-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SSH Proxy Support #1709
Comments
FYI: CoreOS team has been solving the same issue: https://github.com/coreos/fleet/blob/19f0423fce91d6b50d6a4ab8b63f65970d83a5c5/ssh/ssh.go#L224-264 Another issue, which I'm surprised nobody brought here yet is SSH-agent (key forwarding), which makes me think that everyone just use |
Cool thanks for that link! Will definitely take a look. Re agent-forwarding: I didn't say it out loud, but I sort of consider agent-forwarding to be a required piece of this feature. Will update the title to reflect. 👌 |
Oh nevermind we already have an issue to track the agent forwarding side of things #1630 |
Ah, so it was just me being blind... 🙈 |
+1 |
Possibly helpful: http://godoc.org/dev.justinjudd.org/justin/easyssh. @phinze I recently spent a bit of time puzzling through some SSH server code while writing https://github.com/josharian/packer-provisioner-tunnel/, and this is something our team is excited about, so please let me know if I can help in any way. |
Glider Labs can implement this if somebody is willing to sponsor. |
+1 |
+1, this is a blocker for our use of Terraform. |
@pikeas, it seems like you could come up with a temporary workaround to start putting Terraform to use (you'll start reaping back rewards in saved time), while knowing you'll have a solution for the long-haul? |
@phinze, |
@mrwacky42 think you have a point... |
@mrwacky42 you really are onto something here.. in an instant.. you have made me realize how frustrating it is when tools either do not do this, or do not play nice with SSH at all. ++ to reading SSH configs, and for that to support specifing the path to the SSH config file to use. |
@hanwen thoughts? |
There is no need to change the ssh package. You can write your config parser as a separate package. |
+1 for the ssh proxy and options support. Without this, half of terraform is unfortunately unusable for me. |
+1 |
1 similar comment
+1 |
This has hung out for some time while I percolated on the proper abstraction for config, and I ended up deciding that I'd rather get the basic functionality out to users in the forthcoming 0.6 release rather than wait for the perfect idea to strike. I agree that extending PR pushed over here #2425 - should make it in for 0.6.0. Feel free to take it for a spin! And if any of you want to take a stab at SSH options support / config parsing - I'm sure both the Terraform and the Go communities would be excited to hear it. 👍 |
\o/ Will surely take this for a spin! Thanks @phinze for choosing to take action on what was simple and clear.. |
thanks @phinze and team! can't wait to try this out. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
I've been working on this already, but kicking off an issue so interested parties can track when it's done.
We'd like Terraform's remote-exec provisioner to support infrastructures with bastion hosts, which means we need SSH proxy support.
Go's
crypto/ssh
doesn't support openssh options, so we'll need to bake in our own proxy support along the lines of this example from the golang-nuts ML.Tentative syntax for the feature:
The text was updated successfully, but these errors were encountered: