Skip to content

Conversation

@rrebollo
Copy link
Contributor

Add a new "Host Public Key" field to verify the identity of the remote SFTP server.

  • When filled: strict host key verification (protects against man-in-the-middle attacks)
  • When empty: host key checking disabled (old behavior preserved, no known_hosts warnings)
  • "Test SFTP Connection" button now also validates the provided key
  • Eliminates the UserWarning about missing ~/.ssh/known_hosts
  • All existing tests pass
  • New comprehensive test added for valid/invalid/empty key cases
  • Documentation updated in readme/USAGE.rst

Based on the original (never merged) PR #2195 from 14.0, now correctly implemented and fully tested for 16.0.

@BinhexTeam

@rrebollo rrebollo changed the title [IMP] auto_backup: add optional SFTP host key verification [16.0] [IMP] auto_backup: add optional SFTP host key verification Dec 11, 2025
@rrebollo rrebollo marked this pull request as ready for review December 11, 2025 03:04
Add a new "Host Public Key" field to verify the identity of the remote SFTP server.

- When filled: strict host key verification (protects against man-in-the-middle attacks)
- When empty: host key checking disabled (old behavior preserved, no known_hosts warnings)
- "Test SFTP Connection" button now also validates the provided key
- Eliminates the UserWarning about missing ~/.ssh/known_hosts
- All existing tests pass
- New comprehensive test added for valid/invalid/empty key cases
- Documentation updated in readme/USAGE.rst

Based on the original (never merged) PR OCA#2195 from 14.0, now correctly implemented and fully tested for 16.0.
@rrebollo rrebollo force-pushed the 16.0-imp-auto_backup-hostkey-support branch from 0996b18 to b449b97 Compare December 11, 2025 04:15
Copy link

@edescalona edescalona left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

If you could complete the suggested tests for db_backup.py

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants