-
Notifications
You must be signed in to change notification settings - Fork 53
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
dev authorized keys are additive #115
Comments
No obvious solution to this problem. There isn't a Salt state to assert the entire contents of the authorize keys. Only that single keys are present or absent. http://docs.saltstack.com/en/latest/ref/states/all/salt.states.ssh_auth.html#module-salt.states.ssh_auth Similar problems for other removed states/pillars. Just because you remove the |
Fair enough. That one off would look something like (or just ssh to the machine and ✂️ it). fab [env] salt:'ssh.rm_auth_key [user] [key] |
Let's not close this. It is a problem. As you said it just needs some docs or a fab shortcut to help with it. |
Maybe when we want to remove a user from the system, instead of removing the user from our list, we could add a "state: removed" or something like that, then look for it when processing the user entries? |
Margarita portion tracked in caktus/margarita#66. We would then need some docs/examples over here on how to use it. |
If I change a developer's public key, it adds it to their authorized keys. I would expect a 1:1 mapping of keys in the conf to those on the server.
As it stands, if I change a key due to it being compromised, a deploy would leave the compromised keys on the server.
The text was updated successfully, but these errors were encountered: