/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
*/
package org.apache.brooklyn.location.jclouds;
import static org.testng.Assert.assertEquals;
import static org.testng.Assert.assertNotNull;
import static org.testng.Assert.assertNull;
import java.io.File;
import java.util.Map;
import org.apache.brooklyn.api.location.LocationSpec;
import org.apache.brooklyn.location.ssh.SshMachineLocation;
import org.apache.brooklyn.util.collections.MutableMap;
import org.apache.brooklyn.util.os.Os;
import org.apache.brooklyn.util.stream.Streams;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.testng.Assert;
import org.testng.annotations.Test;
import com.google.common.collect.ImmutableList;
import com.google.common.collect.ImmutableMap;
/**
* Tests different login options for ssh keys, passwords, etc.
*/
public class JcloudsLoginLiveTest extends AbstractJcloudsLiveTest {
// TODO Rackspace failed - possibly image no longer exists?
// Was using:
// Image: {id=LON/29fe3e2b-f119-4715-927b-763e99ebe23e, providerId=29fe3e2b-f119-4715-927b-763e99ebe23e, name=Debian 6.06 (Squeeze), location={scope=ZONE, id=LON, description=LON, parent=rackspace-cloudservers-uk, iso3166Codes=[GB-SLG]}, os={family=debian, name=Debian 6.06 (Squeeze), version=6.0, description=Debian 6.06 (Squeeze), is64Bit=true}, description=Debian 6.06 (Squeeze), status=AVAILABLE, loginUser=root, userMetadata={os_distro=debian, com.rackspace__1__visible_core=1, com.rackspace__1__build_rackconnect=1, com.rackspace__1__options=0, image_type=base, cache_in_nova=True, com.rackspace__1__source=kickstart, org.openstack__1__os_distro=org.debian, com.rackspace__1__release_build_date=2013-08-06_13-05-36, auto_disk_config=True, com.rackspace__1__release_version=4, os_type=linux, com.rackspace__1__visible_rackconnect=1, com.rackspace__1__release_id=300, com.rackspace__1__visible_managed=0, com.rackspace__1__build_core=1, org.openstack__1__os_version=6.06, org.openstack__1__architecture=x64, com.rackspace__1__build_managed=0}}
// public static final String RACKSPACE_DEBIAN_IMAGE_NAME_REGEX = "Debian 6";
// TODO GCE (in GCE_USCENTRAL_REGION_NAME) fails. We get blocked by the VM! e.g. /var/log/auth.log shows:
// Nov 3 14:57:56 ubuntu sshd[1693]: Did not receive identification string from 31.53.199.228
// Nov 3 14:57:56 ubuntu sshguard[971]: Blocking 31.53.199.228:4 for >630secs: 40 danger in 4 attacks over 435 seconds (all: 40d in 1 abuses over 435s).
private static final Logger LOG = LoggerFactory.getLogger(JcloudsLoginLiveTest.class);
public static final String AWS_EC2_REGION_NAME = AWS_EC2_USEAST_REGION_NAME;
public static final String AWS_EC2_LOCATION_SPEC = "jclouds:" + AWS_EC2_PROVIDER + (AWS_EC2_REGION_NAME == null ? "" : ":" + AWS_EC2_REGION_NAME);
// Image: {id=us-east-1/ami-7d7bfc14, providerId=ami-7d7bfc14, name=RightImage_CentOS_6.3_x64_v5.8.8.5, location={scope=REGION, id=us-east-1, description=us-east-1, parent=aws-ec2, iso3166Codes=[US-VA]}, os={family=centos, arch=paravirtual, version=6.0, description=rightscale-us-east/RightImage_CentOS_6.3_x64_v5.8.8.5.manifest.xml, is64Bit=true}, description=rightscale-us-east/RightImage_CentOS_6.3_x64_v5.8.8.5.manifest.xml, version=5.8.8.5, status=AVAILABLE[available], loginUser=root, userMetadata={owner=411009282317, rootDeviceType=instance-store, virtualizationType=paravirtual, hypervisor=xen}}
public static final String AWS_EC2_CENTOS_IMAGE_ID = "us-east-1/ami-7d7bfc14";
// Image: {id=us-east-1/ami-d0f89fb9, providerId=ami-d0f89fb9, name=ubuntu/images/ebs/ubuntu-precise-12.04-amd64-server-20130411.1, location={scope=REGION, id=us-east-1, description=us-east-1, parent=aws-ec2, iso3166Codes=[US-VA]}, os={family=ubuntu, arch=paravirtual, version=12.04, description=099720109477/ubuntu/images/ebs/ubuntu-precise-12.04-amd64-server-20130411.1, is64Bit=true}, description=099720109477/ubuntu/images/ebs/ubuntu-precise-12.04-amd64-server-20130411.1, version=20130411.1, status=AVAILABLE[available], loginUser=ubuntu, userMetadata={owner=099720109477, rootDeviceType=ebs, virtualizationType=paravirtual, hypervisor=xen}}
public static final String AWS_EC2_UBUNTU_IMAGE_ID = "us-east-1/ami-d0f89fb9";
// Image: {id=us-east-1/ami-5e008437, providerId=ami-5e008437, name=RightImage_Ubuntu_10.04_x64_v5.8.8.3, location={scope=REGION, id=us-east-1, description=us-east-1, parent=aws-ec2, iso3166Codes=[US-VA]}, os={family=ubuntu, arch=paravirtual, version=10.04, description=rightscale-us-east/RightImage_Ubuntu_10.04_x64_v5.8.8.3.manifest.xml, is64Bit=true}, description=rightscale-us-east/RightImage_Ubuntu_10.04_x64_v5.8.8.3.manifest.xml, version=5.8.8.3, status=AVAILABLE[available], loginUser=root, userMetadata={owner=411009282317, rootDeviceType=instance-store, virtualizationType=paravirtual, hypervisor=xen}}
// Uses "root" as loginUser
public static final String AWS_EC2_UBUNTU_10_IMAGE_ID = "us-east-1/ami-5e008437";
protected JcloudsSshMachineLocation machine;
private File privateRsaFile = new File(Os.tidyPath("~/.ssh/id_rsa"));
private File privateDsaFile = new File(Os.tidyPath("~/.ssh/id_dsa"));
private File privateRsaFileTmp = new File(privateRsaFile.getAbsoluteFile()+".tmp");
private File privateDsaFileTmp = new File(privateDsaFile.getAbsoluteFile()+".tmp");
private File publicRsaFile = new File(Os.tidyPath("~/.ssh/id_rsa.pub"));
private File publicDsaFile = new File(Os.tidyPath("~/.ssh/id_dsa.pub"));
private File publicRsaFileTmp = new File(publicRsaFile.getAbsoluteFile()+".tmp");
private File publicDsaFileTmp = new File(publicDsaFile.getAbsoluteFile()+".tmp");
private boolean privateRsaFileMoved;
private boolean privateDsaFileMoved;
private boolean publicRsaFileMoved;
private boolean publicDsaFileMoved;
@Test(groups = {"Live"})
@SuppressWarnings("deprecation")
protected void testAwsEc2SpecifyingJustPrivateSshKeyInDeprecatedForm() throws Exception {
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "myname");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.LEGACY_PRIVATE_KEY_FILE.getName(), "~/.ssh/id_rsa");
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine();
assertSshable(machine);
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PRIVATE_KEY_FILE, Os.tidyPath("~/.ssh/id_rsa"))
.build());
}
@Test(groups = {"Live"})
@SuppressWarnings("deprecation")
protected void testAwsEc2SpecifyingPrivateAndPublicSshKeyInDeprecatedForm() throws Exception {
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "myname");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.LEGACY_PRIVATE_KEY_FILE.getName(), "~/.ssh/id_rsa");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.LEGACY_PUBLIC_KEY_FILE.getName(), "~/.ssh/id_rsa.pub");
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine();
assertSshable(machine);
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PRIVATE_KEY_FILE, Os.tidyPath("~/.ssh/id_rsa"))
.build());
}
// Uses default key files
@Test(groups = {"Live"})
protected void testAwsEc2SpecifyingNoKeyFiles() throws Exception {
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "myname");
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine();
assertSshable(machine);
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PRIVATE_KEY_FILE, Os.tidyPath("~/.ssh/id_rsa"))
.build());
}
@Test(groups = {"Live"})
public void testSpecifyingPasswordAndNoDefaultKeyFilesExist() throws Exception {
try {
moveSshKeyFiles();
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "myname");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PASSWORD.getName(), "mypassword");
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine();
assertSshable(machine);
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PASSWORD, "mypassword")
.build());
} finally {
restoreSshKeyFiles();
}
}
// Generates and uses a random password
@Test(groups = {"Live"})
protected void testSpecifyingNothingAndNoDefaultKeyFilesExist() throws Exception {
try {
moveSshKeyFiles();
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "myname");
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine();
assertSshable(machine);
assertEquals(machine.getUser(), "myname");
} finally {
restoreSshKeyFiles();
}
}
@Test(groups = {"Live"})
public void testSpecifyingPasswordAndSshKeysPrefersKeysAndDisablesPassword() throws Exception {
runSpecifyingPasswordAndSshKeysPrefersKeys(false);
}
@Test(groups = {"Live"})
public void testSpecifyingPasswordAndSshKeysPrefersKeysAndAllowsPassword() throws Exception {
runSpecifyingPasswordAndSshKeysPrefersKeys(true);
}
protected void runSpecifyingPasswordAndSshKeysPrefersKeys(boolean leavePasswordSsh) throws Exception {
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "myname");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PRIVATE_KEY_FILE.getName(), "~/.ssh/id_rsa");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PUBLIC_KEY_FILE.getName(), "~/.ssh/id_rsa.pub");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PASSWORD.getName(), "mypassword");
if (leavePasswordSsh) {
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.DISABLE_ROOT_AND_PASSWORD_SSH.getName(), false);
}
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine();
assertSshable(machine);
assertNull(machine.config().get(SshMachineLocation.PASSWORD));
assertNotNull(machine.config().get(SshMachineLocation.PRIVATE_KEY_DATA));
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PRIVATE_KEY_FILE, Os.tidyPath("~/.ssh/id_rsa"))
.build());
if (leavePasswordSsh) {
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PASSWORD, "mypassword")
.build());
} else {
assertNotSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PASSWORD, "mypassword")
.build());
}
}
@Test(groups = {"Live"})
protected void testSpecifyingPasswordIgnoresDefaultSshKeys() throws Exception {
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "myname");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PASSWORD.getName(), "mypassword");
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine();
assertSshable(machine);
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PASSWORD, "mypassword")
.build());
assertNotSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PRIVATE_KEY_FILE, Os.tidyPath("~/.ssh/id_rsa"))
.build());
}
@Test(groups = {"Live"})
protected void testSpecifyingPasswordIgnoresDefaultSshKeysSkippingJcloudsInit() throws Exception {
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "myname");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PASSWORD.getName(), "mypassword");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USE_JCLOUDS_SSH_INIT.getName(), "false");
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine();
assertSshable(machine);
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PASSWORD, "mypassword")
.build());
assertNotSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PRIVATE_KEY_FILE, Os.tidyPath("~/.ssh/id_rsa"))
.build());
}
@Test(groups = {"Live"})
protected void testSpecifyingPasswordWithPublicKeyAllowsKeyAccess() throws Exception {
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "myname");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PASSWORD.getName(), "mypassword");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PUBLIC_KEY_FILE.getName(), "~/.ssh/id_rsa.pub");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.DISABLE_ROOT_AND_PASSWORD_SSH.getName(), false);
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine();
assertSshable(machine);
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PRIVATE_KEY_FILE, Os.tidyPath("~/.ssh/id_rsa"))
.build());
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "myname")
.put(SshMachineLocation.PASSWORD, "mypassword")
.build());
}
// user "root" matches the loginUser=root
@Test(groups = {"Live"})
protected void testSpecifyingPasswordWhenNoDefaultKeyFilesExistWithRootUser() throws Exception {
try {
moveSshKeyFiles();
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "root");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PASSWORD.getName(), "mypassword");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.DISABLE_ROOT_AND_PASSWORD_SSH.getName(), false);
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine();
assertSshable(machine);
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "root")
.put(SshMachineLocation.PASSWORD, "mypassword")
.build());
} finally {
restoreSshKeyFiles();
}
}
@Test(groups = {"Live"})
protected void testAwsEc2SpecifyingRootUser() throws Exception {
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "root");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PRIVATE_KEY_FILE.getName(), "~/.ssh/id_rsa");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PUBLIC_KEY_FILE.getName(), "~/.ssh/id_rsa.pub");
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine(ImmutableMap.<String,Object>of("imageId", AWS_EC2_UBUNTU_10_IMAGE_ID));
assertSshable(machine);
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "root")
.put(SshMachineLocation.PRIVATE_KEY_FILE, Os.tidyPath("~/.ssh/id_rsa"))
.build());
}
@Test(groups = {"Live"})
protected void testAwsEc2WhenBlankUserSoUsesRootLoginUser() throws Exception {
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PRIVATE_KEY_FILE.getName(), "~/.ssh/id_rsa");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PUBLIC_KEY_FILE.getName(), "~/.ssh/id_rsa.pub");
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine(ImmutableMap.<String,Object>of("imageId", AWS_EC2_UBUNTU_10_IMAGE_ID));
assertSshable(machine);
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "root")
.put(SshMachineLocation.PRIVATE_KEY_FILE, Os.tidyPath("~/.ssh/id_rsa"))
.build());
}
// In JcloudsLocation.NON_ADDABLE_USERS, "ec2-user" was treated special and was not added!
// That was very bad for if someone is running brooklyn on a new AWS VM, and just installs brooklyn+runs as the default ec2-user.
@Test(groups = {"Live"})
protected void testAwsEc2SpecifyingSpecialUser() throws Exception {
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.USER.getName(), "ec2-user");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PRIVATE_KEY_FILE.getName(), "~/.ssh/id_rsa");
brooklynProperties.put(BROOKLYN_PROPERTIES_PREFIX+JcloudsLocationConfig.PUBLIC_KEY_FILE.getName(), "~/.ssh/id_rsa.pub");
jcloudsLocation = (JcloudsLocation) managementContext.getLocationRegistry().resolve(AWS_EC2_LOCATION_SPEC);
machine = createEc2Machine(ImmutableMap.<String,Object>of("imageId", AWS_EC2_UBUNTU_10_IMAGE_ID));
assertSshable(machine);
assertSshable(ImmutableMap.builder()
.put("address", machine.getAddress())
.put("user", "ec2-user")
.put(SshMachineLocation.PRIVATE_KEY_FILE, Os.tidyPath("~/.ssh/id_rsa"))
.build());
}
@Override
protected void releaseMachine(JcloudsSshMachineLocation machine) {
jcloudsLocation.release(machine);
}
private JcloudsSshMachineLocation createEc2Machine() throws Exception {
return createEc2Machine(ImmutableMap.<String, Object>of());
}
private JcloudsSshMachineLocation createEc2Machine(Map<String,? extends Object> conf) throws Exception {
return obtainMachine(MutableMap.<String,Object>builder()
.putAll(conf)
.putIfAbsent("imageId", AWS_EC2_CENTOS_IMAGE_ID)
.putIfAbsent("hardwareId", AWS_EC2_MEDIUM_HARDWARE_ID)
.putIfAbsent("inboundPorts", ImmutableList.of(22))
.build());
}
protected void assertSshable(Map<?,?> machineConfig) {
SshMachineLocation machineWithThatConfig = managementContext.getLocationManager().createLocation(LocationSpec.create(SshMachineLocation.class)
.configure(machineConfig));
try {
assertSshable(machineWithThatConfig);
} finally {
Streams.closeQuietly(machineWithThatConfig);
}
}
protected void assertNotSshable(Map<?,?> machineConfig) {
try {
assertSshable(machineConfig);
Assert.fail("ssh should not have succeeded "+machineConfig);
} catch (Exception e) {
// expected
LOG.debug("Exception as expected when testing sshable "+machineConfig);
}
}
private void moveSshKeyFiles() throws Exception {
privateRsaFileMoved = false;
privateDsaFileMoved = false;
publicRsaFileMoved = false;
publicDsaFileMoved = false;
if (privateRsaFile.exists()) {
LOG.info("Moving {} to {}", privateRsaFile, privateRsaFileTmp);
Runtime.getRuntime().exec("mv "+privateRsaFile.getAbsolutePath()+" "+privateRsaFileTmp.getAbsolutePath());
privateRsaFileMoved = true;
}
if (privateDsaFile.exists()) {
LOG.info("Moving {} to {}", privateDsaFile, privateDsaFileTmp);
Runtime.getRuntime().exec("mv "+privateDsaFile.getAbsolutePath()+" "+privateDsaFileTmp.getAbsolutePath());
privateDsaFileMoved = true;
}
if (publicRsaFile.exists()) {
LOG.info("Moving {} to {}", publicRsaFile, publicRsaFileTmp);
Runtime.getRuntime().exec("mv "+publicRsaFile.getAbsolutePath()+" "+publicRsaFileTmp.getAbsolutePath());
publicRsaFileMoved = true;
}
if (publicDsaFile.exists()) {
LOG.info("Moving {} to {}", publicDsaFile, publicDsaFileTmp);
Runtime.getRuntime().exec("mv "+publicDsaFile.getAbsolutePath()+" "+publicDsaFileTmp.getAbsolutePath());
publicDsaFileMoved = true;
}
}
private void restoreSshKeyFiles() throws Exception {
if (privateRsaFileMoved) {
LOG.info("Restoring {} form {}", privateRsaFile, privateRsaFileTmp);
Runtime.getRuntime().exec("mv "+privateRsaFileTmp.getAbsolutePath()+" "+privateRsaFile.getAbsolutePath());
privateRsaFileMoved = false;
}
if (privateDsaFileMoved) {
LOG.info("Restoring {} form {}", privateDsaFile, privateDsaFileTmp);
Runtime.getRuntime().exec("mv "+privateDsaFileTmp.getAbsolutePath()+" "+privateDsaFile.getAbsolutePath());
privateDsaFileMoved = false;
}
if (publicRsaFileMoved) {
LOG.info("Restoring {} form {}", publicRsaFile, publicRsaFileTmp);
Runtime.getRuntime().exec("mv "+publicRsaFileTmp.getAbsolutePath()+" "+publicRsaFile.getAbsolutePath());
publicRsaFileMoved = false;
}
if (publicDsaFileMoved) {
LOG.info("Restoring {} form {}", publicDsaFile, publicDsaFileTmp);
Runtime.getRuntime().exec("mv "+publicDsaFileTmp.getAbsolutePath()+" "+publicDsaFile.getAbsolutePath());
publicDsaFileMoved = false;
}
}
}