-
Notifications
You must be signed in to change notification settings - Fork 98
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix issue #335: Allow provisioning with non-"ubuntu" user #336
Conversation
This patch fixes an issue with the SSH provisioner, which previously always assumed there was an "ubuntu" user with sudo access available on the target machine. The provisioner will now honor the username passed to `model.add_machine`. Added an additional integration test for testing the root user, as well as modifying the existing integration test to use a randomized username w/sudo access.
Can one of the admins verify this patch? |
1 similar comment
Can one of the admins verify this patch? |
This patch fixes an issue with the SSH provisioner, which previously always assumed there was an "ubuntu" user with sudo access available on the target machine. The provisioner will now honor the username passed to `model.add_machine`. Added an additional integration test for testing the root user, as well as modifying the existing integration test to use a randomized username w/sudo access.
… into provision_user
@SimonRichardson @achilleasa can you two take a peek at this please and help progress it. |
!!build!! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
- {} | ||
sudo: ["ALL=(ALL) NOPASSWD:ALL"] | ||
groups: adm, sudoers | ||
""".format(test_user, public_key) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
👍
|
This patch fixes an issue with the SSH provisioner, which previously
always assumed there was an "ubuntu" user with sudo access available on
the target machine.
The provisioner will now honor the username passed to
model.add_machine
.Added an additional integration test for testing the root user, as well
as modifying the existing integration test to use a randomized username
w/sudo access.