diff options
author | Noah Kantrowitz <noah@coderanger.net> | 2018-05-30 16:00:07 -0700 |
---|---|---|
committer | Noah Kantrowitz <noah@coderanger.net> | 2018-05-30 16:00:07 -0700 |
commit | 16dcca01fad5b48a7c5d146c5b9f28bdefaa8ec0 (patch) | |
tree | 21dc164b387b48f42325b7062fc684f657c8e82c | |
parent | 3f7ffb322fb8f414ebf28eaa4b6fe4c94d7857a9 (diff) | |
download | chef-16dcca01fad5b48a7c5d146c5b9f28bdefaa8ec0.tar.gz |
Release notes showing how to use new ssh-agent feature.
Signed-off-by: Noah Kantrowitz <noah@coderanger.net>
-rw-r--r-- | RELEASE_NOTES.md | 21 |
1 files changed, 21 insertions, 0 deletions
diff --git a/RELEASE_NOTES.md b/RELEASE_NOTES.md index c43c18feed..90ef499b88 100644 --- a/RELEASE_NOTES.md +++ b/RELEASE_NOTES.md @@ -52,6 +52,27 @@ suppress the error output when the resource does in fact fail. - The sysctl resource correctly handles missing keys when used with `ignore_error` - --recipe-url apparently never worked on Windows. Now it does. +## `ssh-agent` support for user keys + +You can now use `ssh-agent` to hold your user key when using knife. This allows +storing your user key in an encrypted form as well as using `ssh -A` agent forwarding +for running knife commands from remote devices. + +You can enable this by add `ssh_agent_signing true` to your `knife.rb` or +`ssh_agent_signing = true` in your `credentials` file. + +To encrypt your existing user key, you can use OpenSSL: + +``` +( openssl rsa -in user.pem -pubout && openssl rsa -in user.pem -aes256 ) > user_enc.pem +``` + +This will prompt you for a passphrase for to use to encrypt the key. You can then +load the key into your `ssh-agent` by running `ssh-add user_enc.pem`. Make sure +you add the `ssh_agent_signing` to your configuration, and update your `client_key` +to point at the new, encrypted key (and once you've verified things are working, +remember to delete your unencrypted key file). + # Ohai Release Notes 14.1: ## Configurable DMI Whitelist |