Michael Hipp
1711bb1971
Update GitHub deploy key log comment to specify public key
2021-09-01 11:40:04 -07:00
Maciej Pasternacki
a45226bfaf
Use execFileSync to clean up ( #80 )
...
execSync just started a second ssh-agent. `['-k']` argument was
treated as options, it didn't have `stdio` set, so stdio was piped and
returned (and ignored).
2021-06-11 15:17:22 +02:00
Matthias Pigulla
aed5400f20
Log when a key is _not_ used as a deploy key
...
Resolves #69 .
Co-authored-by: Sean Killeen <SeanKilleen@gmail.com>
2021-03-17 18:50:49 +00:00
Matthias Pigulla
4681241867
Use case-insensitive regex matching when scanning key comments
...
Resolves #68 , closes #70 , closes #71 .
Co-authored-by: Sean Killeen <SeanKilleen@gmail.com>
2021-03-17 18:27:52 +00:00
Matthias Pigulla
4b6f4eb000
Windows virtual environment: Use SSH binaries from the Git suite ( #63 )
...
* Use SSH binaries from the Git suite
* Try to kill the ssh-agent upon action termination on Windows as well
2021-03-10 08:19:17 +01:00
Matthias Pigulla
598c7ea894
Handle ENOENT exceptions with a graceful message
2021-03-05 20:17:14 +00:00
Matthias Pigulla
4d06ea6a33
Add support for GitHub Deployment Keys through key comments ( #59 )
...
Fixes #30 , closes #38 .
2021-02-19 14:37:34 +01:00
Matthias Pigulla
edc2fe4f2e
Support container-based workflows and Windows ( #17 )
2021-02-13 21:02:34 +01:00
Matthias Pigulla
3dd57c80a6
Update dependencies ( #43 )
2020-10-07 23:06:49 +02:00
Matthias Pigulla
ef0ce0cab8
Ignore failures when trying to kill the ssh-agent
( #33 )
2020-06-24 08:31:28 +02:00
Thorben Nissen
4fcb25e7ef
Randomize SSH auth socket, kill agent to support non-ephemeral, self hosted runners (@thommyhh, #27 )
...
Thanks to @thommyhh for this contribution!
Unless the `SSH_AUTH_SOCK` is configured explicitly, this change will make the SSH agent use a random file name for the socket. That way, multiple, concurrent SSH agents can be used on non-ephemeral, self-hosted runners.
A new post-action step will automatically clean up the running agent at the end of a job.
Be aware of the possible security implications: Two jobs running on the same runner might be able to access each other's socket and thus access repositories and/or hosts.
2020-05-18 09:08:29 +02:00
Matthias Pigulla
c6eb7ee1d8
Exit with a helpful error message when the secret has not been configured
2020-01-14 09:29:16 +00:00
Matthias Pigulla
6cf6299d23
Support multiple SSH keys ( #14 )
...
* Support concatenation of multiple private keys in the given secret
* Add a changelog
2020-01-14 10:21:11 +01:00
Matthias Pigulla
e181806200
Use $HOME
to support OS X as well ( #2 )
...
This fixes #1 . Windows is currently not supported.
2019-09-15 09:32:43 +02:00
Matthias Pigulla
64d68c7e61
Write GH action to set up ssh keys for private repos
2019-09-14 22:28:16 +00:00