tailcfg, ssh/tailssh: optionally support SSH public keys in wire policy

And clean up logging.

Updates #3802

Change-Id: I756dc2d579a16757537142283d791f1d0319f4f0
Signed-off-by: Brad Fitzpatrick <bradfitz@tailscale.com>
This commit is contained in:
Brad Fitzpatrick
2022-04-01 12:57:12 -07:00
committed by Brad Fitzpatrick
parent df9ce972c7
commit da14e024a8
5 changed files with 246 additions and 66 deletions

View File

@@ -330,7 +330,7 @@ func (ss *sshSession) startWithPTY() (ptyFile *os.File, err error) {
}
k, ok := opcodeShortName[c]
if !ok {
ss.logf("unknown opcode: %d", c)
ss.vlogf("unknown opcode: %d", c)
continue
}
if _, ok := tios.CC[k]; ok {
@@ -341,7 +341,7 @@ func (ss *sshSession) startWithPTY() (ptyFile *os.File, err error) {
tios.Opts[k] = v > 0
continue
}
ss.logf("unsupported opcode: %v(%d)=%v", k, c, v)
ss.vlogf("unsupported opcode: %v(%d)=%v", k, c, v)
}
// Save PTY settings.