summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorytti <saku@ytti.fi>2016-01-22 13:42:01 +0200
committerytti <saku@ytti.fi>2016-01-22 13:42:01 +0200
commit3356902f975712e5b6352edb9849c98952fd1dea (patch)
tree2021a84692679ec3206ad0b7ec33f7a02f8ce3e7
parent9a2f0ceeac05c91cb14c01a0f4956fd83d6b7a4e (diff)
parentb466a30f45c9571d8f1871c1c2f4ab9255eaf0b6 (diff)
Merge pull request #280 from Shopify/master
option to use ssh proxy command
-rw-r--r--README.md15
-rw-r--r--spec/input/ssh_spec.rb37
2 files changed, 52 insertions, 0 deletions
diff --git a/README.md b/README.md
index ac358be..49ebe54 100644
--- a/README.md
+++ b/README.md
@@ -277,6 +277,21 @@ source:
enable: 4
```
+### SSH Proxy Command
+
+Oxidized can `ssh` through a proxy as well. To do so we just need to set `proxy` variable.
+
+```
+...
+map:
+ name: 0
+ model: 1
+vars_map:
+ enable: 2
+ proxy: 3
+...
+```
+
### Source: SQLite
One row per device, filtered by hostname.
diff --git a/spec/input/ssh_spec.rb b/spec/input/ssh_spec.rb
new file mode 100644
index 0000000..43c7d66
--- /dev/null
+++ b/spec/input/ssh_spec.rb
@@ -0,0 +1,37 @@
+require 'spec_helper'
+require 'oxidized/input/ssh'
+
+describe Oxidized::SSH do
+ before(:each) do
+ Oxidized.asetus = Asetus.new
+ Oxidized::Node.any_instance.stubs(:resolve_input)
+ Oxidized::Node.any_instance.stubs(:resolve_output)
+ @node = Oxidized::Node.new(name: 'example.com',
+ input: 'ssh',
+ output: 'git',
+ model: 'junos',
+ username: 'alma',
+ password: 'armud',
+ vars: {proxy: 'test.com'})
+
+ end
+
+ describe "#connect" do
+ it "should use proxy command when proxy host given" do
+ ssh = Oxidized::SSH.new
+
+ model = mock()
+ model.expects(:cfg).returns({'ssh' => []})
+ @node.expects(:model).returns(model)
+
+ proxy = mock()
+ Net::SSH::Proxy::Command.expects(:new).with("ssh test.com nc %h %p").returns(proxy)
+ Net::SSH.expects(:start).with('93.184.216.34', 'alma', {:port => 22, :password => 'armud', :timeout => Oxidized.config.timeout,
+ :paranoid => Oxidized.config.input.ssh.secure, :auth_methods => ['none', 'publickey', 'password', 'keyboard-interactive'],
+ :number_of_password_prompts => 0, :proxy => proxy})
+
+ ssh.instance_variable_set("@exec", true)
+ ssh.connect(@node)
+ end
+ end
+end