$USER
|
|
for t in ${SSH_KEYTYPES}; do
|
|
printf 'command="true" ' >>$OBJ/authorized_keys_$USER
|
|
cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
|
done
|
|
|
|
trace "forced command in key option"
|
|
${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command in key"
|
|
|
|
cp /dev/null $OBJ/authorized_keys_$USER
|
|
for t in ${SSH_KEYTYPES}; do
|
|
printf 'command="false" ' >> $OBJ/authorized_keys_$USER
|
|
cat $OBJ/$t.pub >> $OBJ/authorized_keys_$USER
|
|
done
|
|
|
|
cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
|
|
echo "ForceCommand true" >> $OBJ/sshd_proxy
|
|
|
|
trace "forced command in sshd_config overrides key option"
|
|
${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command in key"
|
|
|
|
cp $OBJ/sshd_proxy_bak $OBJ/sshd_proxy
|
|
echo "ForceCommand false" >> $OBJ/sshd_proxy
|
|
if [ "$os" == "windows" ]; then
|
|
# If User is domainuser then it will be in "domain/user" so convert it to "domain\user"
|
|
echo "Match user ${USER//\//\\}" >>$OBJ/sshd_proxy
|
|
else
|
|
echo "Match User $USER" >>$OBJ/sshd_proxy
|
|
fi
|
|
echo " ForceCommand true" >> $OBJ/sshd_proxy
|
|
|
|
trace "forced command with match"
|
|
${SSH} -F $OBJ/ssh_proxy somehost false || fail "forced command in key"
|