Displaying 20 results from an estimated 5000 matches similar to: "ssh_authorized_keys - not adding keys ... (??)"
2011 May 13
5
ssh_authorized_key loops when options is defined
Hi all,
I have no problem with creating ssh keys for users, but as soon as I
specify ''options'', puppet keeps repeating and replacing the key with
an identical key.
I have written the various options in various formats, like one big
strings, as an array, with double quotes or single quotes, etc, etc
(see examples below), but the issue stays
as a string ...
@authorizedkey {
2011 Apr 07
3
ssh_authorized_key type not working
I can''t seem to get the authorized_key type to work at all on my systems. Below is my configuration that I used. I could have something missing but the examples I see make it difficult to compare. Additionally if I try and do the reverse using puppet resource nothing comes up:
puppet resource ssh_authorized_key (this returns nothing)
puppet resource ssh_authorized_key username
2011 May 03
1
Could not evaluate: Cannot write SSH authorized keys without user
I just installed puppet on an ubuntu natty narwhal desktop and I''m
getting the following error on one of my puppet classes:
notice: //myclass/Ssh_authorized_key[adminuser]/ensure: created
err: //myclass/Ssh_authorized_key[adminuser]: Could not evaluate:
Cannot write SSH authorized keys without user
ssh_authorized_key { "adminuser":
ensure => present,
2010 Feb 26
3
ssh_authorized_key - same key, different accounts?
Puppet 0.24.8... I am trying to use ssh_authorized_key to create
passwordless logins for a couple of accounts. The important thing to
note is I''m trying to get the source ("root@somehost" below) as part of
the key, and the same key needs to be added to two different accounts on
the system.
It appears that the resource name is the only place I can set the
originating source
2011 Apr 21
6
ssh_authorized_key fails when home directory doesn't exist
Here is my situation:
1. We use Active directory (LDAP) to store all user info which is retrieved from linux
2. A home directory is not created until the first time the user logs into the linux system
I am using the ssh_authorized_key type to push out my ssh keys to every system. However, because I haven''t logged into every system at least once. Puppet errors out due to a missing
2009 Apr 21
1
realizing virtual ssh_authorized_key
I''m trying to use ssh_authorized_key to manage my user''s ssh keys. I
basically have this (across a couple of files):
class user::virtual {
@user { "seph":
ensure => "present",
uid => "2001",
comment => "seph",
home => "/home/seph",
shell =>
2013 Aug 03
2
Add a public ssh key form node A to authorized keys on node B
With the risc I ask a queston answered a hunderd times before (which I
couldn''t find)...
On node A I want to create a ssh key. For this I exec a ssh-keygen. Now I
want the generated public key added to the authorized key file of node B.
Probably I need the ssh_authorized_key resource for this. But then I need
the public key of node A as a string in node B. I can''t see how to
2009 Sep 04
1
ssh_authorized_key always ensure absent even it's present
puppet version 0.24.8 from debian lenny-backports
My class works and resource created the authorized_keys file.
But puppet detect as ensure absent and added again and again
my authorized_keys got fews the same key lines.
I added the target => ''/home/test/.ssh/authorized_keys'',
again ensure is absent.
I replace the ssh_authorized_key.rb from 0.25rc1
and again ensure is
2011 Oct 12
0
Could not evaluate: Field 'key' is required when exporting ssh_authorized_keys
I seem to have a weird error when trying to collect ssh keys and installing
them on our backup server.
On all hosts I have:
@@ssh_authorized_key { "root@$fqdn":
type => ssh-rsa,
key => $rootsshkey,
tag => ''host'',
user => backups,
}
Then on my backup server I have:
Ssh_authorized_key <<| tag == ''host''
2010 Mar 13
5
inheriting ssh_authorized_key
Hello,
I''m trying to reuse an ssh_authorized_key, but I''m having some problems.
There was a recent thread about using the same key for different users, but
I didn''t see any resolution there. My issue is a bit different. I''m
currently using this key:
class ssh_keys::all {
class bob {
ssh_authorized_key {"bob":
name =>
2008 Oct 16
5
virutal resources and ssh_authorized_key
Hello!
I''ve got question - how to use ssh_autorized_key as a virtual resource?
I''ve got bunch of users and ssh_authorized_key virtual resources, but
only users gets to the target system - ssh keys not...
I write something like:
class admins {
@user { "username":
...
}
@ssh_authorized_key { "username":
ensure => present,
key => "...",
2009 Oct 30
3
need help in generating ssh authorize keys
hi all,
I need to generate ssh authorize keys for a list of users hosted on
different servers.the users are active and each one has its public key
(id_rsa.pub) hosted in 1 server. now what i need to do is to generate
the authorize keys from each of their public key. the key is easily
generating if public key hosted on the Node but my problem is that all
public keys are hosted in 1 machine with a
2011 Jun 17
5
ssh_authorized_key and NIS user
Hi,
I have this resource definition:
ssh_authorized_key { "nagios@login2":
key => [REDACTED]
user => "nagios",
type => "ssh-dss",
require => Service[''nis''],
}
This nagios user comes from NIS, yp.conf and nsswitch.conf are handled by puppet
and configured before the key. I still get an "User does not
2013 Mar 20
7
Puppet 3.1.1 and file… -> Error: Failed to apply catalog: Attribute 'user' or 'target' is mandatory
Hello,
Seems that file ressource gets a new idea of what to be given.
I have the following recipe :
class resolvconf {
file {
"/etc/resolv.conf":
owner => root,
group => wheel,
mode => 644,
source => "puppet:///puppet/dist/resolv.conf",
2009 Nov 17
3
SSH Keys
Hi all,
I want to use puppet to distribute keys to multiple users. I wanted
to do something like we have already:
- define a key per real person
- define groups containing several keys, people can be in multiple
groups
- deploy these groups of keys to specific users
however it looks like the ssh_authorized_key resource ties a key and a
user together so it looks like I fall at the first
2008 Sep 10
5
Managing SSH keys
Hello all,
I''d like to have Puppet distributing one of your server''s (public) SSH
keys, effectively doing the same as the ssh-copy-id command.
Is there a build in puppet resource type for managing SSH keys. We''re
running version 0.24.4 of puppet.
Regards,
Kenneth Holter
--~--~---------~--~----~------------~-------~--~----~
You received this message because you are
2010 Jul 06
2
ssh authorized key problem in AIX
hi guys,
I am having an unusual behaviour in puppet with AIX (client node) while
copying ssh key from puppet-server to client.
here is what i am trying to do;
$username = "xyz"
$group = "system"
$home = "/home"
$sshDir = ".ssh"
$pub_key = "id_rsa.pub.xyz"
1. creating all users virtually in one go
2. realize them all and copy each of
2013 May 07
3
Trouble writing authorized_keys2
I''ve got a situation where a manifest fails when writing one particular key
for a user. What I have is a manifest that looks like this:
class my::accounts () {
Ssh_authorized_key {
ensure => present,
type => ssh-dss,
}
Then, after making sure the user, group, and authorized_keys2 file exist:
ssh_authorized_key { "key-name-1":
key
2020 Apr 23
6
[Bug 3153] New: Prefer user specified keys to avoid the agent overloading MaxAuthTries before even trying the key that was specified
https://bugzilla.mindrot.org/show_bug.cgi?id=3153
Bug ID: 3153
Summary: Prefer user specified keys to avoid the agent
overloading MaxAuthTries before even trying the key
that was specified
Product: Portable OpenSSH
Version: 8.2p1
Hardware: Other
OS: Linux
Status: NEW
2011 Apr 19
8
Handling unmanaged resources and their files/configs
We have resources that, from time to time, are selected to be removed
(unmanaged). When it comes to ssh keys, fstab... this leaves a lot
of stuff behind that we don''t want. Is there a simple way to remove
the unmanaged data so we can keep the systems clean.
Thanks.
--
You received this message because you are subscribed to the Google Groups "Puppet Users" group.
To post