From 1be510f9529cb082f802408b472a77d074b394c0 Mon Sep 17 00:00:00 2001 From: Nicolas Vigier Date: Sun, 14 Apr 2013 13:46:12 +0000 Subject: Add zarb MLs html archives --- zarb-ml/mageia-sysadm/2011-January/002054.html | 178 +++++++++++++++++++++++++ 1 file changed, 178 insertions(+) create mode 100644 zarb-ml/mageia-sysadm/2011-January/002054.html (limited to 'zarb-ml/mageia-sysadm/2011-January/002054.html') diff --git a/zarb-ml/mageia-sysadm/2011-January/002054.html b/zarb-ml/mageia-sysadm/2011-January/002054.html new file mode 100644 index 000000000..563ff6fe2 --- /dev/null +++ b/zarb-ml/mageia-sysadm/2011-January/002054.html @@ -0,0 +1,178 @@ + + + + [Mageia-sysadm] [780] move the type of access_class to deployment ( as this is tied to our group name ) + + + + + + + + + +

[Mageia-sysadm] [780] move the type of access_class to deployment ( as this is tied to our group name )

+ root at mageia.org + root at mageia.org +
+ Thu Jan 13 19:12:32 CET 2011 +

+
+ +
Revision: 780
+Author:   misc
+Date:     2011-01-13 19:12:32 +0100 (Thu, 13 Jan 2011)
+Log Message:
+-----------
+move the type of access_class to deployment ( as this is tied to our group name )
+
+Modified Paths:
+--------------
+    puppet/manifests/nodes.pp
+    puppet/modules/pam/manifests/init.pp
+
+Added Paths:
+-----------
+    puppet/deployment/access_class/
+    puppet/deployment/access_class/manifests/
+    puppet/deployment/access_class/manifests/init.pp
+
+Added: puppet/deployment/access_class/manifests/init.pp
+===================================================================
+--- puppet/deployment/access_class/manifests/init.pp	                        (rev 0)
++++ puppet/deployment/access_class/manifests/init.pp	2011-01-13 18:12:32 UTC (rev 780)
+@@ -0,0 +1,28 @@
++class access_class {
++ 
++  # beware , theses classes are exclusives
++  # if you need multiple group access, you need to define you own class
++  # of access  
++ 
++  # for server where only admins can connect
++  class admin {
++    pam::multiple_ldap_access { "admin":
++        access_classes => ['mga-sysadmin']
++    }
++  }
++
++  # for server where people can connect with ssh ( git, svn )
++  class committers {
++    # this is required, as we force the shell to be the restricted one
++    # openssh will detect if the file do not exist and while refuse to log the
++    # user, and erase the password ( see pam_auth.c in openssh code, seek badpw )
++    # so the file must exist
++    # permission to use svn, git, etc must be added separatly
++     
++    include restrictshell::shell
++
++    pam::multiple_ldap_access { "committers":
++        access_classes => ['mga-commiters']
++    }
++  }
++}
+
+Modified: puppet/manifests/nodes.pp
+===================================================================
+--- puppet/manifests/nodes.pp	2011-01-13 18:12:31 UTC (rev 779)
++++ puppet/manifests/nodes.pp	2011-01-13 18:12:32 UTC (rev 780)
+@@ -21,7 +21,7 @@
+     include buildsystem::mainnode
+     include buildsystem::mgacreatehome
+ 
+-    include pam::committers_access
++    include access_class::committers
+     include restrictshell::allow_svn
+     include restrictshell::allow_pkgsubmit
+     include openssh::ssh_keys_from_ldap
+
+Modified: puppet/modules/pam/manifests/init.pp
+===================================================================
+--- puppet/modules/pam/manifests/init.pp	2011-01-13 18:12:31 UTC (rev 779)
++++ puppet/modules/pam/manifests/init.pp	2011-01-13 18:12:32 UTC (rev 780)
+@@ -47,30 +47,4 @@
+   define multiple_ldap_access($access_classes) {
+     include base
+   }
+- 
+-  # beware , this two classes are exclusives
+-  # if you need multiple group access, you need to define you own class
+-  # of access  
+- 
+-  # for server where only admins can connect
+-  class admin_access {
+-    multiple_ldap_access { "admin_access":
+-        access_classes => ['mga-sysadmin']
+-    }
+-  }
+-
+-  # for server where people can connect with ssh ( git, svn )
+-  class committers_access {
+-    # this is required, as we force the shell to be the restricted one
+-    # openssh will detect if the file do not exist and while refuse to log the
+-    # user, and erase the password ( see pam_auth.c in openssh code, seek badpw )
+-    # so the file must exist
+-    # permission to use svn, git, etc must be added separatly
+-     
+-    include restrictshell::shell
+-
+-    multiple_ldap_access { "committers_access":
+-        access_classes => ['mga-commiters']
+-    }
+-  }
+ }
+-------------- next part --------------
+An HTML attachment was scrubbed...
+URL: </pipermail/mageia-sysadm/attachments/20110113/b11cf251/attachment-0001.html>
+
+ + + + + + + + + + + + + + + + + + + + + +
+

+ +
+More information about the Mageia-sysadm +mailing list
+ -- cgit v1.2.1