Displaying 20 results from an estimated 1000 matches similar to: "Managing about 30 users?"
2009 Apr 21
1
realizing virtual ssh_authorized_key
I''m trying to use ssh_authorized_key to manage my user''s ssh keys. I
basically have this (across a couple of files):
class user::virtual {
@user { "seph":
ensure => "present",
uid => "2001",
comment => "seph",
home => "/home/seph",
shell =>
2011 Dec 10
5
create user and push out keys.
Hello
Im just been working with puppet, the first usecase i have is to set
up a system to create users and then push ssh keys on this machines in
the create users .ssh files. I just started with puppet so i am a bit
cluesless, Can someone push me in the right direction?
Im having a centos enviorment.
--
You received this message because you are subscribed to the Google Groups "Puppet
2011 Nov 29
1
How do I require a resource in a definition based on an array parameter?
I have a define that looks like this:
define user::sys_user($fullname, $uid, $groups, $shell=''/bin/bash'',
$authkey, $authkey_type=rsa) {
$username = "sys_${name}"
group { $username:
gid => $uid,
}
user { $username:
require => Group[$username],
ensure => present,
2015 Jun 25
3
Several questions about winbind[d]
Hi all,
I'm wondering about winbind[d] behaviour.
I tried the following with:
auth methods = sam winbindd
and the same with only one d:
auth methods = sam winbind
One user:
ldbsearch -H $sam '(cn=another.fakeuser)' homeDirectory loginShell
gidnumber uidnumber
# record 1
dn: CN=another.fakeuser,OU=a,OU=Standards,OU=Utilisateurs,DC=ad,DC=dgfip
homeDirectory: */home/another.fakeuser*
2008 Sep 10
5
Managing SSH keys
Hello all,
I''d like to have Puppet distributing one of your server''s (public) SSH
keys, effectively doing the same as the ssh-copy-id command.
Is there a build in puppet resource type for managing SSH keys. We''re
running version 0.24.4 of puppet.
Regards,
Kenneth Holter
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are
2017 Apr 19
2
PUPPET - group IDS
hope thus comes under the remit of this mailking list...
We use puppet, and Im trying to come up with "code" that will create two user accounts with a shared groiup ID
eg?
user1 with UID 1000user 2 with UID 1001
but I would like them BOTH to share the GID of 2000
I've tried the following
accounts::groups:? ? jointgroup:? ? ? ? gid: '2000'
accounts::users:
? ? user1:? ? ? ?
2009 Jan 30
35
j4200 drive carriers
apparently if you don''t order a J4200 with drives, you just get filler
sleds that won''t accept a hard drive. (had to look at a parts breakdown
on sunsolve to figure this out -- the docs should simply make this clear.)
it looks like the sled that will accept a drive is part #570-1182.
anyone know how i could order 12 of these?
2010 Feb 26
3
ssh_authorized_key - same key, different accounts?
Puppet 0.24.8... I am trying to use ssh_authorized_key to create
passwordless logins for a couple of accounts. The important thing to
note is I''m trying to get the source ("root@somehost" below) as part of
the key, and the same key needs to be added to two different accounts on
the system.
It appears that the resource name is the only place I can set the
originating source
2008 Oct 16
5
virutal resources and ssh_authorized_key
Hello!
I''ve got question - how to use ssh_autorized_key as a virtual resource?
I''ve got bunch of users and ssh_authorized_key virtual resources, but
only users gets to the target system - ssh keys not...
I write something like:
class admins {
@user { "username":
...
}
@ssh_authorized_key { "username":
ensure => present,
key => "...",
2011 Apr 07
3
ssh_authorized_key type not working
I can''t seem to get the authorized_key type to work at all on my systems. Below is my configuration that I used. I could have something missing but the examples I see make it difficult to compare. Additionally if I try and do the reverse using puppet resource nothing comes up:
puppet resource ssh_authorized_key (this returns nothing)
puppet resource ssh_authorized_key username
2011 Jun 17
5
ssh_authorized_key and NIS user
Hi,
I have this resource definition:
ssh_authorized_key { "nagios@login2":
key => [REDACTED]
user => "nagios",
type => "ssh-dss",
require => Service[''nis''],
}
This nagios user comes from NIS, yp.conf and nsswitch.conf are handled by puppet
and configured before the key. I still get an "User does not
2011 Apr 21
6
ssh_authorized_key fails when home directory doesn't exist
Here is my situation:
1. We use Active directory (LDAP) to store all user info which is retrieved from linux
2. A home directory is not created until the first time the user logs into the linux system
I am using the ssh_authorized_key type to push out my ssh keys to every system. However, because I haven''t logged into every system at least once. Puppet errors out due to a missing
2007 Jun 11
4
freeBSD User provider
Hello,
from the doc it seems that the User type has a provider of ''pw'' for
FreeBSD. It seems the provider does not allow dupelicate, does not
allow to manage the homedir and to manage password.
in the code the duplicate uid is set so it seems the doc is out of
date on this :)
- manage home directory, i don''t really understand what is that
parameter. The
2011 Apr 01
5
ssh_authorized_keys - not adding keys ... (??)
Hey folks -
I''m running into some weirdness getting ssh keys realized properly.
The manifest I''m working with is here: http://www.pastie.org/1744771 .
I''m using 2.6.3 epel repo on a Centos 5.5 box .
The expected behaviour is to have the user created and their public
key put in their authorized_keys as well as the studio_app user''s
authorized_keys.
What ends
2013 May 07
3
Trouble writing authorized_keys2
I''ve got a situation where a manifest fails when writing one particular key
for a user. What I have is a manifest that looks like this:
class my::accounts () {
Ssh_authorized_key {
ensure => present,
type => ssh-dss,
}
Then, after making sure the user, group, and authorized_keys2 file exist:
ssh_authorized_key { "key-name-1":
key
2011 May 03
1
Could not evaluate: Cannot write SSH authorized keys without user
I just installed puppet on an ubuntu natty narwhal desktop and I''m
getting the following error on one of my puppet classes:
notice: //myclass/Ssh_authorized_key[adminuser]/ensure: created
err: //myclass/Ssh_authorized_key[adminuser]: Could not evaluate:
Cannot write SSH authorized keys without user
ssh_authorized_key { "adminuser":
ensure => present,
2010 Mar 13
5
inheriting ssh_authorized_key
Hello,
I''m trying to reuse an ssh_authorized_key, but I''m having some problems.
There was a recent thread about using the same key for different users, but
I didn''t see any resolution there. My issue is a bit different. I''m
currently using this key:
class ssh_keys::all {
class bob {
ssh_authorized_key {"bob":
name =>
2011 May 13
5
ssh_authorized_key loops when options is defined
Hi all,
I have no problem with creating ssh keys for users, but as soon as I
specify ''options'', puppet keeps repeating and replacing the key with
an identical key.
I have written the various options in various formats, like one big
strings, as an array, with double quotes or single quotes, etc, etc
(see examples below), but the issue stays
as a string ...
@authorizedkey {
2009 Nov 17
3
SSH Keys
Hi all,
I want to use puppet to distribute keys to multiple users. I wanted
to do something like we have already:
- define a key per real person
- define groups containing several keys, people can be in multiple
groups
- deploy these groups of keys to specific users
however it looks like the ssh_authorized_key resource ties a key and a
user together so it looks like I fall at the first
2009 Sep 04
1
ssh_authorized_key always ensure absent even it's present
puppet version 0.24.8 from debian lenny-backports
My class works and resource created the authorized_keys file.
But puppet detect as ensure absent and added again and again
my authorized_keys got fews the same key lines.
I added the target => ''/home/test/.ssh/authorized_keys'',
again ensure is absent.
I replace the ssh_authorized_key.rb from 0.25rc1
and again ensure is