Issue #1549 has been updated by jamtur01. Category set to ssh Status changed from Unreviewed to Accepted Assigned to set to ctrlaltdel
---------------------------------------- Bug #1549: ssh_authorized_keys provider creates keys-file with root ownership http://reductivelabs.com/redmine/issues/show/1549 Author: PaulBoven Status: Accepted Priority: Normal Assigned to: ctrlaltdel Category: ssh Target version: Complexity: Unknown Affected version: 0.24.4 Keywords: Trying to distribute a ssh_authorized_key with puppet, but the provider creates the file with 'root' ownership, with mode 0600, even when creating a .ssh/authorized_keys file for another user. This means that password-less login doesn't actually work because sshd isn't able to read that file after dropping permissions, and also the user has no permission to edit the file. This only happens if the file did not previously exist. Workaround: For each user, add to the manifest: file { "/home/user/.ssh/authorized_keys" : owner => user, group => user, mode => 600, require => Ssh_authorized_key["[EMAIL PROTECTED]"] } (The 'require' might not be absolutely necessary if puppet does not change ownership of the file once it is created.) This is on puppet 0.24.4 (Debian Etch backports) ---------------------------------------- You have received this notification because you have either subscribed to it, or are involved in it. To change your notification preferences, please click here: http://reductivelabs.com/redmine/my/account --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Puppet Bugs" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/puppet-bugs?hl=en -~----------~----~----~----~------~----~------~--~---
