For my work on the dockerjekyllpages image (docker hub, GitHub) I came across the issue that I also want to be able to build from private git repositories and thus want to authenticate using a private SSH key.
During my research on this topic I came across this stackoverflow post by Aistis which proposes forwarding the SSH authentication socket (or authorization, not sure about that) which allows the container to communicate with your hosts SSH authentication method.
I think this is a very clean solution and thus I’ve implemented it as follows.
Per default the
SSH_AUTH_SOCK environment variable is set to
/var/run/ssh-agent.sock in the image.
# This is the respective line from the Dockerfile ENV SSH_AUTH_SOCK /var/run/ssh-agent.sock
Thus for running the container you only have to mount the hosts
SSH_AUTH_SOCK to the container by adding the argument
$ docker run -v "$SSH_AUTH_SOCK:/var/run/ssh-agent.sock" -e REPO=[YOUR PRIVATE REPO URL HERE] white-gecko/dockerjekyllpages
Until this point I didn’t realize, that it is possible to mount individual files into a docker container rather then only complete directories. This stackoverflow post opened my eyes.
If you don’t have an
SSH_AUTH_SOCK running on the docker host you can still mount an
id_rsa-file e.g. with
:ro prevents the container from changing resp. accidentally overwriting your SSH key.)
In the case that you are mounting a private key rather then using the hosts SSH agent it is a good idea to generate a key without password, else the ssh process might prompt you for the password.
After solving the authentication with your SSH key the next problem is, that the container usually doesn’t know any remote hosts in its short life time. Thus it will probably prompt for verification of the connection.
The authenticity of host 'github.com (220.127.116.11)' can't be established. RSA key fingerprint is SHA256:nThbg6kXUpJWGl7E1IGOCspRomTxdCARLviKw6E5SY8. Are you sure you want to continue connecting (yes/no)?
To prevent the necessity for interaction with the container you can mount the hosts
known_hosts-file into the container.
You can do this by mounting the hosts
known_hosts-file e.g. with
I’ve also tried to mount the complete
$HOME/.ssh/ directory into the container but that left me with the message:
Bad owner or permissions on /root/.ssh/config
This topic is also discussed in this superuser question but the first answer is not a solution. Maybe switching to not using root will be a solution.
(I’ve based this blog post on the respective section in the README file)