Bug 1091079 - Testing_Passwordless_SSH check in gverify.sh conflicts with documentation
Summary: Testing_Passwordless_SSH check in gverify.sh conflicts with documentation
Keywords:
Status: CLOSED EOL
Alias: None
Product: GlusterFS
Classification: Community
Component: geo-replication
Version: 3.5.0
Hardware: Unspecified
OS: Linux
medium
low
Target Milestone: ---
Assignee: Aravinda VK
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-04-24 19:48 UTC by James Le Cuirot
Modified: 2016-06-17 15:56 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2016-06-17 15:56:26 UTC
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Embargoed:


Attachments (Terms of Use)

Description James Le Cuirot 2014-04-24 19:48:44 UTC
The "Managing Geo-replication" document instructs you to create a key at /var/lib/glusterd/geo-replication/secret.pem and suggests that you should lock down SSH access using the "command" option in authorized_keys.

The Testing_Passwordless_SSH check in gverify.sh is at odds with both of these things. It executes ssh without the -i option, requiring you to add an entry to ~/.ssh/config. It also tries to execute echo, which won't work if the "command" option is used.

I don't know whether there's an option you could pass to gsyncd that would make it exit successfully. Otherwise you'll need to check for the output from gsyncd instead. Obviously -i is required too.

Comment 1 Lalatendu Mohanty 2014-04-26 17:12:57 UTC
Please point to the URL of the documentation you referred? is it 

https://github.com/gluster/glusterfs/blob/release-3.5/doc/admin-guide/en-US/markdown/admin_distributed_geo_rep.md

Comment 2 James Le Cuirot 2014-04-26 18:55:20 UTC
Close, it was this:

https://github.com/gluster/glusterfs/blob/master/doc/admin-guide/en-US/markdown/admin_geo-replication.md

But regardless of what the documentation says, I think it is very important to be able to lock down the account through authorized_keys anyway.

Comment 3 Niels de Vos 2016-06-17 15:56:26 UTC
This bug is getting closed because the 3.5 is marked End-Of-Life. There will be no further updates to this version. Please open a new bug against a version that still receives bugfixes if you are still facing this issue in a more current release.


Note You need to log in before you can comment on or make changes to this bug.