Issue #1549 has been updated by jamtur01.

Category set to ssh
Status changed from Unreviewed to Accepted
Assigned to set to ctrlaltdel


----------------------------------------
Bug #1549: ssh_authorized_keys provider creates keys-file with root ownership
http://reductivelabs.com/redmine/issues/show/1549

Author: PaulBoven
Status: Accepted
Priority: Normal
Assigned to: ctrlaltdel
Category: ssh
Target version: 
Complexity: Unknown
Affected version: 0.24.4
Keywords: 


Trying to distribute a ssh_authorized_key with puppet, but the provider creates 
the file with 'root' ownership, with mode 0600, even when creating a 
.ssh/authorized_keys file for another user. This means that password-less login 
doesn't actually work because sshd isn't able to read that file after dropping 
permissions, and also the user has no permission to edit the file. This only 
happens if the file did not previously exist.

Workaround: For each user, add to the manifest:

file { "/home/user/.ssh/authorized_keys" : owner => user, group => user, mode 
=> 600,
       require => Ssh_authorized_key["[EMAIL PROTECTED]"] }

(The 'require' might not be absolutely necessary if puppet does not change 
ownership of the file once it is created.)

This is on puppet 0.24.4 (Debian Etch backports)


----------------------------------------
You have received this notification because you have either subscribed to it, 
or are involved in it.
To change your notification preferences, please click here: 
http://reductivelabs.com/redmine/my/account

--~--~---------~--~----~------------~-------~--~----~
You received this message because you are subscribed to the Google Groups 
"Puppet Bugs" group.
To post to this group, send email to [email protected]
To unsubscribe from this group, send email to [EMAIL PROTECTED]
For more options, visit this group at 
http://groups.google.com/group/puppet-bugs?hl=en
-~----------~----~----~----~------~----~------~--~---

Reply via email to