-
Improvement
-
Resolution: Won't Do
-
Major
-
None
We are trying to connect to a Git repository via SSH (not Github) using username/password (we're not using keys) and we're getting the following error:
Failed to connect to repository : Command "git ls-remote -h ssh://account@repository/path/toApplication HEAD" returned status code 128:
stdout:
stderr: Permission denied, please try again.
Permission denied, please try again.
Permission denied (publickey,gssapi-keyex,gssapi-with-mic,password).
fatal: Could not read from remote repository.
Please make sure you have the correct access rights
and the repository exists.
------------------
If we use the anonymous access or change the access type from SSH to HTTPS, it works fine, but we should be able to use the SSH with user/password without having to add the public/private keys.
Jenkins ver. 1.532.1
Git Client Plugin 1.6.4
Git Plugin 2.0.4
•How are you running Jenkins?
We are running Jenkins as a service in RHEL
•Have you specified additional parameters for the Java VM (Heapspace etc.)?
No
•Did you just install the deb or rpm?
We used the RPM jenkins-1.532.1-1.1.noarch.rpm
•With which Java VM (Oracle, IBM etc.)?
java version "1.7.0_45"
Java(TM) SE Runtime Environment (build 1.7.0_45-b18)
Java HotSpot(TM) 64-Bit Server VM (build 24.45-b08, mixed mode)
•On which operating system? 32- or 64-bit?
Linux version 2.6.32-358.23.2.el6.x86_64 (mockbuild@ca-build44.us.oracle.com) (gcc version 4.4.7 20120313 (Red Hat 4.4.7-3) (GCC) )
- duplicates
-
JENKINS-28165 git plugin does not support username/password over ssh
-
- Closed
-
- is duplicated by
-
JENKINS-28165 git plugin does not support username/password over ssh
-
- Closed
-
- is related to
-
JENKINS-22855 SSH Credential's username isn't used.
-
- Closed
-
-
JENKINS-24368 Authentication failed for https://username@bitbucket.org/project/repository.git
-
- Closed
-
[JENKINS-22909] git plugin does not support username/password over ssh
Component/s | New: git-client [ 17423 ] | |
Component/s | Original: git [ 15543 ] |
Link |
New:
This issue is related to |
Resolution | New: Cannot Reproduce [ 5 ] | |
Status | Original: Open [ 1 ] | New: Resolved [ 5 ] |
Status | Original: Resolved [ 5 ] | New: Closed [ 6 ] |
Assignee | Original: Nicolas De Loof [ ndeloof ] | |
Resolution | Original: Cannot Reproduce [ 5 ] | |
Status | Original: Closed [ 6 ] | New: Reopened [ 4 ] |
Embedding the user name and password in the URL directly will expose your user name and password in the job definition and may expose it in the job log. If you'll enter a credential with that same user name and password, you can then reference that credential without having the user name or the password visible in the job definition or in the console log from the build.
I agree that the plugin should also accept the user name and password embedded in the URL, but it does not currently. The work around of entering the user name and password as a credential is workable, and is more secure.