Make an /etc/ssh/puppetkeys for future use, and have sshd read keys from there already
authorPeter Palfrader <peter@palfrader.org>
Sun, 8 Sep 2019 08:24:41 +0000 (10:24 +0200)
committerPeter Palfrader <peter@palfrader.org>
Sun, 8 Sep 2019 08:24:41 +0000 (10:24 +0200)
modules/ssh/manifests/init.pp
modules/ssh/templates/sshd_config.erb

index 139a373..367cae6 100644 (file)
@@ -33,6 +33,15 @@ class ssh {
                mode    => '0755',
                require => Package['openssh-server']
        }
+       file { '/etc/ssh/puppetkeys':
+               ensure  => directory,
+               mode    => '0755',
+               purge   => true,
+               recurse => true,
+               force   => true,
+               source  => 'puppet:///files/empty/',
+               require => Package['openssh-server']
+       }
        file { '/etc/ssh/userkeys/root':
                content => template('ssh/authorized_keys.erb'),
        }
index fb38fe0..04a27e5 100644 (file)
@@ -45,7 +45,7 @@ Subsystem sftp /usr/lib/openssh/sftp-server
 
 UsePAM yes
 
-AuthorizedKeysFile /etc/ssh/userkeys/%u /var/lib/misc/userkeys/%u /etc/ssh/userkeys/%u.more
+AuthorizedKeysFile /etc/ssh/userkeys/%u /var/lib/misc/userkeys/%u /etc/ssh/userkeys/%u.more /etc/ssh/puppetkeys/%u
 
 PasswordAuthentication no