-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GitHub proxy part 6: proxing Git using SSH transport #49980
Conversation
73db1b8
to
1cd0ec1
Compare
a5cb9a6
to
97bbddf
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Are you sure that hooking into lib/srv/forward.Server
to essentially add a completely separate mode gated by a flag (or like three different and potentially conflicting flags) is easier than writing something new that's going to be structurally guaranteed to work as intended just for the purpose of forwarding the ssh git protocol?
will do 👍 |
i am splitting out some parts of this PR to separate ones like |
97bbddf
to
2345ca3
Compare
@greedy52 - this PR will require admin approval to merge due to its size. Consider breaking it up into a series smaller changes. |
@espadolini PTAL |
The very first git proxy poc is actually http-based for AWS CodeCommit using AWS app access. But AWS CodeCommit is dead now. Like Edoardo said, this is what we end up with after a few iterations of poc and RFD discussions. GitLab supports SSH CA as well. Even if we have to do HTTP later, I don't think it's that difficult. |
b05b384
to
58ca650
Compare
@espadolini @Tener could you take another look? thanks! |
@@ -626,6 +626,9 @@ func (s *ServerV2) githubCheckAndSetDefaults() error { | |||
return trace.Wrap(err, "invalid GitHub organization name") | |||
} | |||
|
|||
// Set SSH host port for connection and "fake" hostname for routing. These | |||
// values are hard-coded and cannot be customized. | |||
s.Spec.Addr = "github.com:22" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Does this have to happen in CASD?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I could move it to backend create but I would prefer it here as it should not have other values.
@r0mant may i get an admin approval for the large size and an excludeflake? flaky test detector failed on
There is no change to that package besides adding a new param to reverse tunnel server to three existing tests. |
/excludeflake * |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Bot.
Related:
will stack another PR for
tsh git ssh/config/clone
commands on top of this