-
-
Notifications
You must be signed in to change notification settings - Fork 2.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GitExtensions not using SSH key for authentication, fallsback to basic credential authentication without trying to use keys #9588
Comments
Having what I suspect may be the same problem. At least for my case, there is an additional piece of information: it works just fine if, and only if, I have a PuTTY session for "github.com" defined that specifies the relevant PPK. Notably, if I set the PuTTY session to any other PPK it fails authentication, fairly clearly indicating that it is simply ignoring the file configured in the remote management screen, in favor of using the PuTTY session key. This is quite unfortunate, as it makes it annoying to try to deal with multiple GitHub accounts (for example, personal and work-related) from a single machine. |
No putty sessions
Ge automatically spun up pagent which unlocked key and ssh session started with pagent providing the key. |
Git Extensions version is 3.5.4.12724, Git 2.37.3.windows.1, However, I'll try to check it without any github.org session in PuTTY at all and see if that changes the behavior. |
Unfortunately, even without a PuTTY session for github.com defined, it appears to be unable to authenticate. Looking at the command logs for a "Test Connection" shows an invocation of plink.exe with the -T option and the expected remote target, but nothing that appears that it would specify what key should be used — in particular, not the -i option or a pointer to the private key file. |
Show us. I have proven it works. So I'll bet your config is messed up
somewhere.
|
I think I have the same issue but only with the newest git extensions ''
Use putty as ssh client and have keyfile already loaded with pageant. Do not have the keyfile configured in the remote repository. Somehow the already loaded key won't be used and then throws an error because it can't load the not configured ssh key file. This was working in previous git extension versions (4.0 and below) for me.
|
You still have to set the key. It is how it knows which key. It's in the
remote dialog. Just put the key file in.
|
Previously I did not have to set the key in the remote dialog - as long as the key was already loaded in pageant. I just verified going back to 4.0.0 that there this works just fine. This is my preferred way as I have many repositories cloned and don't have to configure my key for each of them as I only load it once before working with them. |
Setting key in repo helps by letting you see which key later on and will autostart and ask for the password to unlock key if needed. Try it. Don't run pagent. Set remote key file. Do a fetch all. I don't see the issue of hitting browse and finding a file which you could copy the path to beforehand. GE will even handle running pagent for you. |
I have the same problem. Weird thing is that pull from private repository works, but push results in the abovementioned exception 🤔 It's caused by 4.0.1 upgrade. Setting the key works, but I think it's a needless hurdle, because it worked just fine without it. |
I just encountered this. Thank you for the solution. |
While I also agree, this seems unnecessary, I also ask myself, why this is changed moving from 4.0.0 to 4.0.1. This requires user action to work around. Not something you'd expect from a patch-version. |
Now that I've done it with approximately 10 repositories over the last few days (my company have like 200 repositories, that are needed from time to time), I came back to say it's more then just a needless hurdle 😔 Let me assure you it does not feel great criticising a work someone's doing for free and I'm not doing it lightly. But this really seems like a big step back in useability. Thanks for the work all the contributors are doing! |
The problem of requiring the PPK file AND NOT reading Pagent A SmartCard person is a PuTTY-CAC person. - https://risacher.org/putty-cac/ vbjay said:
The problem of requiring a PPK file AND NOT reading Pagent
One should be able to both use the
(and do both conveniently). I propose something like this (
and with
|
Please test/review the linked pr |
@gerhardol, |
Already thanking for the efforts! |
Resolves gitextensions#10530 Resolves gitextensions#10555 Resolves gitextensions#10562 Resolves gitextensions#10565 Resolves gitextensions#10569 Resolves gitextensions#9588
Current behaviour
Git Extensions does not add/use SSH keys
Expected behaviour
Git Extensions adds/uses SSH keys
Steps to reproduce
I've also manually added the key into the putty keystore and the behaviour does not change.
Did this work in previous version of GitExtensions
No. It's never worked and now I can't use credentials to authenticate with github.
Environment
The text was updated successfully, but these errors were encountered: