summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorNoah Kantrowitz <noah@coderanger.net>2018-05-30 16:00:07 -0700
committerNoah Kantrowitz <noah@coderanger.net>2018-05-30 16:00:07 -0700
commit16dcca01fad5b48a7c5d146c5b9f28bdefaa8ec0 (patch)
tree21dc164b387b48f42325b7062fc684f657c8e82c
parent3f7ffb322fb8f414ebf28eaa4b6fe4c94d7857a9 (diff)
downloadchef-16dcca01fad5b48a7c5d146c5b9f28bdefaa8ec0.tar.gz
Release notes showing how to use new ssh-agent feature.
Signed-off-by: Noah Kantrowitz <noah@coderanger.net>
-rw-r--r--RELEASE_NOTES.md21
1 files changed, 21 insertions, 0 deletions
diff --git a/RELEASE_NOTES.md b/RELEASE_NOTES.md
index c43c18feed..90ef499b88 100644
--- a/RELEASE_NOTES.md
+++ b/RELEASE_NOTES.md
@@ -52,6 +52,27 @@ suppress the error output when the resource does in fact fail.
- The sysctl resource correctly handles missing keys when used with `ignore_error`
- --recipe-url apparently never worked on Windows. Now it does.
+## `ssh-agent` support for user keys
+
+You can now use `ssh-agent` to hold your user key when using knife. This allows
+storing your user key in an encrypted form as well as using `ssh -A` agent forwarding
+for running knife commands from remote devices.
+
+You can enable this by add `ssh_agent_signing true` to your `knife.rb` or
+`ssh_agent_signing = true` in your `credentials` file.
+
+To encrypt your existing user key, you can use OpenSSL:
+
+```
+( openssl rsa -in user.pem -pubout && openssl rsa -in user.pem -aes256 ) > user_enc.pem
+```
+
+This will prompt you for a passphrase for to use to encrypt the key. You can then
+load the key into your `ssh-agent` by running `ssh-add user_enc.pem`. Make sure
+you add the `ssh_agent_signing` to your configuration, and update your `client_key`
+to point at the new, encrypted key (and once you've verified things are working,
+remember to delete your unencrypted key file).
+
# Ohai Release Notes 14.1:
## Configurable DMI Whitelist