-
Notifications
You must be signed in to change notification settings - Fork 24
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Supporting restricted SSH keys #332
Comments
Puppet appears to support options, but we will have to improve how we parse the SSH key string to create the resource. Currently, we assumed the key would have the format We would need to improve the following code to support |
Instead of splitting on space, we should split on the key types: ssh-dss i.e., something like (my puppet-regexp-fu isn't great, so there may be errors):
|
With the support for restricted keys, could we make it so that Terraform cloud's IP address(es) is(are) added to their keys for the centos account ? |
Hum, looking at the connection logs using the key generated for Terraform cloud, the connections seem to come from a rather large range of IP addresses (at least 27 different IP addresses). That may not be so easy to specify... It seems to be a large number of instances on AWS EC2. We probably need to setup our own runner for this to make any sense for the key used by Terraform cloud. |
I wanted to restrict the keys that are used in the centos account, so that they can only be used from specific IP address ranges to get some protection in case of compromise, but that results in :
Is that a check that is done by puppet ?
The text was updated successfully, but these errors were encountered: