-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Refine public key usage when remote #8676
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: jwhonce The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
@ashley-cui Do you want to see how this works for you? I still have the issue where sshd allows the ssh command to use RSA keys but denies the golang agent. Tweaking the connection creation should help with the login prompting. |
* Move all public key handling into one AuthMethod. Prioritize ssh-agent keys over identity files. * Cache server connection when tunneling, saves one RoundTrip on ssh handshake Signed-off-by: Jhon Honce <[email protected]>
@containers/podman-maintainers PTAL |
I'm still running into the the key passphrase prompt when there is an identity file containers.conf. It looks like its going through the dedup though
|
@ashley-cui Understood. If you provide that identity file, I need the passphrase to read it before I can dedup the list of keys to throw it away... hen vs egg issue |
merging as-is to clean up some use cases, knowing RSA and the public key with identity file issues exist |
@containers/podman-maintainers PTAL |
LGTM |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
handshake
Signed-off-by: Jhon Honce [email protected]