Commit graph

30 commits

Author SHA1 Message Date
Matthias Pigulla
88bcf9af86 Use IdentitiesOnly=no 2021-03-01 10:53:18 +00:00
Matthias Pigulla
02a6899abb Keep output 2021-03-01 10:50:07 +00:00
Matthias Pigulla
7f61bbc4ae Use different ssh-add command for Windows/!Windows 2021-03-01 09:41:11 +00:00
Matthias Pigulla
1606d19f15 Preserve process.env so the PATH (and possibly other) vars are availabe 2021-03-01 09:24:06 +00:00
Matthias Pigulla
8addcca750 Debug with ngrok/ssh 2021-03-01 08:47:08 +00:00
Matthias Pigulla
166067472e More debugging 2021-03-01 08:35:43 +00:00
Matthias Pigulla
f78cad1cc7 Try to output ssh-add failure 2021-03-01 08:19:03 +00:00
Matthias Pigulla
ccd95b931d Use execSync instead of execFileSync 2021-03-01 08:16:26 +00:00
Matthias Pigulla
637f9c791e Fix execFileSync call 2021-03-01 08:15:05 +00:00
Matthias Pigulla
18f53866de Use absolute path for askpass.exe 2021-03-01 08:13:10 +00:00
Matthias Pigulla
c91aeeb123 Fake askpass 2021-03-01 08:09:30 +00:00
Matthias Pigulla
9406a51fa5 Remove stdio: 'inherit' 2021-02-28 16:07:26 +00:00
Matthias Pigulla
ef63fdb1df Fix syntax 2021-02-28 16:04:53 +00:00
Matthias Pigulla
7fc4d80a06 Debug output 2021-02-28 15:58:23 +00:00
Matthias Pigulla
9b7e80db62 Use exec 2021-02-28 15:55:23 +00:00
Matthias Pigulla
4d491fcb08 Fix ssh-add syntax (?) 2021-02-28 15:53:33 +00:00
Matthias Pigulla
1676d1f2a9 Use an askpass wrapper 2021-02-28 15:52:09 +00:00
Matthias Pigulla
3702096734 Try writing keys to disk and encrypting them 2021-02-28 15:05:09 +00:00
Matthias Pigulla
5e4ad4bcc8 Explicitly disable IdentitiesOnly 2021-02-27 18:25:44 +00:00
Matthias Pigulla
bcd9c12595 Print key file name 2021-02-27 11:05:12 +00:00
Matthias Pigulla
05624726bc Remove "IdentitiesOnly" 2021-02-27 11:00:51 +00:00
Matthias Pigulla
4d06ea6a33
Add support for GitHub Deployment Keys through key comments (#59)
Fixes #30, closes #38.
2021-02-19 14:37:34 +01:00
Matthias Pigulla
edc2fe4f2e
Support container-based workflows and Windows (#17) 2021-02-13 21:02:34 +01:00
Thorben Nissen
4fcb25e7ef
Randomize SSH auth socket, kill agent to support non-ephemeral, self hosted runners (@thommyhh, #27)
Thanks to @thommyhh for this contribution!

Unless the `SSH_AUTH_SOCK` is configured explicitly, this change will make the SSH agent use a random file name for the socket. That way, multiple, concurrent SSH agents can be used on non-ephemeral, self-hosted runners.

A new post-action step will automatically clean up the running agent at the end of a job.

Be aware of the possible security implications: Two jobs running on the same runner might be able to access each other's socket and thus access repositories and/or hosts.
2020-05-18 09:08:29 +02:00
Benjamin Borowski
0a38ab0926 style: lint
just reviewing and noticed a missing space
2020-03-03 05:10:01 -08:00
Josh Mandel
cf56a519af
Remove redundant .trim() 2020-02-06 12:09:44 -06:00
Matthias Pigulla
c6eb7ee1d8 Exit with a helpful error message when the secret has not been configured 2020-01-14 09:29:16 +00:00
Matthias Pigulla
6cf6299d23
Support multiple SSH keys (#14)
* Support concatenation of multiple private keys in the given secret

* Add a changelog
2020-01-14 10:21:11 +01:00
Matthias Pigulla
e181806200
Use $HOME to support OS X as well (#2)
This fixes #1. Windows is currently not supported.
2019-09-15 09:32:43 +02:00
Matthias Pigulla
64d68c7e61 Write GH action to set up ssh keys for private repos 2019-09-14 22:28:16 +00:00