[Bug 354288] Re: ssh keys for user are not owned by the user [Jaunty] [PATCH]

2009-12-17 Thread Loïc Minier
While this was cherry-picked in trunk, the code was modified and is broken in karmic and trunk: self.run_in_target('chown', '-R', '%s:%s' % (self.vm.user,)*2, '/home/%s/.ssh/' % (self.vm.user)). see bug #436835 ** Changed in: vm-builder (Ubuntu) Status: Confirmed = Fix

[Bug 354288] Re: ssh keys for user are not owned by the user [Jaunty] [PATCH]

2009-04-06 Thread Todd Deshane
added a branch link ** Branch linked: lp:~deshantm/vmbuilder/vmbuilder-deshantm -- ssh keys for user are not owned by the user [Jaunty] [PATCH] https://bugs.launchpad.net/bugs/354288 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. --

[Bug 354288] Re: ssh keys for user are not owned by the user [Jaunty] [PATCH]

2009-04-06 Thread Bryan McLellan
On Fri, Apr 3, 2009 at 6:27 PM, Todd Deshane desha...@gmail.com wrote: First, the chown command takes, as the 2nd and 3rd arguments, the uid and gid of the user. The user that needs to own the .ssh directory and its contents is a user that is created within the chroot. While it is possible to

[Bug 354288] Re: ssh keys for user are not owned by the user [Jaunty] [PATCH]

2009-04-06 Thread Eric Hammond
I can't see a situation where the initial users's uid and gid wouldn't be 1000. This situation arises when vmbuilder is being used to build standard images which are going to be used by other parties. For example, when vmbuilder is used to build public images for Amazon EC2:

[Bug 354288] Re: ssh keys for user are not owned by the user [Jaunty] [PATCH]

2009-04-03 Thread Bryan McLellan
I see this issue as well. Why not use os.chown instead of run_cmd in your patch? ** Changed in: vm-builder (Ubuntu) Status: New = Confirmed -- ssh keys for user are not owned by the user [Jaunty] [PATCH] https://bugs.launchpad.net/bugs/354288 You received this bug notification because

[Bug 354288] Re: ssh keys for user are not owned by the user [Jaunty] [PATCH]

2009-04-03 Thread Todd Deshane
At first I tried to go the os.chown way, but there were a few complications that made the code less elegant. First, the chown command takes, as the 2nd and 3rd arguments, the uid and gid of the user. The user that needs to own the .ssh directory and its contents is a user that is created within

[Bug 354288] Re: ssh keys for user are not owned by the user [Jaunty] [PATCH]

2009-04-02 Thread Todd Deshane
** Attachment added: chown-ssh-keys-dapper.py.diff http://launchpadlibrarian.net/24735899/chown-ssh-keys-dapper.py.diff -- ssh keys for user are not owned by the user [Jaunty] [PATCH] https://bugs.launchpad.net/bugs/354288 You received this bug notification because you are a member of