Matthias Pigulla
e0d767fd8e
Make sure file creation works
2021-03-02 15:40:01 +00:00
Matthias Pigulla
feedd601c5
Fix Windows file path to use backslashes
2021-03-02 15:31:47 +00:00
Matthias Pigulla
e35dbcbae9
Work around another bug in OpenSSH on Windows
2021-03-02 15:29:19 +00:00
Matthias Pigulla
cbf6c2b3c2
Also try AddKeysToAgent=yes
2021-03-01 11:31:50 +00:00
Matthias Pigulla
2bcaae34da
Avoid using a separate shell
2021-03-01 11:16:21 +00:00
Matthias Pigulla
f03f6e3358
Debug SSH_AUTH_SOCK
2021-03-01 11:05:21 +00:00
Matthias Pigulla
7d6e731f4a
Use SSH_AUTH_SOCK in following ssh-add invocations
2021-03-01 10:59:34 +00:00
Matthias Pigulla
88bcf9af86
Use IdentitiesOnly=no
2021-03-01 10:53:18 +00:00
Matthias Pigulla
02a6899abb
Keep output
2021-03-01 10:50:07 +00:00
Matthias Pigulla
7f61bbc4ae
Use different ssh-add command for Windows/!Windows
2021-03-01 09:41:11 +00:00
Matthias Pigulla
1606d19f15
Preserve process.env so the PATH (and possibly other) vars are availabe
2021-03-01 09:24:06 +00:00
Matthias Pigulla
8addcca750
Debug with ngrok/ssh
2021-03-01 08:47:08 +00:00
Matthias Pigulla
166067472e
More debugging
2021-03-01 08:35:43 +00:00
Matthias Pigulla
f78cad1cc7
Try to output ssh-add failure
2021-03-01 08:19:03 +00:00
Matthias Pigulla
ccd95b931d
Use execSync instead of execFileSync
2021-03-01 08:16:26 +00:00
Matthias Pigulla
637f9c791e
Fix execFileSync call
2021-03-01 08:15:05 +00:00
Matthias Pigulla
18f53866de
Use absolute path for askpass.exe
2021-03-01 08:13:10 +00:00
Matthias Pigulla
c91aeeb123
Fake askpass
2021-03-01 08:09:30 +00:00
Matthias Pigulla
9406a51fa5
Remove stdio: 'inherit'
2021-02-28 16:07:26 +00:00
Matthias Pigulla
ef63fdb1df
Fix syntax
2021-02-28 16:04:53 +00:00
Matthias Pigulla
7fc4d80a06
Debug output
2021-02-28 15:58:23 +00:00
Matthias Pigulla
9b7e80db62
Use exec
2021-02-28 15:55:23 +00:00
Matthias Pigulla
4d491fcb08
Fix ssh-add syntax (?)
2021-02-28 15:53:33 +00:00
Matthias Pigulla
1676d1f2a9
Use an askpass wrapper
2021-02-28 15:52:09 +00:00
Matthias Pigulla
3702096734
Try writing keys to disk and encrypting them
2021-02-28 15:05:09 +00:00
Matthias Pigulla
5e4ad4bcc8
Explicitly disable IdentitiesOnly
2021-02-27 18:25:44 +00:00
Matthias Pigulla
bcd9c12595
Print key file name
2021-02-27 11:05:12 +00:00
Matthias Pigulla
05624726bc
Remove "IdentitiesOnly"
2021-02-27 11:00:51 +00:00
Matthias Pigulla
4d06ea6a33
Add support for GitHub Deployment Keys through key comments ( #59 )
...
Fixes #30 , closes #38 .
2021-02-19 14:37:34 +01:00
Matthias Pigulla
edc2fe4f2e
Support container-based workflows and Windows ( #17 )
2021-02-13 21:02:34 +01:00
Matthias Pigulla
3dd57c80a6
Update dependencies ( #43 )
2020-10-07 23:06:49 +02:00
Matthias Pigulla
ef0ce0cab8
Ignore failures when trying to kill the ssh-agent
( #33 )
2020-06-24 08:31:28 +02:00
Thorben Nissen
4fcb25e7ef
Randomize SSH auth socket, kill agent to support non-ephemeral, self hosted runners (@thommyhh, #27 )
...
Thanks to @thommyhh for this contribution!
Unless the `SSH_AUTH_SOCK` is configured explicitly, this change will make the SSH agent use a random file name for the socket. That way, multiple, concurrent SSH agents can be used on non-ephemeral, self-hosted runners.
A new post-action step will automatically clean up the running agent at the end of a job.
Be aware of the possible security implications: Two jobs running on the same runner might be able to access each other's socket and thus access repositories and/or hosts.
2020-05-18 09:08:29 +02:00
Matthias Pigulla
c6eb7ee1d8
Exit with a helpful error message when the secret has not been configured
2020-01-14 09:29:16 +00:00
Matthias Pigulla
6cf6299d23
Support multiple SSH keys ( #14 )
...
* Support concatenation of multiple private keys in the given secret
* Add a changelog
2020-01-14 10:21:11 +01:00
Matthias Pigulla
e181806200
Use $HOME
to support OS X as well ( #2 )
...
This fixes #1 . Windows is currently not supported.
2019-09-15 09:32:43 +02:00
Matthias Pigulla
64d68c7e61
Write GH action to set up ssh keys for private repos
2019-09-14 22:28:16 +00:00