envbuilder icon indicating copy to clipboard operation
envbuilder copied to clipboard

Allow passing Git SSH key as an environment variable

Open phorcys420 opened this issue 1 year ago • 4 comments

Following up to a discord conversation where an user tries to clone a Git repository via SSH and is met with the following error:

envbuilder v1.0.0-rc.6+23d086e - Build development environments from repositories in a container
coder/coder#1: 🔑 Using SSH authentication!
coder/coder#1: 🔑 No SSH key found, falling back to agent!
coder/coder#1: ❌ Failed to connect to SSH agent: error creating SSH agent: "SSH agent requested but SSH_AUTH_SOCK not-specified"
coder/coder#1: 📦 Cloning [email protected]:XXX.git to /workspaces/XXX...
Failed to clone repository: clone "[email protected]": error creating SSH agent: "SSH agent requested but SSH_AUTH_SOCK not-specified"

Falling back to the default image...

This makes sense because the Coder user's SSH key was never added to the workspace.

While there is a workaround, it's really not great, how can we make this better? With k8s the issue is not that bad since you can just define a secret from the key and pass that secret as a file to the container, but what about Docker and VMs?

Workaround

Downloading the key to some temporary path (via an entrypoint script, since envbox runs before the agent) (or via the TF provider's coder_workspace_owner.ssh_* instead of using a script) Then passing the key's path to ENVBUILDER_GIT_SSH_PRIVATE_KEY_PATH.

phorcys420 avatar Sep 01 '24 10:09 phorcys420

Linking a relevant PR here: https://github.com/coder/envbuilder/pull/174

For now, in the case of both Docker, the best approach is probably to write the key to a path on-disk and bind-mount it into the container. For VMs, it would be a similar process except the SSH key would have to be embedded in the VM's startup metadata. These are both probably involved enough to need their own example templates.

johnstcn avatar Sep 02 '24 10:09 johnstcn

@phorcys420 How about adding ENVBUILDER_GIT_SSH_PRIVATE_KEY_BASE64 for the use-case where writing the key to a file isn't an easy option? I'd like to keep the file option around because some security-conscious orgs don't like having secrets stored in environment variables.

johnstcn avatar Sep 02 '24 14:09 johnstcn

For now, in the case of both Docker, the best approach is probably to write the key to a path on-disk and bind-mount it into the container.

I think this isn't great because it requires an additional step in the Terraform template, in this case they use the user's SSH key, which means storing each user's key then mounting it.

phorcys420 avatar Sep 02 '24 14:09 phorcys420

@phorcys420 How about adding ENVBUILDER_GIT_SSH_PRIVATE_KEY_BASE64 for the use-case where writing the key to a file isn't an easy option? I'd like to keep the file option around because some security-conscious orgs don't like having secrets stored in environment variables.

I think this is a fine workaround given that even if we don't like storing secrets in environment variables, the Coder agent token is stored in the env and allows to get the private key, so no downgrade in terms of security.

I agree, the file option should stay too.

phorcys420 avatar Sep 02 '24 14:09 phorcys420

Hey, Not sure I'm using the right issue or if I should create a new one, but I ended up here after following this and this.

So I'm trying to spin up some workspaces in K8S using some .devcontainers on a remote public gitlab repository that require authentication. As of now, I'd like to use the ssh key provided to the user within his profile to access this repository. In my case my Coder instance is setup to use OIDC from a local Keycloak instance.

My understanding is that envbuilder can do this, if you provide a path to private key file or use SSH_AUTH_SOCK. And I'm suppose to use the first option in a Kubernetes context. However, because its a file that is expected, am I suppose to create a new kubernetes secret from my template that would get details from coder_workspace_owner.private_ssh_key ?

I've tried to do exactly this modifying the default .devcontainer template for K8S to retrieve the owner private key to generate a secret and mount it as a file for envbuilder to use. However, by default the RBAC role cannot create new secret in the coder namespace.

Am I missing something here or is it the current way to go and I need to grant more rights to my role? Also, this sounds like a workaround as it makes the users ssh key appear in my K8S "secrets"

Thanks!

2o1o0 avatar Oct 07 '24 12:10 2o1o0

Am I missing something here or is it the current way to go and I need to grant more rights to my role?

That's correct. If you're using the Helm chart, you can add the required roles and roleBindings to extraTemplates in your values.yaml.

Also, this sounds like a workaround as it makes the users ssh key appear in my K8S "secrets"

Correct, this issue would be the actual fix!

johnstcn avatar Oct 10 '24 12:10 johnstcn

Created a follow-up issue for the provider: https://github.com/coder/terraform-provider-envbuilder/issues/58

johnstcn avatar Oct 25 '24 14:10 johnstcn

stumbling in here and got it running with "ENVBUILDER_GIT_SSH_PRIVATE_KEY_BASE64": base64encode(data.coder_workspace_owner.me.ssh_private_key)

mwiede avatar Mar 14 '25 10:03 mwiede

Wow that's work, why is that not included in the template... weirds...

supanadit avatar Jun 07 '25 07:06 supanadit