-
Notifications
You must be signed in to change notification settings - Fork 200
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unprivileged user kerberos #1571
Conversation
Also grants passwordless sudo via the groupname, which defaults to the username if groupname is not specified.
19106f6
to
8bc3978
Compare
state: present | ||
when: ansible_os_family == "Debian" | ||
|
||
- name: "Copy Kerberos client config from Host" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This seriously feels out of scope for this role. Roles should be small and focused. When I read unprivileged_user
I don't think it essentially means "reconfigure the whole system".
What I'd do is create a role to make the system a kerberos client, with an option to copy from the host. You can then combine those in a playbook. Composition is a great thing and playbooks are the right place for that.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
With the default parameter values, the behavior is exactly the same because none of the extra tasks here will run. But I don't mind extracting it out into a separate role to keep things organized.
Closing in favor of #1574 |
This builds on top of #1570 and adds capabilities to optionally install kerberos client packages, copy kerberos configuration from the host system, and copy credential cache from the host system. These features are opt-in; they are disabled by default.