ssh-fob | SSH private keys on a USB keychain | SSH Utils library

 by   DamnedFacts Shell Version: Current License: No License

kandi X-RAY | ssh-fob Summary

kandi X-RAY | ssh-fob Summary

ssh-fob is a Shell library typically used in Utilities, SSH Utils applications. ssh-fob has no bugs, it has no vulnerabilities and it has low support. You can download it from GitHub.

Keep your SSH private keys on a USB keychain; use a script to initialize a self-destructing ssh-agent instance
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              ssh-fob has a low active ecosystem.
              It has 17 star(s) with 1 fork(s). There are 2 watchers for this library.
              OutlinedDot
              It had no major release in the last 6 months.
              ssh-fob has no issues reported. There are no pull requests.
              It has a neutral sentiment in the developer community.
              The latest version of ssh-fob is current.

            kandi-Quality Quality

              ssh-fob has no bugs reported.

            kandi-Security Security

              ssh-fob has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.

            kandi-License License

              ssh-fob does not have a standard license declared.
              Check the repository for any license declaration and review the terms closely.
              OutlinedDot
              Without a license, all rights are reserved, and you cannot use the library in your applications.

            kandi-Reuse Reuse

              ssh-fob releases are not available. You will need to build from source code and install.
              Installation instructions are not available. Examples and code snippets are available.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of ssh-fob
            Get all kandi verified functions for this library.

            ssh-fob Key Features

            No Key Features are available at this moment for ssh-fob.

            ssh-fob Examples and Code Snippets

            No Code Snippets are available at this moment for ssh-fob.

            Community Discussions

            QUESTION

            Jenkins pipeline - use ssh agent to clone a repository in another machine through ssh
            Asked 2018-Sep-12 at 18:15

            Use case: I have a Jenkins pipeline to update my development environment. My dev env is an EC2 aws instance with docker compose.

            The automation was written along the lines of:

            ...

            ANSWER

            Answered 2018-Sep-12 at 16:31

            First some background to understand the reasoning (this is pure ssh, no Jenkins or Mercurial specific): the ssh-agent utility works by making a UNIX domain socket to be then used by ssh. The ssh command attempts to communicate with the agent if it finds the the environment variable SSH_AUTH_SOCK. In addition, ssh can be instructed to forward the agent, via -A. For more details, see the man pages of ssh-agent and ssh.

            So, assuming that your withAWS context makes the environment variable SSH_AUTH_SOCK (set by the plugin) available, I think it should be enough to:

            • add -A to your ssh invocation
            • in the part 'run some command like docker pull', add the hg clone command, ensuring you are using the ssh:// schema for the mercurial URL.

            Security observation: -o StrictHostKeyChecking=no should be used as a last resort. From your example, the IP address of the target is fixed, so you should do the following:

            • remove the -o StrictHostKeyChecking=no
            • one-shot: get the host fingerprint of 123.456.789 (for example by ssh-ing into it and then looking for the associated line in your $HOME/.known_hosts). Save that line in a file, say 123.456.789.fingerpint
            • make the file 123.456.789.fingerprint available to Jenkins when it is invoking your sample code. This can be done by committing that file in the repo that contains the Jenkins pipeline, it is safe to do so since it doesn't contain secrets.
            • Finally, change your ssh invocation to something like ssh -o UserKnownHostsFile=/path/to/123.456.789.fingerprint ...

            Source https://stackoverflow.com/questions/52297343

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install ssh-fob

            You can download it from GitHub.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries
            CLONE
          • HTTPS

            https://github.com/DamnedFacts/ssh-fob.git

          • CLI

            gh repo clone DamnedFacts/ssh-fob

          • sshUrl

            git@github.com:DamnedFacts/ssh-fob.git

          • Stay Updated

            Subscribe to our newsletter for trending solutions and developer bootcamps

            Agree to Sign up and Terms & Conditions

            Share this Page

            share link

            Explore Related Topics

            Consider Popular SSH Utils Libraries

            openssl

            by openssl

            solid

            by solid

            Bastillion

            by bastillion-io

            sekey

            by sekey

            sshj

            by hierynomus

            Try Top Libraries by DamnedFacts

            actuonix-lac

            by DamnedFactsPython

            flask-boilerplate

            by DamnedFactsCSS

            rocpy-website

            by DamnedFactsJavaScript

            coursetools

            by DamnedFactsPython

            flask_contact

            by DamnedFactsPython