Project

General

Profile

Actions

Feature #11633

closed

Template snippets and support for automatically adding ssh keys to provisioned hosts

Added by Mike McCune about 9 years ago. Updated over 6 years ago.

Status:
Closed
Priority:
Normal
Category:
-
Difficulty:
Triaged:
Fixed in Releases:
Found in Releases:

Description

Provide a method for automatically adding ssh keys to the authorized_keys on hosts that are provisioned via Foreman with the Remote Execution plugin enabled.

Optionally also include the necessary package installations for various operating systems to ensure that SSH is installed and available.


Related issues 2 (2 open0 closed)

Related to Foreman - Refactor #12243: Make Foreman KeyPair reusuable by other modelsNew10/21/2015Actions
Related to Foreman - Feature #12330: Support plugin snippets in templatesNewActions
Actions #1

Updated by Marek Hulán about 9 years ago

This also mean we have to introduce private key management in Foreman, the key can differ per user/hostgroup/host etc. We could use parameters as a storage but private keys are sensitive data and parameters do not help with different key per user scenario.

Actions #2

Updated by Stephen Benjamin about 9 years ago

Is there a story for per-foreman user keys to hosts? I would think we have one key per smart proxy, and use foreman access control/auditing for users.

Actions #3

Updated by Marek Hulán about 9 years ago

There's no story about this in the original design AFAIK but it seems natural to support more keys for one proxy. Maybe per user is too much for now, but I don't see big difference.

Actions #4

Updated by Stephen Benjamin about 9 years ago

I view an SSH keypair for a proxy similar to a client SSL certificate - its the cryptographic identity of that particular proxy, what's the use case for having more than one?

I would suggest the default setup be each proxy has only one keypair.

Actions #5

Updated by Marek Hulán about 9 years ago

By more keys for one proxy I meant more keys can be used through one proxy, sorry for bad wording. The idea is that every user would use his own private key (or each host, hostgroup, location, ...) so when one key is compromised, not the whole infrastructure is compromised. Also it would add additional level of granularity, so you could limit users <-> targets access. Anyway it's probably more like "would be nice" or "food for thought" in this phase.

Actions #6

Updated by Ivan Necas about 9 years ago

  • Target version set to 87
Actions #7

Updated by Stephen Benjamin about 9 years ago

  • Assignee set to Stephen Benjamin
Actions #8

Updated by The Foreman Bot about 9 years ago

  • Status changed from New to Ready For Testing
  • Pull request https://github.com/theforeman/foreman_remote_execution/pull/55 added
  • Pull request deleted ()
Actions #9

Updated by Stephen Benjamin about 9 years ago

  • Related to Refactor #12243: Make Foreman KeyPair reusuable by other models added
Actions #10

Updated by Marek Hulán about 9 years ago

  • Related to Feature #12330: Support plugin snippets in templates added
Actions #11

Updated by Marek Hulán about 9 years ago

  • Status changed from Ready For Testing to Closed
  • % Done changed from 0 to 100
  • Translation missing: en.field_release set to 103
Actions

Also available in: Atom PDF