Issue #1549 has been updated by ctrlaltdel.
PaulBoven wrote: > This is on puppet 0.24.4 (Debian Etch backports) Mmh, this type is only in 0.24.5. Do you install it yourself ? If so, please check that you have current code because I remember seeing and fixing this bug during development. ---------------------------------------- Bug #1549: ssh_authorized_keys provider creates keys-file with root ownership http://projects.reductivelabs.com/issues/show/1549 Author: PaulBoven Status: Needs more information Priority: Normal Assigned to: ctrlaltdel Category: ssh Target version: Complexity: Unknown Affected version: 0.24.4 Keywords: Trying to distribute a ssh_authorized_key with puppet, but the provider creates the file with 'root' ownership, with mode 0600, even when creating a .ssh/authorized_keys file for another user. This means that password-less login doesn't actually work because sshd isn't able to read that file after dropping permissions, and also the user has no permission to edit the file. This only happens if the file did not previously exist. Workaround: For each user, add to the manifest: file { "/home/user/.ssh/authorized_keys" : owner => user, group => user, mode => 600, require => Ssh_authorized_key["[EMAIL PROTECTED]"] } (The 'require' might not be absolutely necessary if puppet does not change ownership of the file once it is created.) This is on puppet 0.24.4 (Debian Etch backports) ---------------------------------------- You have received this notification because you have either subscribed to it, or are involved in it. To change your notification preferences, please click here: http://reductivelabs.com/redmine/my/account --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Puppet Bugs" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/puppet-bugs?hl=en -~----------~----~----~----~------~----~------~--~---
