capistrano-ssh-authorized-keys-github 1.0.1 → 1.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: fdeace2093ea8dd5b0326e751fe39daaf0976d9815949063d0a041b579637db4
|
4
|
+
data.tar.gz: 5dcd586bbab56363ee751a3379354bfb93861e6dff1e645d78194eb530d86945
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: f5e563b6bcb8f601cb0d31c846869c8d62bff34d2154fd356c0c6596f695ed2238a152abfb3e50871ab1b20b8d581f5e17734a88a9af2770351c58bacc3f4fa5
|
7
|
+
data.tar.gz: e740b5181dcf8f7eb9915d9395c7bef55c222249980c3866cb771d2cc151c7ee61ef948b14b081e9562dec467314f21fe5207140b55f298dc359b3a04d5d0fd0
|
data/README.md
CHANGED
@@ -2,6 +2,8 @@
|
|
2
2
|
|
3
3
|
Sync organisation SSH public keys to server `authorized_keys` file so they are able to SSH into OS - for [Capistrano v3](https://github.com/capistrano/capistrano).
|
4
4
|
|
5
|
+
Note: The authorized keys file is generated locally before being uploaded to the server(s).
|
6
|
+
|
5
7
|
## Installation
|
6
8
|
|
7
9
|
Add this line to your application's Gemfile:
|
@@ -27,6 +29,9 @@ And then set the variables in `config/deploy.rb`:
|
|
27
29
|
set :github_org, 'olioex'
|
28
30
|
# ...or... (takes priority)
|
29
31
|
set :github_orgs, ['olioex', 'github']
|
32
|
+
# Optional for Github rate limits (oauth application)
|
33
|
+
set :github_app_id, '12345'
|
34
|
+
set :github_app_secret, 'abcdef'
|
30
35
|
|
31
36
|
The task will run automatically on successful deploy. Alternatively, you can notify of a deploy starting manually by using:
|
32
37
|
|
@@ -4,7 +4,7 @@ $LOAD_PATH.unshift(lib) unless $LOAD_PATH.include?(lib)
|
|
4
4
|
|
5
5
|
Gem::Specification.new do |spec|
|
6
6
|
spec.name = 'capistrano-ssh-authorized-keys-github'
|
7
|
-
spec.version = '1.0
|
7
|
+
spec.version = '1.1.0'
|
8
8
|
spec.authors = ['lloydwatkin']
|
9
9
|
spec.email = ['lloyd@olioex.com']
|
10
10
|
spec.summary = %q{Sync Github organisation public SSH keys to `server authorized_keys` file}
|
@@ -8,15 +8,18 @@ NO_ORGANISATION_MEMBER_KEYS_FOUND = 'There are no public members for this Github
|
|
8
8
|
namespace :security do
|
9
9
|
desc 'Cycle SSH key logins'
|
10
10
|
task :update_ssh_keys do
|
11
|
-
on roles(:all) do
|
11
|
+
on roles(:all) do |host|
|
12
12
|
organisations = fetch(:github_orgs) || fetch(:github_org) || raise(NO_GITHUB_ORGANISATION_PROVIDED)
|
13
13
|
keys = ""
|
14
|
-
|
14
|
+
authentication = ''
|
15
|
+
if fetch(:github_app_id) && fetch(:github_app_secret)
|
16
|
+
authentication = "#{fetch(:github_app_id)}:#{fetch(:github_app_secret)}@"
|
17
|
+
end
|
15
18
|
|
16
19
|
[*organisations].each do |organisation|
|
17
|
-
url = URI("https
|
20
|
+
url = URI("https://#{authentication}api.github.com/orgs/#{organisation}")
|
18
21
|
organisation_details = JSON.parse(Net::HTTP.get_response(url).body, symbolize_names: true)
|
19
|
-
members_url = URI(organisation_details[:members_url].gsub("{/member}", ""))
|
22
|
+
members_url = URI(organisation_details[:members_url].gsub("{/member}", "").gsub('https://', "https://#{authentication}"))
|
20
23
|
members = JSON.parse(Net::HTTP.get_response(members_url).body, symbolize_names: true)
|
21
24
|
keys += " #
|
22
25
|
# #{organisation_details[:name]} keys
|
@@ -27,7 +30,7 @@ namespace :security do
|
|
27
30
|
"
|
28
31
|
member_details = members.map { |member| member[:login].downcase }.sort
|
29
32
|
member_details.each do |member|
|
30
|
-
member_keys = URI("https
|
33
|
+
member_keys = URI("https://#{authentication}github.com/#{member}.keys")
|
31
34
|
info = " #
|
32
35
|
# @#{member}
|
33
36
|
# #{member_keys}
|
@@ -38,9 +41,11 @@ namespace :security do
|
|
38
41
|
end
|
39
42
|
|
40
43
|
if keys.scan(/ssh-(rsa|ed25519)/).count > 0
|
41
|
-
File.open("/
|
44
|
+
File.open("./tmp/authorized_keys", "w") do |f|
|
42
45
|
f.write(keys)
|
43
46
|
end
|
47
|
+
upload! './tmp/authorized_keys', "/tmp/authorized_keys"
|
48
|
+
execute :mv, "/tmp/authorized_keys", "~/.ssh/authorized_keys"
|
44
49
|
else
|
45
50
|
raise NO_ORGANISATION_MEMBER_KEYS_FOUND
|
46
51
|
end
|