forked from ungleich-public/cdist
Merge remote-tracking branch 'steven/issue/365'
This commit is contained in:
commit
7fab50a82b
14 changed files with 300 additions and 38 deletions
|
@ -46,13 +46,13 @@ tmpfile=\$(mktemp ${file}.cdist.XXXXXXXXXX)
|
||||||
if [ -f "$file" ]; then
|
if [ -f "$file" ]; then
|
||||||
cp -p "$file" "\$tmpfile"
|
cp -p "$file" "\$tmpfile"
|
||||||
fi
|
fi
|
||||||
awk -v prefix="^$prefix\\\$" -v suffix="^$suffix\\\$" '
|
awk -v prefix="^$prefix\$" -v suffix="^$suffix\$" '
|
||||||
{
|
{
|
||||||
if (index(\$0,prefix)) {
|
if (match(\$0,prefix)) {
|
||||||
triggered=1
|
triggered=1
|
||||||
}
|
}
|
||||||
if (triggered) {
|
if (triggered) {
|
||||||
if (index(\$0,suffix)) {
|
if (match(\$0,suffix)) {
|
||||||
triggered=0
|
triggered=0
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
|
|
26
cdist/conf/type/__ssh_authorized_key/explorer/entry
Executable file
26
cdist/conf/type/__ssh_authorized_key/explorer/entry
Executable file
|
@ -0,0 +1,26 @@
|
||||||
|
#!/bin/sh
|
||||||
|
#
|
||||||
|
# 2014 Steven Armstrong (steven-cdist at armstrong.cc)
|
||||||
|
#
|
||||||
|
# This file is part of cdist.
|
||||||
|
#
|
||||||
|
# cdist is free software: you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation, either version 3 of the License, or
|
||||||
|
# (at your option) any later version.
|
||||||
|
#
|
||||||
|
# cdist is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with cdist. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
#
|
||||||
|
|
||||||
|
# extract the keytype and base64 encoded key ignoring any options and comment
|
||||||
|
type_and_key="$(cat "$__object/parameter/key" | tr ' ' '\n' | awk '/^(ssh|ecdsa)-[^ ]+/ { printf $1" "; getline; printf $1 }')"
|
||||||
|
file="$(cat $__object/parameter/file)"
|
||||||
|
|
||||||
|
# get any entries that match the type and key
|
||||||
|
grep ".*$type_and_key[ \n]" "$file" || true
|
109
cdist/conf/type/__ssh_authorized_key/gencode-remote
Executable file
109
cdist/conf/type/__ssh_authorized_key/gencode-remote
Executable file
|
@ -0,0 +1,109 @@
|
||||||
|
#!/bin/sh
|
||||||
|
#
|
||||||
|
# 2014 Steven Armstrong (steven-cdist at armstrong.cc)
|
||||||
|
#
|
||||||
|
# This file is part of cdist.
|
||||||
|
#
|
||||||
|
# cdist is free software: you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation, either version 3 of the License, or
|
||||||
|
# (at your option) any later version.
|
||||||
|
#
|
||||||
|
# cdist is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with cdist. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
#
|
||||||
|
|
||||||
|
set -u
|
||||||
|
|
||||||
|
remove_line() {
|
||||||
|
file="$1"
|
||||||
|
line="$2"
|
||||||
|
cat << DONE
|
||||||
|
tmpfile=\$(mktemp ${file}.cdist.XXXXXXXXXX)
|
||||||
|
# preserve ownership and permissions of existing file
|
||||||
|
if [ -f "$file" ]; then
|
||||||
|
cp -p "$file" "\$tmpfile"
|
||||||
|
fi
|
||||||
|
grep -v -F -x '$line' '$file' > \$tmpfile || true
|
||||||
|
mv -f "\$tmpfile" "$file"
|
||||||
|
DONE
|
||||||
|
}
|
||||||
|
|
||||||
|
add_line() {
|
||||||
|
file="$1"
|
||||||
|
line="$2"
|
||||||
|
# escape single quotes
|
||||||
|
line_sanitised=$(echo "$line" | sed -e "s/'/'\"'\"'/g")
|
||||||
|
printf '%s' "printf '%s\n' '$line_sanitised' >> $file"
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
file="$(cat "$__object/parameter/file")"
|
||||||
|
mkdir "$__object/files"
|
||||||
|
|
||||||
|
# Generate the entry as it should be
|
||||||
|
(
|
||||||
|
if [ -f "$__object/parameter/option" ]; then
|
||||||
|
# comma seperated list of options
|
||||||
|
options="$(cat "$__object/parameter/option" | tr '\n' ',')"
|
||||||
|
printf '%s ' "${options%*,}"
|
||||||
|
fi
|
||||||
|
if [ -f "$__object/parameter/comment" ]; then
|
||||||
|
# extract the keytype and base64 encoded key ignoring any options and comment
|
||||||
|
printf '%s ' "$(cat "$__object/parameter/key" | tr ' ' '\n' | awk '/^(ssh|ecdsa)-[^ ]+/ { printf $1" "; getline; printf $1 }')"
|
||||||
|
# override the comment with the one explicitly given
|
||||||
|
printf '%s' "$(cat "$__object/parameter/comment")"
|
||||||
|
else
|
||||||
|
printf '%s' "$(cat "$__object/parameter/key")"
|
||||||
|
fi
|
||||||
|
printf '\n'
|
||||||
|
) > "$__object/files/should"
|
||||||
|
|
||||||
|
# Remove conflicting entries if any
|
||||||
|
if [ -s "$__object/explorer/entry" ]; then
|
||||||
|
# Note that the files have to be sorted for comparison with `comm`.
|
||||||
|
sort "$__object/explorer/entry" > "$__object/files/is"
|
||||||
|
comm -13 "$__object/files/should" "$__object/files/is" | {
|
||||||
|
while read entry; do
|
||||||
|
remove_line "$file" "$entry"
|
||||||
|
done
|
||||||
|
}
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Determine the current state
|
||||||
|
entry="$(cat "$__object/files/should")"
|
||||||
|
state_should="$(cat "$__object/parameter/state")"
|
||||||
|
num_existing_entries=$(grep -c -F -x "$entry" "$__object/explorer/entry")
|
||||||
|
if [ $num_existing_entries -eq 1 ]; then
|
||||||
|
state_is="present"
|
||||||
|
else
|
||||||
|
# Posix grep does not define the -m option, so we can not remove a single
|
||||||
|
# occurence of a string from a file in the `remove_line` function. Instead
|
||||||
|
# _all_ occurences are removed.
|
||||||
|
# By using `comm` to detect conflicting entries this could lead to the
|
||||||
|
# situation that the key we want to add is actually removed.
|
||||||
|
# To workaround this we must treat 0 or more then 1 existing entries to
|
||||||
|
# mean current state is 'absent'. By doing this, the key is readded
|
||||||
|
# again after cleaning up conflicting entries.
|
||||||
|
state_is="absent"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Manage the actual entry as it should be
|
||||||
|
if [ "$state_should" = "$state_is" ]; then
|
||||||
|
# Nothing to do
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
|
||||||
|
case "$state_should" in
|
||||||
|
present)
|
||||||
|
add_line "$file" "$entry"
|
||||||
|
;;
|
||||||
|
absent)
|
||||||
|
remove_line "$file" "$entry"
|
||||||
|
;;
|
||||||
|
esac
|
67
cdist/conf/type/__ssh_authorized_key/man.text
Normal file
67
cdist/conf/type/__ssh_authorized_key/man.text
Normal file
|
@ -0,0 +1,67 @@
|
||||||
|
cdist-type__ssh_authorized_key(7)
|
||||||
|
=================================
|
||||||
|
Steven Armstrong <steven-cdist--@--armstrong.cc>
|
||||||
|
|
||||||
|
|
||||||
|
NAME
|
||||||
|
----
|
||||||
|
cdist-type__ssh_authorized_key - manage a single ssh authorized key entry
|
||||||
|
|
||||||
|
|
||||||
|
DESCRIPTION
|
||||||
|
-----------
|
||||||
|
Manage a single authorized key entry in an authorized_key file.
|
||||||
|
This type was created to be used by the __ssh_authorized_keys type.
|
||||||
|
|
||||||
|
|
||||||
|
REQUIRED PARAMETERS
|
||||||
|
-------------------
|
||||||
|
file::
|
||||||
|
the authorized_keys file to which the given key should be added
|
||||||
|
|
||||||
|
key::
|
||||||
|
a string containing the ssh keytype, base 64 encoded key and optional
|
||||||
|
trailing comment which shall be added to the given authorized_keys file.
|
||||||
|
|
||||||
|
|
||||||
|
OPTIONAL PARAMETERS
|
||||||
|
-------------------
|
||||||
|
comment::
|
||||||
|
explicit comment instead of the one which may be trailing the given key
|
||||||
|
|
||||||
|
option::
|
||||||
|
an option to set for this authorized_key entry.
|
||||||
|
Can be specified multiple times.
|
||||||
|
See sshd(8) for available options.
|
||||||
|
|
||||||
|
state::
|
||||||
|
if the given keys should be 'present' or 'absent', defaults to 'present'.
|
||||||
|
|
||||||
|
|
||||||
|
EXAMPLES
|
||||||
|
--------
|
||||||
|
|
||||||
|
--------------------------------------------------------------------------------
|
||||||
|
__ssh_authorized_key some-id \
|
||||||
|
--file "/home/user/.ssh/autorized_keys" \
|
||||||
|
--key "$(cat ~/.ssh/id_rsa.pub)"
|
||||||
|
|
||||||
|
__ssh_authorized_key some-id \
|
||||||
|
--file "/home/user/.ssh/autorized_keys" \
|
||||||
|
--key "$(cat ~/.ssh/id_rsa.pub)" \
|
||||||
|
--option 'command="/path/to/script"' \
|
||||||
|
--option 'environment="FOO=bar"' \
|
||||||
|
--comment 'one to rule them all'
|
||||||
|
--------------------------------------------------------------------------------
|
||||||
|
|
||||||
|
|
||||||
|
SEE ALSO
|
||||||
|
--------
|
||||||
|
- cdist-type(7)
|
||||||
|
- cdist__ssh_authorized_keys(7)
|
||||||
|
- sshd(8)
|
||||||
|
|
||||||
|
COPYING
|
||||||
|
-------
|
||||||
|
Copyright \(C) 2014 Steven Armstrong. Free use of this software is
|
||||||
|
granted under the terms of the GNU General Public License version 3 (GPLv3).
|
|
@ -0,0 +1 @@
|
||||||
|
present
|
2
cdist/conf/type/__ssh_authorized_key/parameter/optional
Normal file
2
cdist/conf/type/__ssh_authorized_key/parameter/optional
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
comment
|
||||||
|
state
|
|
@ -0,0 +1 @@
|
||||||
|
option
|
2
cdist/conf/type/__ssh_authorized_key/parameter/required
Normal file
2
cdist/conf/type/__ssh_authorized_key/parameter/required
Normal file
|
@ -0,0 +1,2 @@
|
||||||
|
file
|
||||||
|
key
|
32
cdist/conf/type/__ssh_authorized_keys/explorer/entries
Executable file
32
cdist/conf/type/__ssh_authorized_keys/explorer/entries
Executable file
|
@ -0,0 +1,32 @@
|
||||||
|
#!/bin/sh
|
||||||
|
#
|
||||||
|
# 2014 Steven Armstrong (steven-cdist at armstrong.cc)
|
||||||
|
#
|
||||||
|
# This file is part of cdist.
|
||||||
|
#
|
||||||
|
# cdist is free software: you can redistribute it and/or modify
|
||||||
|
# it under the terms of the GNU General Public License as published by
|
||||||
|
# the Free Software Foundation, either version 3 of the License, or
|
||||||
|
# (at your option) any later version.
|
||||||
|
#
|
||||||
|
# cdist is distributed in the hope that it will be useful,
|
||||||
|
# but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||||
|
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||||
|
# GNU General Public License for more details.
|
||||||
|
#
|
||||||
|
# You should have received a copy of the GNU General Public License
|
||||||
|
# along with cdist. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
#
|
||||||
|
|
||||||
|
# Find and sort any entries in the authorized_keys file that we care about
|
||||||
|
|
||||||
|
file="$($__type_explorer/file)"
|
||||||
|
|
||||||
|
(
|
||||||
|
while read key; do
|
||||||
|
# extract the keytype and base64 encoded key ignoring any options and comment
|
||||||
|
type_and_key="$(echo "$key" | tr ' ' '\n' | awk '/^(ssh|ecdsa)-[^ ]+/ { printf $1" "; getline; printf $1 }')"
|
||||||
|
# emit any entries that match the type and key
|
||||||
|
grep ".*$type_and_key[ \n]" "$file"
|
||||||
|
done < "$__object/parameter/key"
|
||||||
|
) | sort
|
|
@ -1,6 +1,6 @@
|
||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
#
|
#
|
||||||
# 2012 Steven Armstrong (steven-cdist at armstrong.cc)
|
# 2014 Steven Armstrong (steven-cdist at armstrong.cc)
|
||||||
#
|
#
|
||||||
# This file is part of cdist.
|
# This file is part of cdist.
|
||||||
#
|
#
|
||||||
|
@ -18,6 +18,10 @@
|
||||||
# along with cdist. If not, see <http://www.gnu.org/licenses/>.
|
# along with cdist. If not, see <http://www.gnu.org/licenses/>.
|
||||||
#
|
#
|
||||||
|
|
||||||
owner="$(cat "$__object/parameter/owner" 2>/dev/null || echo "$__object_id")"
|
if [ -f "$__object/parameter/file" ]; then
|
||||||
|
cat "$__object/parameter/file"
|
||||||
getent passwd "$owner" || true
|
else
|
||||||
|
owner="$(cat "$__object/parameter/owner" 2>/dev/null || echo "$__object_id")"
|
||||||
|
home=$(getent passwd "$owner" | cut -d':' -f 6)
|
||||||
|
echo "$home/.ssh/authorized_keys"
|
||||||
|
fi
|
|
@ -18,5 +18,6 @@
|
||||||
# along with cdist. If not, see <http://www.gnu.org/licenses/>.
|
# along with cdist. If not, see <http://www.gnu.org/licenses/>.
|
||||||
#
|
#
|
||||||
|
|
||||||
gid="$("$__type_explorer/passwd" | cut -d':' -f 4)"
|
owner="$(cat "$__object/parameter/owner" 2>/dev/null || echo "$__object_id")"
|
||||||
|
gid="$(getent passwd "$owner" | cut -d':' -f 4)"
|
||||||
getent group "$gid" || true
|
getent group "$gid" || true
|
||||||
|
|
|
@ -12,13 +12,13 @@ DESCRIPTION
|
||||||
-----------
|
-----------
|
||||||
Adds or removes ssh keys from a authorized_keys file.
|
Adds or removes ssh keys from a authorized_keys file.
|
||||||
|
|
||||||
This type uses the __ssh_dot_ssh type to the directory containing
|
This type uses the __ssh_dot_ssh type to manage the directory containing
|
||||||
the authorized_keys file.
|
the authorized_keys file. You can disable this feature with the --noparent
|
||||||
You can disable this feature with the --noparent boolean parameter.
|
boolean parameter.
|
||||||
|
|
||||||
The existence, ownership and permissions of the authorized_keys file itself are
|
The existence, ownership and permissions of the authorized_keys file itself are
|
||||||
also managed. This can be disabled with the --nofile boolean parameter. It is
|
also managed. This can be disabled with the --nofile boolean parameter. It is
|
||||||
then left to the user to ensure that the file exists and that ownership and
|
then left to the user to ensure that the file exists and that ownership and
|
||||||
permissions work with ssh.
|
permissions work with ssh.
|
||||||
|
|
||||||
|
|
||||||
|
@ -31,15 +31,23 @@ key::
|
||||||
|
|
||||||
OPTIONAL PARAMETERS
|
OPTIONAL PARAMETERS
|
||||||
-------------------
|
-------------------
|
||||||
|
comment::
|
||||||
|
explicit comment instead of the one which may be trailing the given key
|
||||||
|
|
||||||
|
file::
|
||||||
|
an alternative destination file, defaults to ~$owner/.ssh/authorized_keys
|
||||||
|
|
||||||
|
option::
|
||||||
|
an option to set for all created authorized_key entries.
|
||||||
|
Can be specified multiple times.
|
||||||
|
See sshd(8) for available options.
|
||||||
|
|
||||||
owner::
|
owner::
|
||||||
the user owning the authorized_keys file, defaults to object_id.
|
the user owning the authorized_keys file, defaults to object_id.
|
||||||
|
|
||||||
state::
|
state::
|
||||||
if the given keys should be 'present' or 'absent', defaults to 'present'.
|
if the given keys should be 'present' or 'absent', defaults to 'present'.
|
||||||
|
|
||||||
file::
|
|
||||||
an alternative destination file, defaults to ~$owner/.ssh/authorized_keys
|
|
||||||
|
|
||||||
|
|
||||||
BOOLEAN PARAMETERS
|
BOOLEAN PARAMETERS
|
||||||
------------------
|
------------------
|
||||||
|
@ -64,13 +72,24 @@ __ssh_authorized_keys root \
|
||||||
__ssh_authorized_keys user-name \
|
__ssh_authorized_keys user-name \
|
||||||
--key "ssh-rsa AXYZAAB3NzaC1yc2..."
|
--key "ssh-rsa AXYZAAB3NzaC1yc2..."
|
||||||
|
|
||||||
|
# allow key to login as user-name with options and expicit comment
|
||||||
|
__ssh_authorized_keys user-name \
|
||||||
|
--key "ssh-rsa AXYZAAB3NzaC1yc2..." \
|
||||||
|
--option no-agent-forwarding \
|
||||||
|
--option 'from="*.example.com"' \
|
||||||
|
--comment 'backup server'
|
||||||
|
|
||||||
# same as above, but with explicit owner and two keys
|
# same as above, but with explicit owner and two keys
|
||||||
|
# note that the options are set for all given keys
|
||||||
__ssh_authorized_keys some-fancy-id \
|
__ssh_authorized_keys some-fancy-id \
|
||||||
--owner user-name \
|
--owner user-name \
|
||||||
--key "ssh-rsa AXYZAAB3NzaC1yc2..." \
|
--key "ssh-rsa AXYZAAB3NzaC1yc2..." \
|
||||||
--key "ssh-rsa AZXYAAB3NzaC1yc2..."
|
--key "ssh-rsa AZXYAAB3NzaC1yc2..." \
|
||||||
|
--option no-agent-forwarding \
|
||||||
|
--option 'from="*.example.com"' \
|
||||||
|
--comment 'backup server'
|
||||||
|
|
||||||
# same as above, but authorized_keys file in non standard location
|
# authorized_keys file in non standard location
|
||||||
__ssh_authorized_keys some-fancy-id \
|
__ssh_authorized_keys some-fancy-id \
|
||||||
--file /etc/ssh/keys/user-name/authorized_keys \
|
--file /etc/ssh/keys/user-name/authorized_keys \
|
||||||
--owner user-name \
|
--owner user-name \
|
||||||
|
@ -89,6 +108,7 @@ __ssh_authorized_keys some-fancy-id \
|
||||||
SEE ALSO
|
SEE ALSO
|
||||||
--------
|
--------
|
||||||
- cdist-type(7)
|
- cdist-type(7)
|
||||||
|
- sshd(8)
|
||||||
|
|
||||||
|
|
||||||
COPYING
|
COPYING
|
||||||
|
|
|
@ -21,16 +21,7 @@
|
||||||
|
|
||||||
owner="$(cat "$__object/parameter/owner" 2>/dev/null || echo "$__object_id")"
|
owner="$(cat "$__object/parameter/owner" 2>/dev/null || echo "$__object_id")"
|
||||||
state="$(cat "$__object/parameter/state" 2>/dev/null)"
|
state="$(cat "$__object/parameter/state" 2>/dev/null)"
|
||||||
if [ -f "$__object/parameter/file" ]; then
|
file="$(cat "$__object/explorer/file")"
|
||||||
file="$(cat "$__object/parameter/file")"
|
|
||||||
else
|
|
||||||
home="$(cut -d':' -f 6 "$__object/explorer/passwd")"
|
|
||||||
if [ -z "$home" ]; then
|
|
||||||
echo "Failed to get home directory from explorer." >&2
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
file="$home/.ssh/authorized_keys"
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [ ! -f "$__object/parameter/noparent" -o ! -f "$__object/parameter/nofile" ]; then
|
if [ ! -f "$__object/parameter/noparent" -o ! -f "$__object/parameter/nofile" ]; then
|
||||||
group="$(cut -d':' -f 1 "$__object/explorer/group")"
|
group="$(cut -d':' -f 1 "$__object/explorer/group")"
|
||||||
|
@ -50,6 +41,7 @@ if [ ! -f "$__object/parameter/noparent" -o ! -f "$__object/parameter/nofile" ];
|
||||||
--group "$group" \
|
--group "$group" \
|
||||||
--mode 0600 \
|
--mode 0600 \
|
||||||
--state exists
|
--state exists
|
||||||
|
export require="__file/$file"
|
||||||
fi
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
|
@ -63,22 +55,25 @@ __block "$__object_name" \
|
||||||
--text - << DONE
|
--text - << DONE
|
||||||
remove legacy block
|
remove legacy block
|
||||||
DONE
|
DONE
|
||||||
|
export require="__block/$__object_name"
|
||||||
|
|
||||||
_cksum() {
|
_cksum() {
|
||||||
echo "$1" | cksum | cut -d' ' -f 1
|
echo "$1" | cksum | cut -d' ' -f 1
|
||||||
}
|
}
|
||||||
|
|
||||||
while read key; do
|
while read key; do
|
||||||
cksum_key="$(_cksum "$key")"
|
type_and_key="$(echo "$key" | tr ' ' '\n' | awk '/^(ssh|ecdsa)-[^ ]+/ { printf $1" "; getline; printf $1 }')"
|
||||||
line_id="${owner}-${cksum_key}"
|
object_id="$(_cksum "$file")-$(_cksum "$type_and_key")"
|
||||||
|
set -- "$object_id"
|
||||||
set -- "$line_id"
|
|
||||||
set -- "$@" --file "$file"
|
set -- "$@" --file "$file"
|
||||||
set -- "$@" --regex ".*$key.*"
|
set -- "$@" --key "$key"
|
||||||
if [ "$state" = 'present' ]; then
|
|
||||||
set -- "$@" --line "$key"
|
|
||||||
fi
|
|
||||||
set -- "$@" --state "$state"
|
set -- "$@" --state "$state"
|
||||||
# Ensure __line does not read stdin
|
if [ -f "$__object/parameter/option" ]; then
|
||||||
require="__block/$__object_name" __line "$@" < /dev/null
|
set -- "$@" --option "$(cat "$__object/parameter/option")"
|
||||||
|
fi
|
||||||
|
if [ -f "$__object/parameter/comment" ]; then
|
||||||
|
set -- "$@" --comment "$(cat "$__object/parameter/comment")"
|
||||||
|
fi
|
||||||
|
# Ensure __ssh_authorized_key does not read stdin
|
||||||
|
__ssh_authorized_key "$@" < /dev/null
|
||||||
done < "$__object/parameter/key"
|
done < "$__object/parameter/key"
|
||||||
|
|
|
@ -1,3 +1,5 @@
|
||||||
|
comment
|
||||||
|
file
|
||||||
|
option
|
||||||
owner
|
owner
|
||||||
state
|
state
|
||||||
file
|
|
||||||
|
|
Loading…
Reference in a new issue