Replies: 2 comments 2 replies
-
It's been a long time I worked with this, but maybe what you are missing is SSH agent forwarding? https://docs.github.com/en/authentication/connecting-to-github-with-ssh/using-ssh-agent-forwarding |
Beta Was this translation helpful? Give feedback.
-
tldr; I've setup an ssh-agent through systemd and added the For anyone else dealing with this, here is what I've learned.
It would be awesome if Shipit could start a single shell session that maintained output from the previous steps. This would allow me to start an ssh-agent per deploy that could then be shutdown once the deploy is complete. # deployable_app/shipit.yml
deploy:
pre:
- eval "$(ssh-agent -s)"
- ssh-add
post:
- ssh-agent -k For now, I had to setup a persistent ssh-agent that each application could reference using the SSH_AUTH_SOCK. # shipit/config/secrets.yml
production:
...
env:
SSH_AUTH_SOCK: 'path/to/known.socket' |
Beta Was this translation helpful? Give feedback.
-
Hey All,
I've been working on integrating Shipit into my org and have an issue with Capistrano and the ssh-agent.
Here is my setup:
git:check
step which checks if the remote server can pull in the repositoryWhat we've found is that the server has no ssh-agent connected to the deploy steps.
I found this issue which is similar to my setup but unfortunately went unanswered. I'm trying to avoid the deploy override if possible.
I saw in the templates for shipit that there is an env variable for the SSH_AUTH_SOCK but I'm unsure how to use that to connect an ssh-agent with Shipit.
Any help getting this set up would be much appreciated! I know this isn't exactly a part of Shipit; it is more about integration.
Thank you!
Beta Was this translation helpful? Give feedback.
All reactions