Issue #1549 has been reported by PaulBoven.
----------------------------------------
Bug #1549: ssh_authorized_keys provider creates keys-file with root ownership
http://reductivelabs.com/redmine/issues/show/1549
Author: PaulBoven
Status: Unreviewed
Priority: Normal
Assigned to:
Category:
Target version:
Complexity: Unknown
Affected version: 0.24.4
Keywords:
Trying to distribute a ssh_authorized_key with puppet, but the provider creates
the file with 'root' ownership, with mode 0600, even when creating a
.ssh/authorized_keys file for another user. This means that password-less login
doesn't actually work because sshd isn't able to read that file after dropping
permissions, and also the user has no permission to edit the file. This only
happens if the file did not previously exist.
Workaround: For each user, add to the manifest:
file { "/home/user/.ssh/authorized_keys" : owner => user, group => user, mode
=> 600,
require => Ssh_authorized_key["[EMAIL PROTECTED]"] }
(The 'require' might not be absolutely necessary if puppet does not change
ownership of the file once it is created.)
This is on puppet 0.24.4 (Debian Etch backports)
----------------------------------------
You have received this notification because you have either subscribed to it,
or are involved in it.
To change your notification preferences, please click here:
http://reductivelabs.com/redmine/my/account
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups
"Puppet Bugs" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at
http://groups.google.com/group/puppet-bugs?hl=en
-~----------~----~----~----~------~----~------~--~---