geo-rep: Fix ssh issue in geo-rep
In geo-rep mountbroker setup, workers fails with 'Permission Denied' even though the public keys are shared to all the slave nodes. The issue is with selinux context not being set for .ssh and .ssh/authorizedkeys. Doing restorecon on these entries to set default selinux security context fixes the issue. Change-Id: I75e16d22f7a168de6c13b0c7571a7ab75761ae0d BUG: 1235359 Signed-off-by: Kotresh HR <khiremat@redhat.com> Reviewed-on: http://review.gluster.org/11383 Tested-by: NetBSD Build System <jenkins@build.gluster.org> Reviewed-by: Aravinda VK <avishwan@redhat.com> Reviewed-by: darshan n <dnarayan@redhat.com> Reviewed-by: Venky Shankar <vshankar@redhat.com>
This commit is contained in:
parent
6ab37f0cb4
commit
f1139ca4f8
@ -53,6 +53,13 @@ if [ ! -d $authorized_keys_file ]; then
|
||||
chown $user: $authorized_keys_file;
|
||||
fi
|
||||
|
||||
# Restore SELinux security contexts. This is required
|
||||
# for passwdless SSH to work.
|
||||
|
||||
if type restorecon >/dev/null 2>&1; then
|
||||
restorecon -F $ssh_dir $authorized_keys_file;
|
||||
fi
|
||||
|
||||
# Add to authorized_keys file only if not exists already
|
||||
while read line
|
||||
do
|
||||
|
Loading…
x
Reference in New Issue
Block a user