port auth-keys-from-fas to new account system #10509
Labels
No labels
announcement
authentication
automate
aws
backlog
blocked
bodhi
ci
Closed As
Duplicate
Closed As
Fixed
Closed As
Fixed with Explanation
Closed As
Initiative Worthy
Closed As
Insufficient data
Closed As
Invalid
Closed As
Spam
Closed As
Upstream
Closed As/Will Not
Can Not fix
cloud
communishift
copr
database
deprecated
dev
discourse
dns
downloads
easyfix
epel
factory2
firmitas
gitlab
greenwave
hardware
help wanted
high-gain
high-trouble
iad2
koji
koschei
lists
low-gain
low-trouble
mbs
medium-gain
medium-trouble
mini-initiative
mirrorlists
monitoring
Needs investigation
notifier
odcs
OpenShift
ops
OSBS
outage
packager_workflow_blocker
pagure
permissions
Priority
Needs Review
Priority
Next Meeting
Priority
🔥 URGENT 🔥
Priority
Waiting on Assignee
Priority
Waiting on External
Priority
Waiting on Reporter
rabbitmq
rdu-cc
release-monitoring
releng
repoSpanner
request-for-resources
s390x
security
SMTP
src.fp.o
staging
taiga
unfreeze
waiverdb
websites-general
wiki
No milestone
No project
No assignees
6 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: Infrastructure/fedora-infrastructure#10509
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Our playbooks fail to run
/srv/web/infra/ansible/scripts/auth-keys-from-fas
.I see I already touched this problem:
How are we supposed to list the group, just?
Yeah, we should move away from fas-clientsetc.
So, yes for ssh keys for a group we could just do 'getent group name' and then for each name run 'sss_ssh_authorizedkeys name'
Should we make a script to do this? Or try and just do it in ansible?
That would be awesome! I can take a look later, though for now I just disabled
those tasks (we already have the keys distributed).
Metadata Update from @zlopez:
This could be a nice task for a new person. Just need to get groups passed to the script, find all the users in those groups with getent and then find all those users ssh keys with sss_ssh_authorized_keys and output the list.
Metadata Update from @kevin:
I'd like to volunteer. Can I have this ticket assigned to me? thanks :)
sure! Thanks for looking into it...
Metadata Update from @kevin:
@leo How is it going, do you need any help from us on this issue? Or, if you're not interested anymore, would it be OK if somebody else took it over?
@mgrabovs @kevin Ill take over this ticket. I would like to sync with someone on what the issue is and help resolve it.
Metadata Update from @aheath1992:
@mgrabovs so sorry, yep you can assign it to someone else :)
Created new script and created merge request. merge has been approved, closing ticket
Metadata Update from @aheath1992: