Replies: 14 comments
-
|
Wow this is pretty bad, just ran into this and it's a massive problem resulting in a number of stupid work arounds like having to create a fake user account and add ssh keys to it... |
Beta Was this translation helpful? Give feedback.
-
|
I'd like to know the reasoning behind why it's more secure to have a unique key for each account. If the computer hosting the keys is compromised, all the keys will be compromised anyways! |
Beta Was this translation helpful? Give feedback.
-
|
This has been a thorn in our flesh for a while now. We have a few repositories that has to be deployed in a single server, and we are currently managing it by generating individual keys for each repository to be able to pull their respective codebase. I still can't figure out a legit reason for not being able to reuse the same deploy key for multiple repository but allows the same keys to be used for a bot account to perform the same functions as a work-around. Which defeats any purpose and actually makes it vulnerable if the bot-account is compromised. |
Beta Was this translation helpful? Give feedback.
-
|
Ran into exactly the same problem. Fine-Grained access tokens can in a limited way alleviate this problem, but become extremely useless because of their limited timespan. I just want to give read access to a couple of private repositories for a server that is not connected to my personal account. This shouldn't be this hard. |
Beta Was this translation helpful? Give feedback.
-
|
Hey @lynxis, Your Product Feedback Has Been Submitted! Thank you for taking the time to share your insights with us! Your feedback is invaluable as we build a better GitHub experience for all our users. Here's what you can expect moving forward ⏩
Where to look to see what's shipping 👀
What you can do in the meantime 💻
As a member of the GitHub community, your participation is essential. While we can't promise that every suggestion will be implemented, we want to emphasize that your feedback is instrumental in guiding our decisions and priorities. Thank you once again for your contribution to making GitHub even better! We're grateful for your ongoing support and collaboration in shaping the future of our platform. ⭐ |
Beta Was this translation helpful? Give feedback.
-
|
We also need this. |
Beta Was this translation helpful? Give feedback.
-
|
Same issue here. We have a main git repo, and it contains a submodule. I went to add the deploy key from the main repo to the submodule repo (since they will be deployed together) but it won't let me. Why must I create a different SSH key for the submodule I'm trying to clone when the same ssh key for the main repo should suffice. This is cumbersome and annoying. |
Beta Was this translation helpful? Give feedback.
-
|
We Need IT! |
Beta Was this translation helpful? Give feedback.
-
|
Upvote! I've had to deal with this on multiple projects that consist of 2-3 repos (services). Every time I have to google a workaround, every time it is pain. |
Beta Was this translation helpful? Give feedback.
-
|
We need this |
Beta Was this translation helpful? Give feedback.
-
|
Any updates on this? |
Beta Was this translation helpful? Give feedback.
-
|
We need this! |
Beta Was this translation helpful? Give feedback.
-
|
This seems hopelessly broken as it stands. Personal access tokens (classic) - have too broad an access, you cannot create a read only token Also, personal access tokens expire, and are tied to specific user accounts - what happens when that user leaves the organisation and their account is no longer valid? Github has no support for PHP packages. So a composer.json file needs to be re written, only during the github action mind you otherwise it breaks developers local workflow, to add a key per target repository. Worse if your composer.json is being used inside a docker build, to be secure it really should be using docker secrets which requires a --mount=type=secret,id=/path/to/secret again per repository. This also breaks local developer workflows As far as I'm aware, recursive git submodules have no available workaround. eg the git checkout action cannot work as you cannot rewrite the first set of retrieved repositories own's .gitmodules file. |
Beta Was this translation helpful? Give feedback.
-
|
Another +1 for this issue please. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Select Topic Area
Product Feedback
Body
Since github introduced the deploy keys years ago it was never possible to use the same deploy-key for multiple repositories.
Add this feature is implemented by all other github competitor for many years.
Please add support for this.
Why is this a problem?
You want to give an external CI or deployment access to your project repository via a deploy-key.
If you have a project which lives in a single repository, it's working. But if your project consist of multiple repositories, your CI and deployment need to access multiple repositories. Or your project depends on multiple private repositories you can't use deploy-keys anymore.
What is a deploy key?
A deploy key is a ssh-key used for deployment and CIs. Usually deploy-keys have only access to a subset of repositories and
can only read those.
The deploy-key isn't bound to a user account.
deploy-keys
personal access token
ssh key of a user account
So everything except a deploy-key have much more access than a fine grated deploy key and give a read permission to everything in the repository. Also you wouldn't create multiple bot-accounts only to have fine-grate permissions as those bot-accounts also need a seat, email account, registration.
So many other competitors are supporting multiple repositories for a single deploy-key.
Please add this long out-standing feature.
Beta Was this translation helpful? Give feedback.
All reactions