-
Notifications
You must be signed in to change notification settings - Fork 94
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
crmsh has issue with the default ed25519 ssh key #1504
Comments
Above comment seems can't reproduce now But there does exist another issue: When the init node and join node are already setup passwordless with the ed25519 key, then after bootstrap init/join process, there is still a key pair generated on the init node |
Steps to reproduce:
|
We'd better handle this as a new feature and define the use cases clearly. For example,
|
I think we can first address the above issue I said: the new distribution like Tumbleweed using
Let's focus on a small scope and keep improving |
In utils.ssh_copy_id_no_raise, the ssh key type is hardcoded as RSA. Then the join process will fail if the existing key type is not RSA. Also see: ClusterLabs#1504 (comment)
In utils.ssh_copy_id_no_raise, the ssh key type is hardcoded as RSA. Then the join process will fail if the existing key type is not RSA. Also see: ClusterLabs#1504 (comment)
In utils.ssh_copy_id_no_raise, the ssh key type is hardcoded as RSA. Then the join process will fail if the existing key type is not RSA. Also see: ClusterLabs#1504 (comment)
In utils.ssh_copy_id_no_raise, the ssh key type is hardcoded as RSA. Then the join process will fail if the existing key type is not RSA. Also see: ClusterLabs#1504 (comment)
When the init node already generated ssh key(default kind is ed25519), join node will failed:
It seems we have lots of places hard-coded as
id_rsa.pub
The text was updated successfully, but these errors were encountered: