Ping not working and possible bug - /etc/dropbear/authorized_keys seems to be destroyed by OpenWisp #1121
-
|
I got the same problem as in https://github.com/orgs/openwisp/discussions/923 in a number of devices in our initial testing of OpenWisp2. The OPENWISP_CONTROLLER_MANAGEMENT_IP_ONLY: "False" in the vars section of the playbook didn't helped. (actually I'm not sure if the right format is that one or OPENWISP_CONTROLLER_MANAGEMENT_IP_ONLY=false) Using option management_interface 'br-lan' in the OpenWRT device config file fixed it. However I also discovered what I think is a bug. The /etc/dropbear/authorized_keys seems to be destroyed by OpenWisp. Instead of adding the key, it re-creates the file, so previous keys are lost? Or I did something wrong? |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 3 replies
-
I need to see the playbook in order to advice. The right syntax in Python is
Keys are supplied as files, which replace the target file entirely. If you don't want to overwrite the pre-exiting keys, add them to the template. |
Beta Was this translation helpful? Give feedback.
-
|
This is the playbook (some data redacted)
(I was following the syntax from the email previous line) In settings.py, what I should find if the playbook is correct? |
Beta Was this translation helpful? Give feedback.
-
|
As code it doesn't shows well, so here is it again:
I just tested running the playbook with the it complains |
Beta Was this translation helpful? Give feedback.
That wont't work.
Refer to
openwisp2_extra_django_settingsoropenwisp2_extra_django_settings_instructionsin the Ansible Role Variables docs page.