- All Implemented Interfaces:
public class CheckNewSoftStrategy extends SshHostKeyVerificationStrategyThis strategy checks the key presented by the host with the one printed out in the instance console. The key should be printed with the format "algorithm key". Example: ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJbvbEIoY3tqKwkeRW/L1FnbCLLp8a1TwSOyZHKJqFFR If the key is not found because the console is blank, the connection is closed and wait until console prints something. If the key is not found because the instance doesn't print any key, the connection is trusted. If it's found and the key presented by the instance doesn't match the one printed in the console, the connection is closed and a warning is logged. If the key is found, it's stored to check future connections.
- M Ramon Leon
Nested Class Summary
Nested classes/interfaces inherited from class hudson.plugins.ec2.ssh.verifiers.SshHostKeyVerificationStrategy
Constructors Constructor Description
All Methods Instance Methods Concrete Methods Modifier and Type Method Description
verify(EC2Computer computer, HostKey hostKey, TaskListener listener)Check if the given key is valid for the host identifier.
Methods inherited from class hudson.plugins.ec2.ssh.verifiers.SshHostKeyVerificationStrategy
public boolean verify(EC2Computer computer, HostKey hostKey, TaskListener listener) throws IOExceptionDescription copied from class:
SshHostKeyVerificationStrategyCheck if the given key is valid for the host identifier.
- Specified by:
computer- the computer this connection is being initiated for
hostKey- the key that was transmitted by the remote host for the current connection. This is the key that should be checked to see if we trust it by the current verifier.
listener- the connection listener to write any output log to
- whether the provided HostKey is trusted and the current connection can therefore continue.