Execute ProxyCommand in a shell#135
Open
joshheinrichs-shopify wants to merge 1 commit intojeanp413:masterfrom
Open
Execute ProxyCommand in a shell#135joshheinrichs-shopify wants to merge 1 commit intojeanp413:masterfrom
joshheinrichs-shopify wants to merge 1 commit intojeanp413:masterfrom
Conversation
1af89d0 to
8222037
Compare
The ProxyCommand in my ssh config looks something like
ProxyCommand foo --bar\=baz
The backslash ahead of = is definitely weird, but the ssh config gets
generated by a Ruby script, and that's how Ruby's Shellwords.escape
escapes tokens. This config works with ssh, but not open-remote-ssh
because the backslash ends up in the argument passed to foo.
According to man ssh_config, "[ProxyCommand] is executed using the
user's shell 'exec' directive to avoid a lingering shell process," so I
guess ssh just substitutes the tokens in the string and executes the
command in a shell, and the shell processes the backslash.
We can see that ssh doesn't try escaping tokens by running
$ ssh -o ProxyCommand='printf "%%q\n" %h 1>&2' "foo bar"
foo
bar
Despite "foo bar" being one token, it gets passsed to printf as two
arguments, so I guess if we want to match ssh's behaviour we should do
the same? I'm not sure what's up with Windows, so I left it alone for
now.
8222037 to
8b85b37
Compare
Author
|
Ideally the ssh config parsing library wouldn't attempt to split ProxyCommand since it strips quotes that could theoretically matter for environment variables. If we changed that in your fork (maybe as a parser option so we can contribute it back?), it looks like we might be able to have the same handling across windows and unix? |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
The ProxyCommand in my ssh config looks something like
The backslash ahead of = is definitely weird, but the ssh config gets generated by a Ruby script, and that's how Ruby's Shellwords.escape escapes tokens. This config works with ssh, but not open-remote-ssh because the backslash ends up in the argument passed to foo.
According to man ssh_config, "[ProxyCommand] is executed using the user's shell 'exec' directive to avoid a lingering shell process," so I guess ssh just substitutes the tokens in the string and executes the command in a shell, and the shell processes the backslash.
We can see that ssh doesn't try escaping tokens by running
Despite "foo bar" being one token, it gets passsed to printf as two arguments, so I guess if we want to match ssh's behaviour we should do the same? I'm not sure what's up with Windows, so I left it alone for now.