machineconfig 8.14__py3-none-any.whl → 8.50__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of machineconfig might be problematic. Click here for more details.
- machineconfig/cluster/remote/run_cluster.py +1 -1
- machineconfig/cluster/remote/run_remote.py +1 -1
- machineconfig/cluster/sessions_managers/utils/maker.py +10 -8
- machineconfig/cluster/sessions_managers/wt_local.py +1 -1
- machineconfig/cluster/sessions_managers/wt_local_manager.py +1 -1
- machineconfig/cluster/sessions_managers/zellij_local.py +1 -1
- machineconfig/cluster/sessions_managers/zellij_local_manager.py +1 -1
- machineconfig/jobs/installer/checks/check_installations.py +133 -0
- machineconfig/jobs/installer/checks/install_utils.py +132 -0
- machineconfig/jobs/installer/checks/report_utils.py +39 -0
- machineconfig/jobs/installer/checks/vt_utils.py +89 -0
- machineconfig/jobs/installer/installer_data.json +225 -140
- machineconfig/jobs/installer/linux_scripts/docker.sh +6 -9
- machineconfig/jobs/installer/package_groups.py +10 -9
- machineconfig/jobs/installer/python_scripts/boxes.py +1 -2
- machineconfig/jobs/installer/python_scripts/code.py +10 -8
- machineconfig/jobs/installer/python_scripts/hx.py +30 -13
- machineconfig/jobs/installer/python_scripts/nerfont_windows_helper.py +6 -5
- machineconfig/jobs/installer/python_scripts/sysabc.py +25 -19
- machineconfig/jobs/installer/python_scripts/yazi.py +33 -17
- machineconfig/jobs/scripts/powershell_scripts/cmatrix.ps1 +52 -0
- machineconfig/jobs/scripts/powershell_scripts/mount_ssh.ps1 +1 -1
- machineconfig/jobs/scripts_dynamic/a.py +413 -10
- machineconfig/profile/create_links.py +77 -20
- machineconfig/profile/create_links_export.py +63 -58
- machineconfig/profile/mapper_data.toml +30 -0
- machineconfig/profile/mapper_dotfiles.toml +253 -0
- machineconfig/scripts/python/agents.py +70 -172
- machineconfig/scripts/python/ai/initai.py +3 -1
- machineconfig/scripts/python/ai/scripts/__init__.py +1 -0
- machineconfig/scripts/python/ai/scripts/lint_and_type_check.ps1 +2 -0
- machineconfig/scripts/python/ai/scripts/lint_and_type_check.sh +7 -5
- machineconfig/scripts/python/ai/solutions/claude/claude.py +1 -1
- machineconfig/scripts/python/ai/solutions/cline/cline.py +1 -1
- machineconfig/scripts/python/ai/solutions/copilot/github_copilot.py +1 -1
- machineconfig/scripts/python/ai/solutions/copilot/instructions/python/dev.instructions.md +29 -0
- machineconfig/scripts/python/ai/solutions/crush/crush.py +1 -1
- machineconfig/scripts/python/ai/solutions/cursor/cursors.py +1 -1
- machineconfig/scripts/python/ai/solutions/gemini/gemini.py +1 -1
- machineconfig/scripts/python/ai/solutions/gemini/settings.json +3 -0
- machineconfig/scripts/python/ai/{solutions → utils}/generic.py +2 -15
- machineconfig/scripts/python/ai/utils/vscode_tasks.py +6 -3
- machineconfig/scripts/python/cloud.py +58 -11
- machineconfig/scripts/python/croshell.py +4 -156
- machineconfig/scripts/python/devops.py +57 -40
- machineconfig/scripts/python/devops_navigator.py +17 -3
- machineconfig/scripts/python/fire_jobs.py +8 -207
- machineconfig/scripts/python/ftpx.py +5 -225
- machineconfig/scripts/python/graph/cli_graph.json +8743 -0
- machineconfig/scripts/python/{env_manager → helper_env}/path_manager_tui.py +2 -2
- machineconfig/scripts/python/{env_manager → helpers/helper_env}/env_manager_tui.py +1 -1
- machineconfig/scripts/python/helpers/helper_env/path_manager_tui.py +228 -0
- machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/agentic_frameworks/fire_crush.py +1 -1
- machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/agentic_frameworks/fire_cursor_agents.py +1 -1
- machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/agentic_frameworks/fire_gemini.py +1 -1
- machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/agentic_frameworks/fire_qwen.py +1 -1
- machineconfig/scripts/python/helpers/helpers_agents/agents_impl.py +168 -0
- machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/fire_agents_help_launch.py +5 -5
- machineconfig/scripts/python/{helpers_cloud → helpers/helpers_cloud}/cloud_copy.py +6 -6
- machineconfig/scripts/python/{helpers_cloud → helpers/helpers_cloud}/cloud_mount.py +10 -5
- machineconfig/scripts/python/{helpers_cloud → helpers/helpers_cloud}/cloud_sync.py +3 -3
- machineconfig/scripts/python/{helpers_cloud → helpers/helpers_cloud}/helpers2.py +1 -1
- machineconfig/scripts/python/helpers/helpers_croshell/croshell_impl.py +225 -0
- machineconfig/scripts/python/{helpers_croshell → helpers/helpers_croshell}/scheduler.py +4 -4
- machineconfig/scripts/python/{helpers_croshell → helpers/helpers_croshell}/start_slidev.py +7 -6
- machineconfig/scripts/python/helpers/helpers_devops/backup_config.py +149 -0
- machineconfig/scripts/python/helpers/helpers_devops/cli_backup_retrieve.py +267 -0
- machineconfig/scripts/python/helpers/helpers_devops/cli_config.py +98 -0
- machineconfig/scripts/python/helpers/helpers_devops/cli_config_dotfile.py +274 -0
- machineconfig/scripts/python/helpers/helpers_devops/cli_data.py +76 -0
- machineconfig/scripts/python/{helpers_devops → helpers/helpers_devops}/cli_nw.py +52 -72
- machineconfig/scripts/python/helpers/helpers_devops/cli_repos.py +274 -0
- machineconfig/scripts/python/{helpers_devops → helpers/helpers_devops}/cli_self.py +40 -23
- machineconfig/scripts/python/{helpers_devops → helpers/helpers_devops}/cli_share_file.py +44 -30
- machineconfig/scripts/python/{helpers_devops → helpers/helpers_devops}/cli_share_server.py +26 -43
- machineconfig/scripts/python/{helpers_devops → helpers/helpers_devops}/cli_share_terminal.py +12 -6
- machineconfig/scripts/python/helpers/helpers_devops/cli_ssh.py +167 -0
- machineconfig/scripts/python/{helpers_devops → helpers/helpers_devops}/devops_status.py +12 -6
- machineconfig/scripts/python/{helpers_devops → helpers/helpers_devops}/devops_update_repos.py +1 -1
- machineconfig/scripts/python/{interactive.py → helpers/helpers_devops/interactive.py} +68 -52
- machineconfig/scripts/python/{helpers_devops → helpers/helpers_devops}/run_script.py +75 -58
- machineconfig/scripts/python/helpers/helpers_devops/themes/choose_starship_theme.ps1 +41 -0
- machineconfig/scripts/python/helpers/helpers_devops/themes/choose_starship_theme.sh +48 -0
- machineconfig/scripts/python/{helpers_devops → helpers/helpers_devops}/themes/choose_wezterm_theme.py +3 -3
- machineconfig/scripts/python/helpers/helpers_fire_command/fire_jobs_impl.py +233 -0
- machineconfig/scripts/python/{helpers_fire_command → helpers/helpers_fire_command}/fire_jobs_route_helper.py +3 -3
- machineconfig/scripts/python/helpers/helpers_msearch/msearch_impl.py +248 -0
- machineconfig/scripts/python/{helpers_msearch → helpers/helpers_msearch}/scripts_linux/fzfg +4 -3
- machineconfig/scripts/python/helpers/helpers_msearch/scripts_linux/search_with_context.sh +48 -0
- machineconfig/scripts/python/{helpers_msearch → helpers/helpers_msearch}/scripts_windows/fzfg.ps1 +1 -1
- machineconfig/scripts/python/helpers/helpers_navigator/__init__.py +20 -0
- machineconfig/scripts/python/helpers/helpers_navigator/cli_graph_loader.py +234 -0
- machineconfig/scripts/python/{helpers_navigator → helpers/helpers_navigator}/command_builder.py +61 -13
- machineconfig/scripts/python/helpers/helpers_navigator/command_detail.py +153 -0
- machineconfig/scripts/python/helpers/helpers_navigator/command_tree.py +45 -0
- machineconfig/scripts/python/{helpers_navigator → helpers/helpers_navigator}/data_models.py +18 -11
- machineconfig/scripts/python/{helpers_navigator → helpers/helpers_navigator}/main_app.py +5 -5
- machineconfig/scripts/python/helpers/helpers_network/__init__.py +0 -0
- machineconfig/scripts/python/{helpers_network → helpers/helpers_network}/address.py +15 -17
- machineconfig/scripts/python/{helpers_network → helpers/helpers_network}/address_switch.py +1 -1
- machineconfig/scripts/python/helpers/helpers_network/ftpx_impl.py +276 -0
- machineconfig/scripts/python/{helpers_network → helpers/helpers_network}/mount_ssh.py +2 -2
- machineconfig/scripts/python/helpers/helpers_network/ssh_add_identity.py +73 -0
- machineconfig/scripts/python/helpers/helpers_network/ssh_add_ssh_key.py +175 -0
- machineconfig/scripts/python/helpers/helpers_network/ssh_debug_linux.py +319 -0
- machineconfig/scripts/python/helpers/helpers_network/ssh_debug_windows.py +275 -0
- machineconfig/scripts/python/{helpers_repos → helpers/helpers_repos}/action.py +3 -3
- machineconfig/scripts/python/{helpers_repos → helpers/helpers_repos}/action_helper.py +3 -3
- machineconfig/scripts/python/{helpers_repos → helpers/helpers_repos}/cloud_repo_sync.py +117 -33
- machineconfig/scripts/python/{helpers_repos → helpers/helpers_repos}/grource.py +3 -2
- machineconfig/scripts/python/{helpers_repos → helpers/helpers_repos}/record.py +33 -13
- machineconfig/scripts/python/{helpers_repos → helpers/helpers_repos}/repo_analyzer_2.py +63 -19
- machineconfig/scripts/python/{helpers_repos → helpers/helpers_repos}/update.py +0 -6
- machineconfig/scripts/python/helpers/helpers_search/script_help.py +81 -0
- machineconfig/scripts/python/helpers/helpers_sessions/__init__.py +0 -0
- machineconfig/scripts/python/helpers/helpers_sessions/sessions_impl.py +186 -0
- machineconfig/scripts/python/{helpers_sessions → helpers/helpers_sessions}/sessions_multiprocess.py +1 -1
- machineconfig/scripts/python/helpers/helpers_terminal/__init__.py +0 -0
- machineconfig/scripts/python/helpers/helpers_terminal/terminal_impl.py +96 -0
- machineconfig/scripts/python/{helpers_utils → helpers/helpers_utils}/download.py +1 -1
- machineconfig/scripts/python/{helpers_utils → helpers/helpers_utils}/python.py +47 -26
- machineconfig/scripts/python/helpers/helpers_utils/specs.py +246 -0
- machineconfig/scripts/python/mcfg_entry.py +133 -48
- machineconfig/scripts/python/msearch.py +15 -61
- machineconfig/scripts/python/sessions.py +59 -194
- machineconfig/scripts/python/terminal.py +18 -96
- machineconfig/scripts/python/utils.py +101 -20
- machineconfig/settings/atuin/config.toml +294 -0
- machineconfig/settings/atuin/themes/catppuccin-mocha-mauve.toml +12 -0
- machineconfig/settings/linters/.ruff.toml +1 -0
- machineconfig/settings/mprocs/windows/mprocs.yaml +2 -2
- machineconfig/settings/shells/bash/init.sh +6 -3
- machineconfig/settings/shells/pwsh/init.ps1 +69 -1
- machineconfig/settings/shells/pwsh/search_pwsh_history.ps1 +99 -0
- machineconfig/settings/shells/wezterm/wezterm.lua +4 -1
- machineconfig/settings/shells/wt/settings.json +20 -7
- machineconfig/settings/shells/zsh/init.sh +25 -4
- machineconfig/settings/television/cable_unix/bash-history.toml +1 -1
- machineconfig/settings/television/cable_windows/pwsh-history.toml +1 -1
- machineconfig/settings/tv/config.toml +234 -0
- machineconfig/settings/tv/themes/catppuccin-mocha-sky.toml +22 -0
- machineconfig/settings/wsl/.wslconfig +5 -30
- machineconfig/settings/yazi/yazi_linux.toml +18 -8
- machineconfig/settings/zellij/layouts/st.kdl +2 -2
- machineconfig/settings/zellij/layouts/st2.kdl +1 -1
- machineconfig/setup_linux/web_shortcuts/interactive.sh +10 -10
- machineconfig/setup_linux/web_shortcuts/live_from_github.sh +3 -0
- machineconfig/setup_mac/__init__.py +0 -2
- machineconfig/setup_windows/__init__.py +0 -1
- machineconfig/setup_windows/web_shortcuts/interactive.ps1 +14 -13
- machineconfig/setup_windows/web_shortcuts/live_from_github.ps1 +4 -3
- machineconfig/setup_windows/web_shortcuts/quick_init.ps1 +3 -3
- machineconfig/type_hinting/sql/__init__.py +1 -0
- machineconfig/type_hinting/sql/base.py +216 -0
- machineconfig/type_hinting/sql/core_schema.py +64 -0
- machineconfig/type_hinting/sql/core_schema_typeddict.py +41 -0
- machineconfig/type_hinting/sql/typeddict_codegen.py +222 -0
- machineconfig/type_hinting/typedict/__init__.py +1 -0
- machineconfig/type_hinting/typedict/ast_utils.py +130 -0
- machineconfig/type_hinting/typedict/generator_helpers.py +319 -0
- machineconfig/type_hinting/typedict/generators.py +231 -0
- machineconfig/type_hinting/typedict/polars_schema.py +24 -0
- machineconfig/type_hinting/typedict/polars_schema_typeddict.py +63 -0
- machineconfig/utils/accessories.py +24 -0
- machineconfig/utils/code.py +41 -13
- machineconfig/utils/files/ascii_art.py +10 -14
- machineconfig/utils/files/headers.py +3 -5
- machineconfig/utils/files/read.py +8 -1
- machineconfig/utils/installer_utils/github_release_bulk.py +11 -91
- machineconfig/utils/installer_utils/github_release_scraper.py +99 -0
- machineconfig/utils/installer_utils/install_from_url.py +1 -1
- machineconfig/utils/installer_utils/installer_class.py +12 -4
- machineconfig/utils/installer_utils/installer_cli.py +1 -15
- machineconfig/utils/installer_utils/installer_helper.py +2 -2
- machineconfig/utils/installer_utils/installer_locator_utils.py +13 -13
- machineconfig/utils/installer_utils/installer_runner.py +4 -4
- machineconfig/utils/io.py +25 -8
- machineconfig/utils/meta.py +6 -4
- machineconfig/utils/options.py +49 -19
- machineconfig/utils/options_utils/__init__.py +0 -0
- machineconfig/utils/options_utils/options_tv_linux.py +211 -0
- machineconfig/utils/options_utils/options_tv_windows.py +88 -0
- machineconfig/utils/options_utils/tv_options.py +37 -0
- machineconfig/utils/path_extended.py +6 -6
- machineconfig/utils/scheduler.py +8 -2
- machineconfig/utils/schemas/fire_agents/fire_agents_input.py +1 -1
- machineconfig/utils/source_of_truth.py +6 -1
- machineconfig/utils/ssh.py +69 -18
- machineconfig/utils/ssh_utils/abc.py +1 -1
- machineconfig/utils/ssh_utils/copy_from_here.py +17 -12
- machineconfig/utils/ssh_utils/utils.py +21 -5
- machineconfig/utils/ssh_utils/wsl.py +107 -170
- machineconfig/utils/ssh_utils/wsl_helper.py +217 -0
- machineconfig/utils/upgrade_packages.py +4 -8
- {machineconfig-8.14.dist-info → machineconfig-8.50.dist-info}/METADATA +29 -22
- {machineconfig-8.14.dist-info → machineconfig-8.50.dist-info}/RECORD +251 -211
- machineconfig/jobs/installer/check_installations.py +0 -248
- machineconfig/profile/backup.toml +0 -49
- machineconfig/profile/mapper.toml +0 -263
- machineconfig/scripts/python/helpers_devops/cli_config.py +0 -105
- machineconfig/scripts/python/helpers_devops/cli_config_dotfile.py +0 -89
- machineconfig/scripts/python/helpers_devops/cli_data.py +0 -25
- machineconfig/scripts/python/helpers_devops/cli_repos.py +0 -208
- machineconfig/scripts/python/helpers_devops/devops_backup_retrieve.py +0 -80
- machineconfig/scripts/python/helpers_devops/themes/choose_starship_theme.bash +0 -3
- machineconfig/scripts/python/helpers_navigator/__init__.py +0 -20
- machineconfig/scripts/python/helpers_navigator/command_detail.py +0 -44
- machineconfig/scripts/python/helpers_navigator/command_tree.py +0 -620
- machineconfig/scripts/python/helpers_network/ssh_add_identity.py +0 -116
- machineconfig/scripts/python/helpers_network/ssh_add_ssh_key.py +0 -153
- machineconfig/scripts/python/helpers_network/ssh_debug_linux.py +0 -391
- machineconfig/scripts/python/helpers_network/ssh_debug_windows.py +0 -338
- machineconfig/scripts/python/helpers_repos/entrypoint.py +0 -77
- machineconfig/setup_mac/ssh/openssh_setup.sh +0 -114
- machineconfig/setup_windows/ssh/add-sshkey.ps1 +0 -29
- machineconfig/setup_windows/ssh/openssh-server.ps1 +0 -37
- machineconfig/utils/options_tv.py +0 -119
- machineconfig/utils/tst.py +0 -20
- /machineconfig/{scripts/python/helpers_agents → jobs/installer/checks}/__init__.py +0 -0
- /machineconfig/scripts/python/ai/{solutions/_shared.py → utils/shared.py} +0 -0
- /machineconfig/scripts/python/{helpers_agents/agentic_frameworks → graph}/__init__.py +0 -0
- /machineconfig/scripts/python/{helpers_cloud → helpers}/__init__.py +0 -0
- /machineconfig/scripts/python/{env_manager → helpers/helper_env}/__init__.py +0 -0
- /machineconfig/scripts/python/{env_manager → helpers/helper_env}/path_manager_backend.py +0 -0
- /machineconfig/scripts/python/{helpers_croshell → helpers/helpers_agents}/__init__.py +0 -0
- /machineconfig/scripts/python/{helpers_devops → helpers/helpers_agents/agentic_frameworks}/__init__.py +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/agentic_frameworks/fire_crush.json +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/fire_agents_help_search.py +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/fire_agents_helper_types.py +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/fire_agents_load_balancer.py +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/privacy/configs/aichat/config.yaml +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/privacy/configs/aider/.aider.conf.yml +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/privacy/configs/copilot/config.yml +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/privacy/configs/crush/crush.json +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/privacy/configs/gemini/settings.json +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/privacy/privacy.py +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/templates/prompt.txt +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/templates/template.ps1 +0 -0
- /machineconfig/scripts/python/{helpers_agents → helpers/helpers_agents}/templates/template.sh +0 -0
- /machineconfig/scripts/python/{helpers_devops/themes → helpers/helpers_cloud}/__init__.py +0 -0
- /machineconfig/scripts/python/{helpers_cloud → helpers/helpers_cloud}/cloud_helpers.py +0 -0
- /machineconfig/scripts/python/{helpers_cloud → helpers/helpers_cloud}/helpers5.py +0 -0
- /machineconfig/scripts/python/{helpers_fire_command → helpers/helpers_croshell}/__init__.py +0 -0
- /machineconfig/scripts/python/{helpers_croshell → helpers/helpers_croshell}/crosh.py +0 -0
- /machineconfig/scripts/python/{helpers_croshell → helpers/helpers_croshell}/pomodoro.py +0 -0
- /machineconfig/scripts/python/{helpers_croshell → helpers/helpers_croshell}/viewer.py +0 -0
- /machineconfig/scripts/python/{helpers_croshell → helpers/helpers_croshell}/viewer_template.py +0 -0
- /machineconfig/scripts/python/{helpers_network → helpers/helpers_devops}/__init__.py +0 -0
- /machineconfig/scripts/python/{helpers_sessions → helpers/helpers_devops/themes}/__init__.py +0 -0
- /machineconfig/scripts/python/{helpers_devops → helpers/helpers_devops}/themes/choose_pwsh_theme.ps1 +0 -0
- /machineconfig/scripts/python/{helpers_devops/themes/choose_starship_theme.ps1 → helpers/helpers_fire_command/__init__.py} +0 -0
- /machineconfig/scripts/python/{helpers_fire_command → helpers/helpers_fire_command}/cloud_manager.py +0 -0
- /machineconfig/scripts/python/{helpers_fire_command → helpers/helpers_fire_command}/f.py +0 -0
- /machineconfig/scripts/python/{helpers_fire_command → helpers/helpers_fire_command}/file_wrangler.py +0 -0
- /machineconfig/scripts/python/{helpers_fire_command → helpers/helpers_fire_command}/fire_jobs_args_helper.py +0 -0
- /machineconfig/scripts/python/{helpers_fire_command → helpers/helpers_fire_command}/fire_jobs_streamlit_helper.py +0 -0
- /machineconfig/scripts/python/{helpers_msearch → helpers/helpers_msearch}/__init__.py +0 -0
- /machineconfig/scripts/python/{helpers_navigator → helpers/helpers_navigator}/search_bar.py +0 -0
- /machineconfig/scripts/python/{helpers_network → helpers/helpers_network}/mount_nfs.py +0 -0
- /machineconfig/scripts/python/{helpers_network → helpers/helpers_network}/mount_nw_drive.py +0 -0
- /machineconfig/scripts/python/{helpers_network → helpers/helpers_network}/onetimeshare.py +0 -0
- /machineconfig/scripts/python/{helpers_network → helpers/helpers_network}/wifi_conn.py +0 -0
- /machineconfig/scripts/python/{helpers_repos → helpers/helpers_repos}/clone.py +0 -0
- /machineconfig/scripts/python/{helpers_repos → helpers/helpers_repos}/repo_analyzer_1.py +0 -0
- /machineconfig/scripts/python/{helpers_repos → helpers/helpers_repos}/sync.py +0 -0
- /machineconfig/scripts/python/helpers/{ast_search.py → helpers_search/ast_search.py} +0 -0
- /machineconfig/scripts/python/helpers/{qr_code.py → helpers_search/qr_code.py} +0 -0
- /machineconfig/scripts/python/helpers/{repo_rag.py → helpers_search/repo_rag.py} +0 -0
- /machineconfig/scripts/python/helpers/{symantic_search.py → helpers_search/symantic_search.py} +0 -0
- /machineconfig/scripts/python/{helpers_utils → helpers/helpers_utils}/pdf.py +0 -0
- {machineconfig-8.14.dist-info → machineconfig-8.50.dist-info}/WHEEL +0 -0
- {machineconfig-8.14.dist-info → machineconfig-8.50.dist-info}/entry_points.txt +0 -0
- {machineconfig-8.14.dist-info → machineconfig-8.50.dist-info}/top_level.txt +0 -0
|
@@ -1,338 +0,0 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
from platform import system
|
|
4
|
-
from pathlib import Path
|
|
5
|
-
from rich.console import Console
|
|
6
|
-
from rich.panel import Panel
|
|
7
|
-
from rich import box
|
|
8
|
-
import subprocess
|
|
9
|
-
import os
|
|
10
|
-
|
|
11
|
-
console = Console()
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
def ssh_debug_windows() -> dict[str, dict[str, str | bool]]:
|
|
15
|
-
"""
|
|
16
|
-
Comprehensive SSH debugging function that checks for common pitfalls on Windows systems.
|
|
17
|
-
|
|
18
|
-
Returns a dictionary with diagnostic results for each check performed.
|
|
19
|
-
"""
|
|
20
|
-
if system() != "Windows":
|
|
21
|
-
console.print(Panel("❌ This function is only supported on Windows systems", title="[bold red]Error[/bold red]", border_style="red"))
|
|
22
|
-
raise NotImplementedError("ssh_debug_windows is only supported on Windows")
|
|
23
|
-
|
|
24
|
-
console.print(Panel("🔍 SSH DEBUG - COMPREHENSIVE DIAGNOSTICS (WINDOWS)", box=box.DOUBLE_EDGE, title_align="left"))
|
|
25
|
-
|
|
26
|
-
results: dict[str, dict[str, str | bool]] = {}
|
|
27
|
-
issues_found: list[str] = []
|
|
28
|
-
|
|
29
|
-
ssh_dir = Path.home().joinpath(".ssh")
|
|
30
|
-
authorized_keys = ssh_dir.joinpath("authorized_keys")
|
|
31
|
-
|
|
32
|
-
console.print(Panel("🔐 Checking SSH directory and authorized_keys...", title="[bold blue]File Permissions[/bold blue]", border_style="blue"))
|
|
33
|
-
|
|
34
|
-
if not ssh_dir.exists():
|
|
35
|
-
results["ssh_directory"] = {"status": "error", "message": "~/.ssh directory does not exist", "action": "Create with: mkdir %USERPROFILE%\\.ssh"}
|
|
36
|
-
issues_found.append("SSH directory missing")
|
|
37
|
-
console.print(Panel("❌ ~/.ssh directory does not exist\n💡 Run: mkdir %USERPROFILE%\\.ssh", title="[bold red]Critical Issue[/bold red]", border_style="red"))
|
|
38
|
-
else:
|
|
39
|
-
results["ssh_directory"] = {"status": "ok", "message": "~/.ssh directory exists", "action": ""}
|
|
40
|
-
console.print(Panel("✅ ~/.ssh directory exists", title="[bold green]OK[/bold green]", border_style="green"))
|
|
41
|
-
|
|
42
|
-
try:
|
|
43
|
-
icacls_check = subprocess.run(["icacls", str(ssh_dir)], capture_output=True, text=True, check=False)
|
|
44
|
-
if icacls_check.returncode == 0:
|
|
45
|
-
icacls_output = icacls_check.stdout
|
|
46
|
-
if "BUILTIN\\Administrators:(OI)(CI)(F)" in icacls_output or "NT AUTHORITY\\SYSTEM:(OI)(CI)(F)" in icacls_output:
|
|
47
|
-
console.print(Panel(f"ℹ️ ~/.ssh permissions:\n{icacls_output[:300]}", title="[bold blue]Info[/bold blue]", border_style="blue"))
|
|
48
|
-
except Exception:
|
|
49
|
-
pass
|
|
50
|
-
|
|
51
|
-
if not authorized_keys.exists():
|
|
52
|
-
results["authorized_keys"] = {"status": "warning", "message": "authorized_keys file does not exist", "action": "Create authorized_keys file and add public keys"}
|
|
53
|
-
issues_found.append("authorized_keys missing")
|
|
54
|
-
console.print(Panel("⚠️ authorized_keys file does not exist\n💡 Add your public key to %USERPROFILE%\\.ssh\\authorized_keys", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
55
|
-
else:
|
|
56
|
-
try:
|
|
57
|
-
key_count = len([line for line in authorized_keys.read_text(encoding="utf-8").split("\n") if line.strip()])
|
|
58
|
-
results["authorized_keys"] = {"status": "ok", "message": f"authorized_keys exists, contains {key_count} key(s)", "action": ""}
|
|
59
|
-
console.print(Panel(f"✅ authorized_keys file exists\n🔑 Contains {key_count} authorized key(s)", title="[bold green]OK[/bold green]", border_style="green"))
|
|
60
|
-
|
|
61
|
-
try:
|
|
62
|
-
icacls_check = subprocess.run(["icacls", str(authorized_keys)], capture_output=True, text=True, check=False)
|
|
63
|
-
if icacls_check.returncode == 0:
|
|
64
|
-
icacls_output = icacls_check.stdout
|
|
65
|
-
current_user = os.environ.get("USERNAME", "")
|
|
66
|
-
if f"{current_user}:(F)" in icacls_output or f"{current_user}:(M)" in icacls_output:
|
|
67
|
-
console.print(Panel(f"✅ authorized_keys permissions appear correct for user {current_user}", title="[bold green]OK[/bold green]", border_style="green"))
|
|
68
|
-
else:
|
|
69
|
-
console.print(Panel(f"⚠️ authorized_keys permissions may need adjustment\n💡 Run: icacls %USERPROFILE%\\.ssh\\authorized_keys /inheritance:r /grant \"{current_user}:F\"", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
70
|
-
except Exception:
|
|
71
|
-
pass
|
|
72
|
-
except Exception as read_error:
|
|
73
|
-
results["authorized_keys"] = {"status": "warning", "message": f"Could not read authorized_keys: {str(read_error)}", "action": "Check file encoding and permissions"}
|
|
74
|
-
console.print(Panel(f"⚠️ Could not read authorized_keys: {str(read_error)}", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
75
|
-
|
|
76
|
-
console.print(Panel("🔧 Checking SSH service status...", title="[bold blue]Service Status[/bold blue]", border_style="blue"))
|
|
77
|
-
|
|
78
|
-
try:
|
|
79
|
-
ssh_service_check = subprocess.run(["powershell", "-Command", "Get-Service -Name sshd -ErrorAction SilentlyContinue | Select-Object -ExpandProperty Status"], capture_output=True, text=True, check=False)
|
|
80
|
-
|
|
81
|
-
if ssh_service_check.returncode == 0 and ssh_service_check.stdout.strip():
|
|
82
|
-
service_status = ssh_service_check.stdout.strip()
|
|
83
|
-
if service_status == "Running":
|
|
84
|
-
results["ssh_service"] = {"status": "ok", "message": "SSH service (sshd) is running", "action": ""}
|
|
85
|
-
console.print(Panel("✅ SSH service (sshd) is running", title="[bold green]OK[/bold green]", border_style="green"))
|
|
86
|
-
|
|
87
|
-
startup_type_check = subprocess.run(["powershell", "-Command", "Get-Service -Name sshd | Select-Object -ExpandProperty StartType"], capture_output=True, text=True, check=False)
|
|
88
|
-
if startup_type_check.returncode == 0:
|
|
89
|
-
startup_type = startup_type_check.stdout.strip()
|
|
90
|
-
if startup_type != "Automatic":
|
|
91
|
-
console.print(Panel(f"ℹ️ SSH service startup type: {startup_type}\n💡 To start automatically: Set-Service -Name sshd -StartupType Automatic", title="[bold blue]Info[/bold blue]", border_style="blue"))
|
|
92
|
-
else:
|
|
93
|
-
results["ssh_service"] = {"status": "error", "message": f"SSH service is {service_status}", "action": "Start with: Start-Service sshd"}
|
|
94
|
-
issues_found.append(f"SSH service {service_status}")
|
|
95
|
-
console.print(Panel(f"❌ SSH service is {service_status}\n💡 Start: Start-Service sshd\n💡 Enable on boot: Set-Service -Name sshd -StartupType Automatic", title="[bold red]Critical Issue[/bold red]", border_style="red"))
|
|
96
|
-
else:
|
|
97
|
-
results["ssh_service"] = {"status": "error", "message": "SSH service (sshd) not found", "action": "Install OpenSSH Server: Add-WindowsCapability -Online -Name OpenSSH.Server~~~~0.0.1.0"}
|
|
98
|
-
issues_found.append("SSH service not installed")
|
|
99
|
-
console.print(Panel("❌ SSH service (sshd) not found\n💡 Install: Add-WindowsCapability -Online -Name OpenSSH.Server~~~~0.0.1.0\n💡 Then start: Start-Service sshd", title="[bold red]Critical Issue[/bold red]", border_style="red"))
|
|
100
|
-
except Exception as service_error:
|
|
101
|
-
results["ssh_service"] = {"status": "warning", "message": f"Could not check service status: {str(service_error)}", "action": "Check SSH service manually"}
|
|
102
|
-
console.print(Panel(f"⚠️ Could not check SSH service status: {str(service_error)}\n💡 Check manually: Get-Service sshd", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
103
|
-
|
|
104
|
-
console.print(Panel("🌐 Checking network interfaces and IP addresses...", title="[bold blue]Network Interfaces[/bold blue]", border_style="blue"))
|
|
105
|
-
|
|
106
|
-
try:
|
|
107
|
-
ip_addr_check = subprocess.run(["powershell", "-Command", "Get-NetIPAddress -AddressFamily IPv4 -PrefixOrigin Dhcp,Manual | Where-Object {$_.IPAddress -notlike '127.*' -and $_.IPAddress -notlike '169.254.*'} | Select-Object -ExpandProperty IPAddress"], capture_output=True, text=True, check=False)
|
|
108
|
-
if ip_addr_check.returncode == 0 and ip_addr_check.stdout.strip():
|
|
109
|
-
ip_addresses = [ip.strip() for ip in ip_addr_check.stdout.strip().split("\n") if ip.strip()]
|
|
110
|
-
|
|
111
|
-
if ip_addresses:
|
|
112
|
-
results["network_interfaces"] = {"status": "ok", "message": f"Found {len(ip_addresses)} network interface(s)", "action": ""}
|
|
113
|
-
console.print(Panel("✅ Network interfaces found:\n" + "\n".join([f" • {ip}" for ip in ip_addresses]), title="[bold green]IP Addresses[/bold green]", border_style="green"))
|
|
114
|
-
else:
|
|
115
|
-
results["network_interfaces"] = {"status": "warning", "message": "No global IP addresses found", "action": "Check network configuration"}
|
|
116
|
-
issues_found.append("No network IP addresses")
|
|
117
|
-
console.print(Panel("⚠️ No global IP addresses found\n💡 This machine may not be reachable on the network\n💡 Check: Get-NetIPAddress", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
118
|
-
else:
|
|
119
|
-
results["network_interfaces"] = {"status": "warning", "message": "Could not retrieve IP addresses", "action": "Check network manually"}
|
|
120
|
-
console.print(Panel("⚠️ Could not retrieve IP addresses\n💡 Check: ipconfig", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
121
|
-
except Exception:
|
|
122
|
-
results["network_interfaces"] = {"status": "warning", "message": "Could not check network interfaces", "action": "Check network manually"}
|
|
123
|
-
console.print(Panel("⚠️ Could not check network interfaces\n💡 Try: ipconfig", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
124
|
-
|
|
125
|
-
console.print(Panel("🔌 Checking SSH port and listening status...", title="[bold blue]Network Status[/bold blue]", border_style="blue"))
|
|
126
|
-
|
|
127
|
-
sshd_config_paths = [Path("C:\\ProgramData\\ssh\\sshd_config"), Path(os.environ.get("PROGRAMDATA", "C:\\ProgramData")).joinpath("ssh", "sshd_config")]
|
|
128
|
-
sshd_config = None
|
|
129
|
-
for config_path in sshd_config_paths:
|
|
130
|
-
if config_path.exists():
|
|
131
|
-
sshd_config = config_path
|
|
132
|
-
break
|
|
133
|
-
|
|
134
|
-
ssh_port = "22"
|
|
135
|
-
if sshd_config:
|
|
136
|
-
try:
|
|
137
|
-
config_text = sshd_config.read_text(encoding="utf-8")
|
|
138
|
-
port_lines = [line for line in config_text.split("\n") if line.strip().startswith("Port") and not line.strip().startswith("#")]
|
|
139
|
-
if port_lines:
|
|
140
|
-
ssh_port = port_lines[0].split()[1]
|
|
141
|
-
|
|
142
|
-
results["sshd_config"] = {"status": "ok", "message": f"SSH configured to listen on port {ssh_port}", "action": ""}
|
|
143
|
-
console.print(Panel(f"✅ SSH configured to listen on port {ssh_port}", title="[bold green]Config[/bold green]", border_style="green"))
|
|
144
|
-
|
|
145
|
-
password_auth_lines = [line for line in config_text.split("\n") if "PasswordAuthentication" in line and not line.strip().startswith("#")]
|
|
146
|
-
if password_auth_lines:
|
|
147
|
-
password_auth_enabled = "yes" in password_auth_lines[-1].lower()
|
|
148
|
-
if not password_auth_enabled:
|
|
149
|
-
console.print(Panel("ℹ️ Password authentication is disabled\n💡 Only SSH keys will work", title="[bold blue]Info[/bold blue]", border_style="blue"))
|
|
150
|
-
|
|
151
|
-
pubkey_auth_lines = [line for line in config_text.split("\n") if "PubkeyAuthentication" in line and not line.strip().startswith("#")]
|
|
152
|
-
if pubkey_auth_lines:
|
|
153
|
-
pubkey_auth_enabled = "yes" in pubkey_auth_lines[-1].lower()
|
|
154
|
-
if not pubkey_auth_enabled:
|
|
155
|
-
results["pubkey_auth"] = {"status": "error", "message": "PubkeyAuthentication is disabled in sshd_config", "action": "Enable with: PubkeyAuthentication yes in sshd_config"}
|
|
156
|
-
issues_found.append("PubkeyAuthentication disabled")
|
|
157
|
-
console.print(Panel(f"❌ PubkeyAuthentication is DISABLED\n💡 Edit {sshd_config} and set: PubkeyAuthentication yes\n💡 Then restart: Restart-Service sshd", title="[bold red]Critical Issue[/bold red]", border_style="red"))
|
|
158
|
-
else:
|
|
159
|
-
results["pubkey_auth"] = {"status": "ok", "message": "PubkeyAuthentication is enabled", "action": ""}
|
|
160
|
-
console.print(Panel("✅ PubkeyAuthentication is enabled", title="[bold green]OK[/bold green]", border_style="green"))
|
|
161
|
-
|
|
162
|
-
authorized_keys_file_lines = [line for line in config_text.split("\n") if "AuthorizedKeysFile" in line and not line.strip().startswith("#")]
|
|
163
|
-
if authorized_keys_file_lines:
|
|
164
|
-
auth_keys_path = authorized_keys_file_lines[-1].split(None, 1)[1] if len(authorized_keys_file_lines[-1].split(None, 1)) > 1 else ".ssh/authorized_keys"
|
|
165
|
-
console.print(Panel(f"ℹ️ AuthorizedKeysFile: {auth_keys_path}", title="[bold blue]Info[/bold blue]", border_style="blue"))
|
|
166
|
-
|
|
167
|
-
admin_authorized_keys_lines = [line for line in config_text.split("\n") if "Match Group administrators" in line or "AuthorizedKeysFile __PROGRAMDATA__" in line]
|
|
168
|
-
if admin_authorized_keys_lines:
|
|
169
|
-
console.print(Panel("⚠️ IMPORTANT: Administrators group uses different authorized_keys location\n💡 For admin users, keys should be in: C:\\ProgramData\\ssh\\administrators_authorized_keys\n💡 Not in user's .ssh/authorized_keys!", title="[bold yellow]Admin Users[/bold yellow]", border_style="yellow"))
|
|
170
|
-
|
|
171
|
-
programdata_auth_keys = Path(os.environ.get("PROGRAMDATA", "C:\\ProgramData")).joinpath("ssh", "administrators_authorized_keys")
|
|
172
|
-
if programdata_auth_keys.exists():
|
|
173
|
-
console.print(Panel("✅ administrators_authorized_keys file exists", title="[bold green]OK[/bold green]", border_style="green"))
|
|
174
|
-
else:
|
|
175
|
-
results["admin_authorized_keys"] = {"status": "warning", "message": "administrators_authorized_keys not found for admin users", "action": "Create C:\\ProgramData\\ssh\\administrators_authorized_keys"}
|
|
176
|
-
console.print(Panel("⚠️ administrators_authorized_keys not found\n💡 Create: C:\\ProgramData\\ssh\\administrators_authorized_keys\n💡 Set permissions: icacls C:\\ProgramData\\ssh\\administrators_authorized_keys /inheritance:r /grant SYSTEM:F /grant Administrators:F", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
177
|
-
except Exception as config_error:
|
|
178
|
-
results["sshd_config"] = {"status": "warning", "message": f"Could not read sshd_config: {str(config_error)}", "action": "Check SSH configuration manually"}
|
|
179
|
-
console.print(Panel(f"⚠️ Could not read sshd_config: {str(config_error)}", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
180
|
-
else:
|
|
181
|
-
results["sshd_config"] = {"status": "warning", "message": "sshd_config not found", "action": "Check SSH configuration manually"}
|
|
182
|
-
console.print(Panel("⚠️ sshd_config not found\n💡 Check if OpenSSH Server is installed\n💡 Expected location: C:\\ProgramData\\ssh\\sshd_config", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
183
|
-
|
|
184
|
-
try:
|
|
185
|
-
netstat_check = subprocess.run(["netstat", "-an"], capture_output=True, text=True, check=False)
|
|
186
|
-
if netstat_check.returncode == 0:
|
|
187
|
-
netstat_output = netstat_check.stdout
|
|
188
|
-
if f":{ssh_port}" in netstat_output and "LISTENING" in netstat_output:
|
|
189
|
-
ssh_lines = [line for line in netstat_output.split("\n") if f":{ssh_port}" in line and "LISTENING" in line]
|
|
190
|
-
listening_on_all = any("0.0.0.0" in line or "[::]" in line for line in ssh_lines)
|
|
191
|
-
listening_on_localhost_only = all("127.0.0.1" in line or "[::1]" in line for line in ssh_lines)
|
|
192
|
-
|
|
193
|
-
if listening_on_localhost_only:
|
|
194
|
-
results["ssh_listening"] = {"status": "error", "message": f"SSH is listening ONLY on localhost (127.0.0.1:{ssh_port}), not accessible from network", "action": f"Edit {sshd_config}, check ListenAddress, restart SSH"}
|
|
195
|
-
issues_found.append("SSH listening only on localhost")
|
|
196
|
-
console.print(Panel(f"❌ SSH is listening ONLY on localhost (127.0.0.1:{ssh_port})\n💡 This prevents external connections!\n💡 Check sshd_config for 'ListenAddress'\n💡 Remove or comment out 'ListenAddress 127.0.0.1'\n💡 Or change to 'ListenAddress 0.0.0.0'\n💡 Then: Restart-Service sshd", title="[bold red]Critical Issue[/bold red]", border_style="red"))
|
|
197
|
-
elif listening_on_all:
|
|
198
|
-
results["ssh_listening"] = {"status": "ok", "message": f"SSH is listening on all interfaces (0.0.0.0:{ssh_port})", "action": ""}
|
|
199
|
-
console.print(Panel(f"✅ SSH is listening on all interfaces (0.0.0.0:{ssh_port})\n✅ Should be accessible from network", title="[bold green]OK[/bold green]", border_style="green"))
|
|
200
|
-
else:
|
|
201
|
-
results["ssh_listening"] = {"status": "ok", "message": f"SSH is listening on port {ssh_port}", "action": ""}
|
|
202
|
-
console.print(Panel(f"✅ SSH is listening on port {ssh_port}\n\nListening on:\n" + "\n".join([f" {line.strip()}" for line in ssh_lines[:3]]), title="[bold green]OK[/bold green]", border_style="green"))
|
|
203
|
-
else:
|
|
204
|
-
results["ssh_listening"] = {"status": "error", "message": f"SSH is NOT listening on port {ssh_port}", "action": "Check if SSH service is running and configured correctly"}
|
|
205
|
-
issues_found.append(f"SSH not listening on port {ssh_port}")
|
|
206
|
-
console.print(Panel(f"❌ SSH is NOT listening on port {ssh_port}\n💡 Check: netstat -an | findstr :{ssh_port}\n💡 Restart: Restart-Service sshd", title="[bold red]Critical Issue[/bold red]", border_style="red"))
|
|
207
|
-
else:
|
|
208
|
-
results["ssh_listening"] = {"status": "warning", "message": "Could not check listening status", "action": "Check manually with: netstat -an"}
|
|
209
|
-
console.print(Panel("⚠️ Could not check listening status\n💡 Check manually: netstat -an | findstr :22", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
210
|
-
except Exception:
|
|
211
|
-
results["ssh_listening"] = {"status": "warning", "message": "Could not check listening status", "action": "Check manually"}
|
|
212
|
-
console.print(Panel("⚠️ Could not check listening status\n💡 Try: netstat -an | findstr :22", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
213
|
-
|
|
214
|
-
console.print(Panel("🧱 Checking Windows Firewall status...", title="[bold blue]Firewall[/bold blue]", border_style="blue"))
|
|
215
|
-
|
|
216
|
-
try:
|
|
217
|
-
firewall_check = subprocess.run(["powershell", "-Command", "Get-NetFirewallRule -DisplayName '*SSH*' | Select-Object DisplayName, Enabled, Direction, Action"], capture_output=True, text=True, check=False)
|
|
218
|
-
if firewall_check.returncode == 0 and firewall_check.stdout.strip():
|
|
219
|
-
firewall_output = firewall_check.stdout
|
|
220
|
-
ssh_rules_enabled = "True" in firewall_output and "Allow" in firewall_output
|
|
221
|
-
|
|
222
|
-
if ssh_rules_enabled:
|
|
223
|
-
results["firewall"] = {"status": "ok", "message": "Windows Firewall has SSH rules enabled", "action": ""}
|
|
224
|
-
console.print(Panel("✅ Windows Firewall has SSH rules enabled\n\n" + firewall_output[:300], title="[bold green]OK[/bold green]", border_style="green"))
|
|
225
|
-
else:
|
|
226
|
-
results["firewall"] = {"status": "error", "message": "Windows Firewall may be blocking SSH", "action": "Add firewall rule: New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 22"}
|
|
227
|
-
issues_found.append("Firewall blocking SSH")
|
|
228
|
-
console.print(Panel("❌ Windows Firewall may be blocking SSH\n💡 Add rule: New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 22", title="[bold red]Critical Issue[/bold red]", border_style="red"))
|
|
229
|
-
else:
|
|
230
|
-
firewall_status_check = subprocess.run(["powershell", "-Command", "Get-NetFirewallProfile | Select-Object Name, Enabled"], capture_output=True, text=True, check=False)
|
|
231
|
-
if firewall_status_check.returncode == 0:
|
|
232
|
-
console.print(Panel("⚠️ No SSH-specific firewall rules found\n💡 Add rule: New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH Server (sshd)' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 22", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
233
|
-
except Exception:
|
|
234
|
-
results["firewall"] = {"status": "warning", "message": "Could not check firewall status", "action": "Check manually"}
|
|
235
|
-
console.print(Panel("⚠️ Could not check Windows Firewall\n💡 Check manually: Get-NetFirewallRule -DisplayName '*SSH*'", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
236
|
-
|
|
237
|
-
console.print(Panel("👥 Checking user account and admin status...", title="[bold blue]User Account[/bold blue]", border_style="blue"))
|
|
238
|
-
|
|
239
|
-
try:
|
|
240
|
-
current_user = os.environ.get("USERNAME", "unknown")
|
|
241
|
-
admin_check = subprocess.run(["powershell", "-Command", "([Security.Principal.WindowsPrincipal][Security.Principal.WindowsIdentity]::GetCurrent()).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)"], capture_output=True, text=True, check=False)
|
|
242
|
-
|
|
243
|
-
is_admin = "True" in admin_check.stdout if admin_check.returncode == 0 else False
|
|
244
|
-
|
|
245
|
-
if is_admin:
|
|
246
|
-
results["user_account"] = {"status": "warning", "message": f"Current user ({current_user}) is an Administrator", "action": "Check administrators_authorized_keys location"}
|
|
247
|
-
console.print(Panel(f"⚠️ Current user ({current_user}) is an Administrator\n💡 Admin users may need keys in: C:\\ProgramData\\ssh\\administrators_authorized_keys\n💡 Not in %USERPROFILE%\\.ssh\\authorized_keys", title="[bold yellow]Important[/bold yellow]", border_style="yellow"))
|
|
248
|
-
else:
|
|
249
|
-
results["user_account"] = {"status": "ok", "message": f"Current user ({current_user}) is a standard user", "action": ""}
|
|
250
|
-
console.print(Panel(f"✅ Current user ({current_user}) is a standard user\n💡 Keys should be in: %USERPROFILE%\\.ssh\\authorized_keys", title="[bold green]OK[/bold green]", border_style="green"))
|
|
251
|
-
except Exception:
|
|
252
|
-
results["user_account"] = {"status": "warning", "message": "Could not check user account status", "action": ""}
|
|
253
|
-
console.print(Panel("⚠️ Could not check user account status", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
254
|
-
|
|
255
|
-
console.print(Panel("📋 Checking SSH logs for errors...", title="[bold blue]Logs[/bold blue]", border_style="blue"))
|
|
256
|
-
|
|
257
|
-
try:
|
|
258
|
-
log_check = subprocess.run(["powershell", "-Command", "Get-WinEvent -LogName 'OpenSSH/Admin' -MaxEvents 20 -ErrorAction SilentlyContinue | Where-Object {$_.LevelDisplayName -eq 'Error' -or $_.LevelDisplayName -eq 'Warning'} | Select-Object TimeCreated, LevelDisplayName, Message | Format-List"], capture_output=True, text=True, check=False)
|
|
259
|
-
|
|
260
|
-
if log_check.returncode == 0 and log_check.stdout.strip():
|
|
261
|
-
log_output = log_check.stdout
|
|
262
|
-
results["ssh_logs"] = {"status": "warning", "message": "Found SSH errors/warnings in event log", "action": "Review event log"}
|
|
263
|
-
console.print(Panel(f"⚠️ Found SSH errors/warnings:\n\n{log_output[:500]}", title="[bold yellow]Log Errors[/bold yellow]", border_style="yellow"))
|
|
264
|
-
else:
|
|
265
|
-
results["ssh_logs"] = {"status": "ok", "message": "No recent SSH errors in event log", "action": ""}
|
|
266
|
-
console.print(Panel("✅ No recent SSH errors in event log", title="[bold green]OK[/bold green]", border_style="green"))
|
|
267
|
-
except Exception:
|
|
268
|
-
results["ssh_logs"] = {"status": "warning", "message": "Could not check SSH logs", "action": "Check manually: Get-WinEvent -LogName 'OpenSSH/Admin'"}
|
|
269
|
-
console.print(Panel("⚠️ Could not check SSH logs\n💡 Check: Get-WinEvent -LogName 'OpenSSH/Admin' -MaxEvents 20", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
270
|
-
|
|
271
|
-
console.print(Panel("🧪 Testing local SSH connection...", title="[bold blue]Connection Test[/bold blue]", border_style="blue"))
|
|
272
|
-
|
|
273
|
-
try:
|
|
274
|
-
local_user = os.environ.get("USERNAME", "unknown")
|
|
275
|
-
ssh_test = subprocess.run(["ssh", "-o", "ConnectTimeout=5", "-o", "StrictHostKeyChecking=no", "-o", "BatchMode=yes", f"{local_user}@localhost", "echo", "test"], capture_output=True, text=True, check=False, timeout=10)
|
|
276
|
-
|
|
277
|
-
if ssh_test.returncode == 0:
|
|
278
|
-
results["local_ssh_test"] = {"status": "ok", "message": "Local SSH connection successful", "action": ""}
|
|
279
|
-
console.print(Panel("✅ Local SSH connection works\n✅ SSH server is functional", title="[bold green]OK[/bold green]", border_style="green"))
|
|
280
|
-
else:
|
|
281
|
-
error_output = ssh_test.stderr
|
|
282
|
-
results["local_ssh_test"] = {"status": "warning", "message": f"Local SSH test failed: {error_output[:100]}", "action": "Check SSH keys and configuration"}
|
|
283
|
-
console.print(Panel(f"⚠️ Local SSH test failed\n💡 Error: {error_output[:200]}\n💡 This may be normal if key authentication is not set up for localhost", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
284
|
-
except subprocess.TimeoutExpired:
|
|
285
|
-
results["local_ssh_test"] = {"status": "error", "message": "Local SSH connection timed out", "action": "SSH may be hanging or not responding"}
|
|
286
|
-
issues_found.append("SSH connection timeout")
|
|
287
|
-
console.print(Panel("❌ Local SSH connection timed out\n💡 SSH server may not be responding\n💡 Check: Get-Service sshd", title="[bold red]Critical Issue[/bold red]", border_style="red"))
|
|
288
|
-
except FileNotFoundError:
|
|
289
|
-
results["local_ssh_test"] = {"status": "warning", "message": "ssh client not found", "action": "Install SSH client: Add-WindowsCapability -Online -Name OpenSSH.Client~~~~0.0.1.0"}
|
|
290
|
-
console.print(Panel("⚠️ SSH client not installed\n💡 Install: Add-WindowsCapability -Online -Name OpenSSH.Client~~~~0.0.1.0", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
291
|
-
except Exception as test_error:
|
|
292
|
-
results["local_ssh_test"] = {"status": "warning", "message": f"Could not test SSH: {str(test_error)}", "action": ""}
|
|
293
|
-
console.print(Panel(f"⚠️ Could not test SSH connection: {str(test_error)}", title="[bold yellow]Warning[/bold yellow]", border_style="yellow"))
|
|
294
|
-
|
|
295
|
-
console.print(Panel("📊 DIAGNOSTIC SUMMARY", box=box.DOUBLE_EDGE, title_align="left"))
|
|
296
|
-
|
|
297
|
-
if issues_found:
|
|
298
|
-
console.print(Panel(f"⚠️ Found {len(issues_found)} issue(s):\n\n" + "\n".join([f"• {issue}" for issue in issues_found]), title="[bold yellow]Issues Found[/bold yellow]", border_style="yellow"))
|
|
299
|
-
else:
|
|
300
|
-
console.print(Panel("✅ No critical issues detected\n\nIf you still cannot connect:\n• Check client-side configuration\n• Verify network connectivity\n• Ensure correct username and hostname\n• Check if public key is correctly added to authorized_keys\n• For admin users, check C:\\ProgramData\\ssh\\administrators_authorized_keys", title="[bold green]All Checks Passed[/bold green]", border_style="green"))
|
|
301
|
-
|
|
302
|
-
console.print(Panel("🔗 CONNECTION INFORMATION", box=box.DOUBLE_EDGE, title_align="left"))
|
|
303
|
-
|
|
304
|
-
try:
|
|
305
|
-
current_user = os.environ.get("USERNAME", "unknown")
|
|
306
|
-
hostname_result = subprocess.run(["hostname"], capture_output=True, text=True, check=False)
|
|
307
|
-
hostname = hostname_result.stdout.strip() if hostname_result.returncode == 0 else "unknown"
|
|
308
|
-
|
|
309
|
-
ip_addr_result = subprocess.run(["powershell", "-Command", "Get-NetIPAddress -AddressFamily IPv4 -PrefixOrigin Dhcp,Manual | Where-Object {$_.IPAddress -notlike '127.*' -and $_.IPAddress -notlike '169.254.*'} | Select-Object -ExpandProperty IPAddress"], capture_output=True, text=True, check=False)
|
|
310
|
-
connection_ips: list[str] = []
|
|
311
|
-
if ip_addr_result.returncode == 0 and ip_addr_result.stdout.strip():
|
|
312
|
-
connection_ips = [ip.strip() for ip in ip_addr_result.stdout.strip().split("\n") if ip.strip()]
|
|
313
|
-
|
|
314
|
-
connection_info = f"👤 Username: {current_user}\n🖥️ Hostname: {hostname}\n🔌 SSH Port: {ssh_port}\n"
|
|
315
|
-
|
|
316
|
-
if connection_ips:
|
|
317
|
-
connection_info += "\n🌐 This machine can be accessed via SSH from other machines on the same network using:\n\n"
|
|
318
|
-
for ip in connection_ips:
|
|
319
|
-
connection_info += f" ssh {current_user}@{ip}\n"
|
|
320
|
-
if ssh_port != "22":
|
|
321
|
-
connection_info += f"\n (Port {ssh_port} should be used: ssh -p {ssh_port} {current_user}@<IP>)\n"
|
|
322
|
-
else:
|
|
323
|
-
connection_info += "\n⚠️ No network IP addresses found - this machine may not be reachable from the network"
|
|
324
|
-
|
|
325
|
-
connection_info += "\n\n💡 From another machine on the same network, use one of the commands above"
|
|
326
|
-
connection_info += "\n💡 Ensure your public key is in the correct authorized_keys location"
|
|
327
|
-
connection_info += "\n💡 For admin users: C:\\ProgramData\\ssh\\administrators_authorized_keys"
|
|
328
|
-
connection_info += "\n💡 For standard users: %USERPROFILE%\\.ssh\\authorized_keys"
|
|
329
|
-
|
|
330
|
-
console.print(Panel(connection_info, title="[bold cyan]SSH Connection Details[/bold cyan]", border_style="cyan"))
|
|
331
|
-
except Exception as conn_error:
|
|
332
|
-
console.print(Panel(f"⚠️ Could not gather connection information: {str(conn_error)}", title="[bold yellow]Connection Info[/bold yellow]", border_style="yellow"))
|
|
333
|
-
|
|
334
|
-
return results
|
|
335
|
-
|
|
336
|
-
|
|
337
|
-
if __name__ == "__main__":
|
|
338
|
-
ssh_debug_windows()
|
|
@@ -1,77 +0,0 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
4
|
-
from typing import Optional
|
|
5
|
-
from pathlib import Path
|
|
6
|
-
from machineconfig.utils.source_of_truth import CONFIG_ROOT, DEFAULTS_PATH
|
|
7
|
-
|
|
8
|
-
import typer
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
def resolve_directory(directory: Optional[str]) -> Path:
|
|
12
|
-
if directory is None:
|
|
13
|
-
directory = Path.cwd().as_posix()
|
|
14
|
-
typer.echo(f"📁 Using directory: {directory}")
|
|
15
|
-
return Path(directory).expanduser().absolute()
|
|
16
|
-
def git_operations(
|
|
17
|
-
directory: Optional[str],
|
|
18
|
-
*,
|
|
19
|
-
pull: bool,
|
|
20
|
-
commit: bool,
|
|
21
|
-
push: bool,
|
|
22
|
-
recursive: bool,
|
|
23
|
-
auto_uv_sync: bool,
|
|
24
|
-
) -> None:
|
|
25
|
-
|
|
26
|
-
repos_root = resolve_directory(directory)
|
|
27
|
-
from machineconfig.scripts.python.helpers_repos.action import perform_git_operations
|
|
28
|
-
from machineconfig.utils.path_extended import PathExtended
|
|
29
|
-
perform_git_operations(
|
|
30
|
-
repos_root=PathExtended(repos_root),
|
|
31
|
-
pull=pull,
|
|
32
|
-
commit=commit,
|
|
33
|
-
push=push,
|
|
34
|
-
recursive=recursive,
|
|
35
|
-
auto_uv_sync=auto_uv_sync,
|
|
36
|
-
)
|
|
37
|
-
def resolve_spec_path(directory: Optional[str], cloud: Optional[str]) -> Path:
|
|
38
|
-
repos_root = resolve_directory(directory)
|
|
39
|
-
from machineconfig.utils.path_extended import PathExtended
|
|
40
|
-
if not repos_root.exists() or repos_root.name != "repos.json":
|
|
41
|
-
relative_repos_root = PathExtended(repos_root).expanduser().absolute().relative_to(Path.home())
|
|
42
|
-
candidate = Path(CONFIG_ROOT).joinpath("repos").joinpath(relative_repos_root).joinpath("repos.json")
|
|
43
|
-
repos_root = candidate
|
|
44
|
-
if not repos_root.exists():
|
|
45
|
-
cloud_name: Optional[str]
|
|
46
|
-
if cloud is None:
|
|
47
|
-
from machineconfig.utils.io import read_ini
|
|
48
|
-
cloud_name = read_ini(DEFAULTS_PATH)["general"]["rclone_config_name"]
|
|
49
|
-
typer.echo(f"⚠️ Using default cloud: {cloud_name}")
|
|
50
|
-
else:
|
|
51
|
-
cloud_name = cloud
|
|
52
|
-
assert cloud_name is not None, (
|
|
53
|
-
f"Path {repos_root} does not exist and cloud was not passed. You can't clone without one of them."
|
|
54
|
-
)
|
|
55
|
-
from machineconfig.utils.path_extended import PathExtended
|
|
56
|
-
PathExtended(repos_root).from_cloud(cloud=cloud_name, rel2home=True)
|
|
57
|
-
assert repos_root.exists() and repos_root.name == "repos.json", (
|
|
58
|
-
f"Path {repos_root} does not exist and cloud was not passed. You can't clone without one of them."
|
|
59
|
-
)
|
|
60
|
-
return repos_root
|
|
61
|
-
def clone_from_specs(
|
|
62
|
-
directory: Optional[str],
|
|
63
|
-
cloud: Optional[str],
|
|
64
|
-
*,
|
|
65
|
-
checkout_branch_flag: bool,
|
|
66
|
-
checkout_commit_flag: bool,
|
|
67
|
-
) -> None:
|
|
68
|
-
|
|
69
|
-
typer.echo("\n📥 Cloning or checking out repositories...")
|
|
70
|
-
spec_path = resolve_spec_path(directory, cloud)
|
|
71
|
-
from machineconfig.scripts.python.helpers_repos.clone import clone_repos
|
|
72
|
-
clone_repos(
|
|
73
|
-
spec_path=spec_path,
|
|
74
|
-
preferred_remote=None,
|
|
75
|
-
checkout_branch_flag=checkout_branch_flag,
|
|
76
|
-
checkout_commit_flag=checkout_commit_flag,
|
|
77
|
-
)
|
|
@@ -1,114 +0,0 @@
|
|
|
1
|
-
#!/usr/bin/env bash
|
|
2
|
-
|
|
3
|
-
# 🔐 OpenSSH Setup for macOS
|
|
4
|
-
# This script sets up SSH configuration and permissions on macOS
|
|
5
|
-
|
|
6
|
-
echo "🔐 Starting OpenSSH setup for macOS..."
|
|
7
|
-
|
|
8
|
-
# ✅ SSH is built-in on macOS (OpenSSH comes pre-installed)
|
|
9
|
-
echo "✅ OpenSSH is pre-installed on macOS"
|
|
10
|
-
|
|
11
|
-
# 📁 Create SSH directory with correct permissions
|
|
12
|
-
echo "📁 Setting up SSH directory..."
|
|
13
|
-
mkdir -p ~/.ssh
|
|
14
|
-
chmod 700 ~/.ssh
|
|
15
|
-
echo "✅ SSH directory created with correct permissions (700)"
|
|
16
|
-
|
|
17
|
-
# 📝 Create authorized_keys file if it doesn't exist
|
|
18
|
-
if [ ! -f ~/.ssh/authorized_keys ]; then
|
|
19
|
-
touch ~/.ssh/authorized_keys
|
|
20
|
-
chmod 600 ~/.ssh/authorized_keys
|
|
21
|
-
echo "✅ Created authorized_keys file"
|
|
22
|
-
else
|
|
23
|
-
echo "✅ authorized_keys file already exists"
|
|
24
|
-
chmod 600 ~/.ssh/authorized_keys
|
|
25
|
-
fi
|
|
26
|
-
|
|
27
|
-
# 🔑 Create SSH keys if they don't exist
|
|
28
|
-
if [ ! -f ~/.ssh/id_rsa ]; then
|
|
29
|
-
echo "🔑 Generating SSH keys (RSA)..."
|
|
30
|
-
ssh-keygen -t rsa -b 4096 -f ~/.ssh/id_rsa -N "" -C "$(whoami)@$(hostname)"
|
|
31
|
-
echo "✅ SSH RSA keys generated: ~/.ssh/id_rsa"
|
|
32
|
-
else
|
|
33
|
-
echo "✅ SSH keys already exist"
|
|
34
|
-
fi
|
|
35
|
-
|
|
36
|
-
# 🔐 Create Ed25519 keys (modern alternative)
|
|
37
|
-
if [ ! -f ~/.ssh/id_ed25519 ]; then
|
|
38
|
-
echo "🔑 Generating SSH keys (Ed25519)..."
|
|
39
|
-
ssh-keygen -t ed25519 -f ~/.ssh/id_ed25519 -N "" -C "$(whoami)@$(hostname)"
|
|
40
|
-
echo "✅ SSH Ed25519 keys generated: ~/.ssh/id_ed25519"
|
|
41
|
-
else
|
|
42
|
-
echo "✅ SSH Ed25519 keys already exist"
|
|
43
|
-
fi
|
|
44
|
-
|
|
45
|
-
# 🔧 Configure SSH config file for convenience
|
|
46
|
-
SSH_CONFIG="$HOME/.ssh/config"
|
|
47
|
-
if [ ! -f "$SSH_CONFIG" ]; then
|
|
48
|
-
echo "📝 Creating SSH config file..."
|
|
49
|
-
cat > "$SSH_CONFIG" << 'EOF'
|
|
50
|
-
# SSH Config File for macOS
|
|
51
|
-
# Add your remote hosts below
|
|
52
|
-
|
|
53
|
-
# Example host configuration:
|
|
54
|
-
# Host myserver
|
|
55
|
-
# HostName example.com
|
|
56
|
-
# User username
|
|
57
|
-
# Port 22
|
|
58
|
-
# IdentityFile ~/.ssh/id_ed25519
|
|
59
|
-
# IdentityFile ~/.ssh/id_rsa
|
|
60
|
-
|
|
61
|
-
# Global settings
|
|
62
|
-
Host *
|
|
63
|
-
AddKeysToAgent yes
|
|
64
|
-
UseKeychain yes
|
|
65
|
-
IdentityFile ~/.ssh/id_ed25519
|
|
66
|
-
IdentityFile ~/.ssh/id_rsa
|
|
67
|
-
ServerAliveInterval 60
|
|
68
|
-
EOF
|
|
69
|
-
chmod 600 "$SSH_CONFIG"
|
|
70
|
-
echo "✅ SSH config file created: $SSH_CONFIG"
|
|
71
|
-
else
|
|
72
|
-
echo "✅ SSH config file already exists"
|
|
73
|
-
fi
|
|
74
|
-
|
|
75
|
-
# 🔒 Ensure correct file permissions
|
|
76
|
-
echo "🔒 Setting correct SSH file permissions..."
|
|
77
|
-
chmod 700 ~/.ssh
|
|
78
|
-
chmod 600 ~/.ssh/authorized_keys 2>/dev/null || true
|
|
79
|
-
chmod 600 ~/.ssh/id_rsa 2>/dev/null || true
|
|
80
|
-
chmod 644 ~/.ssh/id_rsa.pub 2>/dev/null || true
|
|
81
|
-
chmod 600 ~/.ssh/id_ed25519 2>/dev/null || true
|
|
82
|
-
chmod 644 ~/.ssh/id_ed25519.pub 2>/dev/null || true
|
|
83
|
-
chmod 600 ~/.ssh/config 2>/dev/null || true
|
|
84
|
-
echo "✅ SSH file permissions configured correctly"
|
|
85
|
-
|
|
86
|
-
# ℹ️ Display SSH key information
|
|
87
|
-
echo ""
|
|
88
|
-
echo "📋 SSH Setup Summary:"
|
|
89
|
-
echo "━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━"
|
|
90
|
-
echo "SSH Directory: ~/.ssh"
|
|
91
|
-
echo "SSH Config: ~/.ssh/config"
|
|
92
|
-
echo ""
|
|
93
|
-
echo "Available SSH Keys:"
|
|
94
|
-
if [ -f ~/.ssh/id_rsa.pub ]; then
|
|
95
|
-
echo " • RSA Key: ~/.ssh/id_rsa"
|
|
96
|
-
fi
|
|
97
|
-
if [ -f ~/.ssh/id_ed25519.pub ]; then
|
|
98
|
-
echo " • Ed25519 Key: ~/.ssh/id_ed25519"
|
|
99
|
-
fi
|
|
100
|
-
echo ""
|
|
101
|
-
echo "💡 Next Steps:"
|
|
102
|
-
echo " 1. View your public key:"
|
|
103
|
-
echo " cat ~/.ssh/id_ed25519.pub (or id_rsa.pub)"
|
|
104
|
-
echo " 2. Add it to your GitHub/GitLab/server authorized_keys"
|
|
105
|
-
echo " 3. Test connection:"
|
|
106
|
-
echo " ssh -v your_server"
|
|
107
|
-
echo " 4. Configure hosts in ~/.ssh/config for easy access"
|
|
108
|
-
echo ""
|
|
109
|
-
echo "📚 Learn more about SSH:"
|
|
110
|
-
echo " • man ssh"
|
|
111
|
-
echo " • man ssh-keygen"
|
|
112
|
-
echo " • man ssh_config"
|
|
113
|
-
echo ""
|
|
114
|
-
echo "✅ OpenSSH setup complete!"
|
|
@@ -1,29 +0,0 @@
|
|
|
1
|
-
|
|
2
|
-
# This script adds a public key to the authorized_keys file for the sshd service
|
|
3
|
-
# as a result, a remote can connet to the machine if they got the corresponding private key (identity).
|
|
4
|
-
|
|
5
|
-
# https://docs.microsoft.com/en-us/windows-server/administration/openssh/openssh_keymanagement
|
|
6
|
-
# http://woshub.com/using-ssh-key-based-authentication-on-windows/
|
|
7
|
-
|
|
8
|
-
$ErrorActionPreference = "Stop"
|
|
9
|
-
$sshd_dir = "$env:ProgramData\ssh"
|
|
10
|
-
$sshfile = "$env:USERPROFILE\.ssh\pubkey.pub" # this directory is for normal users, not admins.
|
|
11
|
-
# Once they are populated, we can create administrators_authorized_keys
|
|
12
|
-
|
|
13
|
-
Get-Content $sshfile >> "$sshd_dir\administrators_authorized_keys"
|
|
14
|
-
# set appropirate persmissions for this file
|
|
15
|
-
Set-Location $sshd_dir
|
|
16
|
-
icacls administrators_authorized_keys /inheritance:r /grant "Administrators:F" /grant "SYSTEM:F"
|
|
17
|
-
# Lastly, enabling public key authentication.
|
|
18
|
-
$sshd_config = "$sshd_dir\sshd_config"
|
|
19
|
-
(Get-Content $sshd_config) -replace '#PubkeyAuthentication', 'PubkeyAuthentication' | Out-File -encoding ASCII $sshd_config
|
|
20
|
-
#(Get-Content $sshd_dir\sshd_config) -replace 'AuthorizedKeysFile __PROGRAMDATA__', '#AuthorizedKeysFile __PROGRAMDATA__' | Out-File -encoding ASCII $sshd_config
|
|
21
|
-
#(Get-Content $sshd_dir\sshd_config) -replace 'Match Group administrators', '#Match Group administrators' | Out-File -encoding ASCII $sshd_config
|
|
22
|
-
#cat C:\ProgramData\ssh\sshd_config
|
|
23
|
-
|
|
24
|
-
# to load the fresh settings, we need to restart the service:
|
|
25
|
-
Restart-Service sshd -Force
|
|
26
|
-
|
|
27
|
-
#Write-Host "Use this to Login/test Now"
|
|
28
|
-
#write-host ssh $env:UserName@localhost
|
|
29
|
-
# debug tip: use nano editor to inspect files above, if unreadable max-text format is used, ssh won't work.
|
|
@@ -1,37 +0,0 @@
|
|
|
1
|
-
|
|
2
|
-
$ErrorActionPreference = "Stop"
|
|
3
|
-
# ALL of the following require admin priviliages:
|
|
4
|
-
Set-ExecutionPolicy Bypass
|
|
5
|
-
# PowerShell.exe -ExecutionPolicy Bypass -File "C:\bypass\prompt\standard.ps1" 2>&1>$null
|
|
6
|
-
|
|
7
|
-
# Install SSH-Server on a windows machine. see this one below if this one didn't work:
|
|
8
|
-
# to install: winget install --Id Microsoft.OpenSSH.Preview --source winget --scope user --accept-package-agreements --accept-source-agreements # from: https://github.com/PowerShell/Win32-OpenSSH/wiki/Install-Win32-OpenSSH
|
|
9
|
-
# the result is installed in C:\Program Files\OpenSSH as opposed to C:\Windows\System32\OpenSSH which is the case if openssh is added as a feature/capability to windows
|
|
10
|
-
# However, notice the new path is not in PATH as is the cases with system variant, so it needs to be added manually.
|
|
11
|
-
# finally, ssh config files are always @ "$env:ProgramData\ssh" irrespective of installation method.
|
|
12
|
-
# if ssh key is created on windows, it doesn't work on linux and gives a cryptlib error. It must be read again and saved in non DOS format.
|
|
13
|
-
|
|
14
|
-
Add-WindowsCapability -Online -Name OpenSSH.Server
|
|
15
|
-
Add-WindowsCapability -Online -Name OpenSSH.Client
|
|
16
|
-
|
|
17
|
-
#New-NetFirewallRule -Name sshd -DisplayName 'OpenSSH SSH Server' -Enabled True -Direction Inbound -Protocol TCP -Action Allow -LocalPort 22 -Program "%WINDIR%\System32\OpenSSH\sshd.exe"
|
|
18
|
-
|
|
19
|
-
# Must Enable ssh-agent before starting. But even before that, one need to update path so that same shell has access to the NEWLY added ssh program
|
|
20
|
-
$env:Path = [System.Environment]::GetEnvironmentVariable("Path","Machine") + ";" + [System.Environment]::GetEnvironmentVariable("Path","User")
|
|
21
|
-
|
|
22
|
-
Set-Service -Name sshd -StartupType Automatic
|
|
23
|
-
#Get-Service -Name ssh-agent | Set-Service -StartupType Automatic
|
|
24
|
-
#Set-Service -Name ssh-agent -StartupType Automatic
|
|
25
|
-
#Start-Service ssh-agent
|
|
26
|
-
# Starting the service for the first time will populate the directory with config files.
|
|
27
|
-
Start-Service sshd
|
|
28
|
-
|
|
29
|
-
# Next up, change default shell to powershell, becuse CMD is lame
|
|
30
|
-
# following: https://github.com/PowerShell/Win32-OpenSSH/wiki/DefaultShell
|
|
31
|
-
$shell = "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" # "C:\Windows\System32\wsl.exe"
|
|
32
|
-
# $shell = "C:\Program Files\PowerShell\7\pwsh.exe" # it slows SSH down because of startup time, one can still use it by running it explicitly
|
|
33
|
-
New-ItemProperty -Path "HKLM:\SOFTWARE\OpenSSH" -Name DefaultShell -Value $shell -PropertyType String -Force
|
|
34
|
-
New-ItemProperty -Path "HKLM:\SOFTWARE\OpenSSH" -Name DefaultShellCommandOption -Value "/c" -PropertyType String -Force
|
|
35
|
-
|
|
36
|
-
cd ~
|
|
37
|
-
mkdir .ssh -ErrorAction SilentlyContinue
|