-
-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSH using wrong account #1195
Comments
The same goes in the following scenario: SSH key Repository: Result in the repo server logs:
This actually prevents me from using Semaphore in a normal way, we currently have our code checked out manually in the semaphore user's homedir.. |
I also experience this problem. I use a private gitea server instance with their internal ssh server which uses the user
While ssh deploy keys would definitely be the much preferred option due to better access control, I now use https based authentication as a workaround until this is fixed. |
Hey, It's far from perfect, but a workaround is changing the username that is staticly set to 'git' in the getAuthMethod function in lib/GoGitClient.go (line 34), and recompile. This workaround will only be useful if all your external SSH repositories accept the new username and don't use the 'git' username. I havent tested this against a Git server yet, but SSH-server logging shows that Semaphore will use the changed username. If I have some time Ill try my hand at making it use the optional username value that can be set when adding a SSH-key to the key-store. EDIT: See; PR #1221 |
AlmaLinux 8.6
Snapd 2.56.2-1 installed from epel
Semaphore v2.8.74
I configured Semaphore with key-based authentication. The username is “ansible”.
When snapd updates Semaphore to the most recent release, all SSH connection to download the most recent repos are using the “git” user.
Reconfiguring the key store doesn’t change the behavior.
I need to continue to use the “ansible” user.
The text was updated successfully, but these errors were encountered: