New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Do not re-establish ssh connection while copying each and every secret #102
Comments
@flokli Thanks for this. We actually thought about that when writing the first versions of morph. One major argument against this is to align with how |
This is somewhat scary - how do you envision this to break? |
see also @andrew-d 's comment here: NixOS/nixpkgs#78107 (comment) |
That's right - didn't think about smartcards and such. Another idea - can we A) set |
This variable allows users to specify other custom arguments to be used with ssh and scp. This allows users to take advantage of more advanced ssh features like ControlPath, which could be used to fix \DBCDK#102 among other things.
This variable allows users to specify other custom arguments to be used with ssh and scp. This allows users to take advantage of more advanced ssh features like ControlPath, which could be used to fix DBCDK#102 among other things.
This variable allows users to specify other custom arguments to be used with ssh and scp. This allows users to take advantage of more advanced ssh features like ControlPath, which could be used to fix DBCDK#102 among other things.
It might make sense to have morph use the go ssh client implementation instead of shelling out to the
ssh
binary.This should be a way to address morph failing to deploy without
ssh
in$PATH
(also see NixOS/nixpkgs#78106)On top of that, it might make deploying secrets faster, because we can better reuse an existing session instead of creating a new one each and every time.
cc @johanot
The text was updated successfully, but these errors were encountered: