Title: Unintentional Identity file signing · Issue #26 · lyft/python-blessclient · GitHub
Open Graph Title: Unintentional Identity file signing · Issue #26 · lyft/python-blessclient
X Title: Unintentional Identity file signing · Issue #26 · lyft/python-blessclient
Description: Hi, while troubleshooting some unrelated problems I noticed this client is generated signed key certs for any identity that we use in the in the ssh command. The culprit seems to be this: https://github.com/lyft/python-blessclient/blob/m...
Open Graph Description: Hi, while troubleshooting some unrelated problems I noticed this client is generated signed key certs for any identity that we use in the in the ssh command. The culprit seems to be this: https://g...
X Description: Hi, while troubleshooting some unrelated problems I noticed this client is generated signed key certs for any identity that we use in the in the ssh command. The culprit seems to be this: https://g...
Opengraph URL: https://github.com/lyft/python-blessclient/issues/26
X: @github
Domain: patch-diff.githubusercontent.com
{"@context":"https://schema.org","@type":"DiscussionForumPosting","headline":"Unintentional Identity file signing ","articleBody":"Hi, while troubleshooting some unrelated problems I noticed this client is generated signed key certs for any identity that we use in the in the ssh command.\r\nThe culprit seems to be this:\r\nhttps://github.com/lyft/python-blessclient/blob/master/blessclient/client.py#L171\r\n\r\ncalled here:\r\nhttps://github.com/lyft/python-blessclient/blob/master/blessclient/client.py#L448\r\n\r\nGiven an ssh config as recommended: \r\n```\r\nMatch exec \"env | grep -q BLESS_COMPLETE || /Users/stype/blessclient/blessclient.run --gui --host '%h'\"\r\n\tIdentityFile ~/.ssh/blessid\r\n```\r\n\r\nIf we are to call any other ssh command as:\r\n`ssh -i ~/.ssh/mykey user@host` \r\nand we didn't have a filter on `domain_regex:` blessclient will still generate and sign the `mykey` key.\r\n\r\nWhile I believe this could be in some case desired functionality(when doing `ssh` wrapping instead of ssh config), I think it might be better to just let it toggle via an env var or the existing `BLESS_IDENTITYFILE` as in most cases than not if you specify a particular identity on the command line, you want to use exactly that to auth and signing is unnecessary.\r\n\r\nIf this is accepted I can create a PR to cleanup/implement this.\r\n\r\n ","author":{"url":"https://github.com/pecigonzalo","@type":"Person","name":"pecigonzalo"},"datePublished":"2018-01-09T16:58:25.000Z","interactionStatistic":{"@type":"InteractionCounter","interactionType":"https://schema.org/CommentAction","userInteractionCount":0},"url":"https://github.com/26/python-blessclient/issues/26"}
| route-pattern | /_view_fragments/issues/show/:user_id/:repository/:id/issue_layout(.:format) |
| route-controller | voltron_issues_fragments |
| route-action | issue_layout |
| fetch-nonce | v2:8a79d64c-c44c-a12c-31e9-56f20ebe7b11 |
| current-catalog-service-hash | 81bb79d38c15960b92d99bca9288a9108c7a47b18f2423d0f6438c5b7bcd2114 |
| request-id | D2BA:3EEA8F:27CBE7B:336FCDD:69749755 |
| html-safe-nonce | 4cd768147eebd70b92c4d2d6791f2b452d99a1bd10f45fe271542ae14aed0b2b |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJEMkJBOjNFRUE4RjoyN0NCRTdCOjMzNkZDREQ6Njk3NDk3NTUiLCJ2aXNpdG9yX2lkIjoiMzE3MDEwNTQ2NzM0MjE5ODYxMyIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9 |
| visitor-hmac | 8e7e4fdd782bc52e371a64c013765d6cde533564b86aa0b4bcc8f0f8743bcbb6 |
| hovercard-subject-tag | issue:287159656 |
| github-keyboard-shortcuts | repository,issues,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/_view_fragments/issues/show/lyft/python-blessclient/26/issue_layout |
| twitter:image | https://opengraph.githubassets.com/41ef0cdc51d74a3c39267de815ab8ee0e1095004f1d912df41a9631a4c71c826/lyft/python-blessclient/issues/26 |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/41ef0cdc51d74a3c39267de815ab8ee0e1095004f1d912df41a9631a4c71c826/lyft/python-blessclient/issues/26 |
| og:image:alt | Hi, while troubleshooting some unrelated problems I noticed this client is generated signed key certs for any identity that we use in the in the ssh command. The culprit seems to be this: https://g... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| og:author:username | pecigonzalo |
| hostname | github.com |
| expected-hostname | github.com |
| None | 4a4bf5f4e28041a9d2e5c107d7d20b78b4294ba261cab243b28167c16a623a1f |
| turbo-cache-control | no-preview |
| go-import | github.com/lyft/python-blessclient git https://github.com/lyft/python-blessclient.git |
| octolytics-dimension-user_id | 4269340 |
| octolytics-dimension-user_login | lyft |
| octolytics-dimension-repository_id | 80176210 |
| octolytics-dimension-repository_nwo | lyft/python-blessclient |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | false |
| octolytics-dimension-repository_network_root_id | 80176210 |
| octolytics-dimension-repository_network_root_nwo | lyft/python-blessclient |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 488b30e96dfd057fbbe44c6665ccbc030b729dde |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width