-
Notifications
You must be signed in to change notification settings - Fork 690
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use SSHUserPrivateKey instead of BasicSSHUserPrivateKey #520
Use SSHUserPrivateKey instead of BasicSSHUserPrivateKey #520
Conversation
Can't proceed on this until we have a way to test the change. What are the relevant tests to modify? |
@res0nance I believe you're one of the maintainers - would you be able to advise where the tests are for using SSH keys from the credentials API, and thus which tests I should modify to ensure this fix works? |
Hey Chris, just saw this, give me a bit to double check this bit. |
Hey Chris i added a test in #523 which should help you out |
9be27df
to
cde098f
Compare
I've pinged the reporter to ask if he'd like to test a build of the fix in his local Jenkins |
Mark has confirmed that it works. He also said it might be worth putting out a notice of a breaking change for JCasC, since we have to change the config or our clouds will be unable to start. |
Chris,
We ran into this issue using the AWS Secrets Manager Credential Provider
plugin as the source of our credentials.
We can test this if you can provide a link to the plugin version to install.
johnl
…On Wed, Oct 28, 2020 at 11:16 AM Chris Kilding ***@***.***> wrote:
I've pinged the reporter to ask if he'd like to test a build of the fix in
his local Jenkins
—
You are receiving this because you are subscribed to this thread.
Reply to this email directly, view it on GitHub
<#520 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ACVSUPI32L2VB7UXMF7TOS3SNA7UXANCNFSM4S3HEJDQ>
.
|
The plugin build with the fix can be found at: We've had a confirmation that it works so it should be good to merge, but if you need the fix in the meantime, here it is :) |
I can confirm that this PR fixes our issue and allows access to the AWS
secrets manager credentials via the secrets manager credential provider
plugin.
…On Wed, Oct 28, 2020 at 5:52 PM Chris Kilding ***@***.***> wrote:
The plugin build with the fix can be found at:
https://ci.jenkins.io/job/Plugins/job/ec2-plugin/job/PR-520/5/artifact/org/jenkins-ci/plugins/ec2/1.54-rc1218.bd9a8dd69948/ec2-1.54-rc1218.bd9a8dd69948.hpi
We've had a confirmation that it works so it should be good to merge, but
if you need the fix in the meantime, here it is :)
—
You are receiving this because you commented.
Reply to this email directly, view it on GitHub
<#520 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ACVSUPPXKILNWJ6YC4WTK5DSNCODJANCNFSM4S3HEJDQ>
.
|
Use the general
SSHUserPrivateKey
type when looking up SSH credentials instead of theBasicSSHUserPrivateKey
concrete subtype. This will allow the plugin to use any compatible SSH key, not justBasicSSHUserPrivateKey
instances.Fixes JENKINS-63986