Open indispeq opened 1 year ago
Same for azurerm_linux_virtual_machine
Any updates here? Running into this issue as well.
I am having the same problem with an ecdsa-sha2-nistp256 public key.
Doesn't look like it should be too hard to change:
https://github.com/hashicorp/terraform-provider-azurerm/blob/main/internal/services/compute/validate/ssh_key.go
Line 38: if pubKey.Type() != ssh.KeyAlgoRSA {
I'd create a PR but I have zero experience with providers.
Hey guys! Seems that the azure documentation states that sftp storage accounts should be supporting ECDSA keys. Furthermore, with current CVEs for RSA, ECDSA should be the standard for connecting to SFTP. https://learn.microsoft.com/en-us/azure/storage/blobs/secure-file-transfer-protocol-support#supported-algorithms
bumping this up, ssh ecdsa ed25519 keys are supported
https://github.com/gilbahat/terraform-provider-azurerm - fixed, but I am unsure how to test a local provider build - if anyone feels like taking it.
Is there an existing issue for this?
Community Note
Description
Dear team behind this provider. Thank you for your excellent work. I would like to ask for the support of ecdsa keys in the azurerm_storage_account_local_user resource type. At the moment, when we receive such a key from a client who wants to use SFTP and sends us a key looking like
ssh-ed25519 AAAA...
the provider gives this error:However, I can manually go into the Azure portal and add this very same key to the user. This leads me to believe that this is a limitation of the module and since the Azure API supports it, it would be worth implementing, since it is a more secure algorithm.
Thank you!
New or Affected Resource(s)/Data Source(s)
azurerm_storage_account_local_user
Potential Terraform Configuration