How to solve PTY allocation request failed on channel 0 issue for a remote server which runs Forgejo

Four Freedoms
How to solve PTY allocation request failed on channel 0 issue for a remote server which runs Forgejo

I have been uploaded my ssh key to remote virtual machine which runs Forgejo as same as the ssh public key on my physical machine. Then I tried to ssh to this virtual machine but I see this error output below :

hwpplayer1@hwpplayer1-Aspire-A315-24P:~$ ssh debian@192.168.122.171
PTY allocation request failed on channel 0
Forgejo: Key check failed
Connection to 192.168.122.171 closed.

Solution

I removed the SSH key by openining the GUI interface Virt-Manager. Then I added my ssh key to the remote virtual machine written below:


ssh-copy-id debian@192.168.122.171

In the meantime I configured my .ssh/config as written below for connecting remote server via


ssh hostname


Host debian
Hostname 192.168.122.171
User debian
IdentityFile ~/.ssh/id.rsa

now this command/ssh connection works !


ssh debian

There was another issue that we can not clone the repository via ssh while we connect to virtual machine/remote server via ssh.

To solve this Forgejo clone/push issue I did :

adduser --system --shell /bin/bash --gecos 'Git Version Control' \
  --group --disabled-password --home /home/git  git

And then I moved forgejo source code into git user and changed the directory and file permissions for the git user.

Conclusion

 

Now I can ssh into the remote server and clone and push the repositories like I did before with GitHub, GitLab, SourceHut(sr.ht), git.vern.cc, git.disroot.org and Codeberg…

happy hacking !

https://codeberg.org/masscollaborationlabs/labs.masscollabs.xyz/src/branch/articles/ssh-issue.md

https://git.vern.cc/masscollaborationlabs/labs.masscollabs.xyz/src/branch/articles/ssh-issue.md

https://git.disroot.org/masscollaborationlabs/labs.masscollabs.xyz/src/branch/articles/ssh-issue.md

https://git.sr.ht/~mertgor/labs.masscollabs.xyz/tree/articles/item/ssh-issue.md

https://gitlab.com/masscollabs/masscollaborationlabs/labs.masscollabs.xyz/-/blob/articles/ssh-issue.md?ref_type=heads

https://github.com/masscollaborationlabs/labs.masscollabs.xyz/blob/articles/ssh-issue.md

 

Full Time GNU Emacs Developer is Needed

GNU Emacs in cloud
Company Description

We Masscollabs Services is leading to Software, Hardware and Science for the Internet Cyberspace with our own consciousness. We have our own roadmap and which is why we say we are a Free Software project. This is an open way to software and open infrastructures …

Role Description

This is a full-time remote role for a GNU Emacs Developer. The Developer will be responsible for maintaining and updating GNU Emacs, developing new features, fixing bugs, and contributing to the Free Software community. They will also work closely with other developers and project managers to ensure timely completion of tasks.

Qualifications
  • Strong proficiency in Emacs Lisp and C
  • Experience developing for GNU Emacs or similar Free Software projects
  • Experience in developing and maintaining software libraries and frameworks
  • Understanding of software best practices and development methodologies
  • Excellent problem solving and troubleshooting skills
  • Bachelor’s degree in Computer Science or related field
  • Contributions to Free Software projects are a plus
Working Remotely

We need contributors who work and contribute remotely.

happy hacking !

Our Go Course

Our Go Course

We are training Go programming language by learning from various sources such as BTK Akademi, The Golang source, and the internet.

If you like to join us here is our repository links

Github contains all of the repository links on various forges

happy hacking !

Python Developer as volunteer is needed

Company Description

We Masscollabs Services is leading to Software, Hardware and Science for the Internet Cyberspace with our own consciousness. We have our own roadmap and which is why we say we are a Free Software project. This is an open way to software and open infrastructures

Role Description

This is a volunteer, remote role for a Python Developer. The Python Developer will be responsible for writing effective, scalable code, building back-end systems, integrating user-facing elements into applications, and collaborating with cross-functional teams to define, design, and ship new features. The Python Developer will also be responsible for maintaining documentation, identifying and addressing bottlenecks and bugs, and participating in regular code reviews. And also Python Developer needs to contribute directly to the upstream Python programming language codebase

Qualifications
  • Experience in Back-End Web Development and Software Development
  • Proficiency in Object-Oriented Programming (OOP) and Python programming language
  • Experience with Databases, such as PostgreSQL and MariaDB
  • Ability to write clean, maintainable and efficient code
  • Familiarity with front-end technologies such as HTML, CSS, and JavaScript
  • Understanding of fundamental design principles behind a scalable application
  • Ability to implement automated testing platforms and unit tests
  • Experience with version control tools, such as Git
  • Bachelor’s Degree in Computer Science, Engineering or related field
  • Excellent problem-solving skills and attention to detail
  • Prior experience in Free Software development and/or contributions to Free Software projects is a plus
Working Remotely

We need contributors who work and contribute remotely.

happy hacking !

A Guide for Hackers who wants to become a committer

A Guide for Hackers who wants to become a committer

This repository includes the path to become a committer with any kind of git oriented workflow to push commits to any kind of forge.

Setting SSH Keys

Please read :

Configuring GPG Key

gpg --list-secret-keys --keyid-format=long

  • Then run this command but replace 3AA5C34371567BD2 with your GPG Key ID:

gpg --output secret.key --export-secret-keys 3AA5C34371567BD2

  • Then run this command for Revocation Certificate but replace 3AA5C34371567BD2 with your GPG Key ID:

gpg --output revoke.asc --gen-revoke 3AA5C34371567BD2

Then export your public key with this command but replace 3AA5C34371567BD2 with your GPG Key ID :

gpg --armor --export 3AA5C34371567BD2 > 3AA5C34371567BD2.asc

For signing Commits with your GPG Key

Please read this :

Conclusion
  • We have generated SSH Key and added our public SSH Key to our GitHub account.
  • We have generated GPG Key, exported secret key, exported revocation certificate, published our public key to a server in this example PGP Global Directory and then we moved our secret.key and revoke.asc to an external disk. Then we added our GPG key to GitHub account.
  • For signing commit we configured our git account.
Where we store this documentation

happy hacking!…