Sha256: c3fb7a57695217189aaf9048aad976de4cf9589662ff62b3670e4cea7a088d35

Contents?: true

Size: 803 Bytes

Versions: 18

Compression:

Stored size: 803 Bytes

Contents

# How to Forward ssh(1) Agent

`ssh(1)` agent forwarding can is activated in the `CONFIG` section of the hosts
file:

~~~yaml
HOSTS:
  ...
CONFIG:
  forward_ssh_agent: true
~~~

Beaker will then make the ssh agent running on the beaker coordinator available to the Systems Under Test (SUT).  There is
a gotcha though: the agent socket file in the SUT is only available
to the user who signed in.  If you want to access remote machine resources as
another user, you *must* change the socket permission.

A dirty hack is to `chmod -R 777 /tmp/ssh-*` before changing to another user
and relying on `$SSH_AUTH_SOCK`.

Example:

~~~puppet
exec { '/bin/chmod -R 777 /tmp/ssh-*':
} ->
vcsrepo { '/var/www/app':
  provider => 'git',
  source   => 'https://example.com/git/app.git',
  user     => 'deploy'
}
~~~

Version data entries

18 entries across 18 versions & 1 rubygems

Version Path
beaker-3.13.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.12.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.11.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.10.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.9.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.8.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.7.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.6.0 docs/how_to/ssh_agent_forwarding.md
beaker-2.52.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.5.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.4.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.3.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.2.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.1.0 docs/how_to/ssh_agent_forwarding.md
beaker-3.0.0 docs/how_to/ssh_agent_forwarding.md
beaker-2.51.0 docs/how_to/ssh_agent_forwarding.md
beaker-2.50.0 docs/how_to/ssh_agent_forwarding.md
beaker-2.49.0 docs/how_to/ssh_agent_forwarding.md