From eff5a7c242e43e6420d13b3b3bea293bf9001996 Mon Sep 17 00:00:00 2001 From: usmannasir <01-134132-158@student.bahria.edu.pk> Date: Tue, 5 Mar 2019 16:35:57 +0500 Subject: [PATCH] maintain multiple keys during remote backups --- plogical/backupUtilities.py | 11 +++++++++-- 1 file changed, 9 insertions(+), 2 deletions(-) diff --git a/plogical/backupUtilities.py b/plogical/backupUtilities.py index 29ccfc645..c502d7b8f 100644 --- a/plogical/backupUtilities.py +++ b/plogical/backupUtilities.py @@ -694,8 +694,8 @@ class backupUtilities: expectation.append("Password:") expectation.append("Permission denied") - command = "ssh -o StrictHostKeyChecking=no -p "+ port +" root@"+IPAddress+" mkdir /root/.ssh" - + command = "ssh -o StrictHostKeyChecking=no -p "+ port +" root@"+IPAddress+' "mkdir /root/.ssh || rm -f /root/.ssh/temp && rm -f /root/.ssh/authorized_temp && cp /root/.ssh/authorized_keys /root/.ssh/temp"' + logging.CyberCPLogFileWriter.writeToFile(command) setupKeys = pexpect.spawn(command, timeout=3) index = setupKeys.expect(expectation) @@ -873,6 +873,13 @@ class backupUtilities: try: command = "sudo ssh -o StrictHostKeyChecking=no -p "+ port +" -i /root/.ssh/cyberpanel root@"+IPAddress+" mkdir /home/backup" subprocess.call(shlex.split(command)) + + command = "sudo ssh -o StrictHostKeyChecking=no -p " + port + " -i /root/.ssh/cyberpanel root@" + IPAddress + ' "cat /root/.ssh/authorized_keys /root/.ssh/temp > /root/.ssh/authorized_temp"' + subprocess.call(shlex.split(command)) + + command = "sudo ssh -o StrictHostKeyChecking=no -p " + port + " -i /root/.ssh/cyberpanel root@" + IPAddress + ' "cat /root/.ssh/authorized_temp > /root/.ssh/authorized_keys"' + subprocess.call(shlex.split(command)) + except BaseException, msg: logging.CyberCPLogFileWriter.writeToFile(str(msg) + " [createBackupDir]") return 0