|
208 | 208 | Boolean $purge_sshkeys = false, |
209 | 209 | Boolean $purge_user_home = false, |
210 | 210 | Optional[String] $salt = undef, |
211 | | - Optional[Stdlib::Unixpath] $shell = '/bin/bash', |
| 211 | + Stdlib::Unixpath $shell = '/bin/bash', |
212 | 212 | Optional[Stdlib::Unixpath] $sshkey_custom_path = undef, |
213 | 213 | Optional[Accounts::User::Name] $sshkey_group = $group, |
214 | 214 | Optional[Accounts::User::Name] $sshkey_owner = $name, |
|
217 | 217 | Boolean $system = false, |
218 | 218 | Optional[Accounts::User::Uid] $uid = undef, |
219 | 219 | ) { |
220 | | - |
221 | 220 | assert_type(Accounts::User::Name, $name) |
222 | 221 |
|
223 | 222 | include accounts::user::defaults |
|
332 | 331 | forward_source => $forward_source, |
333 | 332 | user => $name, |
334 | 333 | group => $group, |
335 | | - require => [ User[$name] ], |
| 334 | + require => [User[$name]], |
336 | 335 | } |
337 | 336 | accounts::key_management { "${name}_key_management": |
338 | 337 | ensure => 'present', |
|
345 | 344 | sshkey_group => $sshkey_group, |
346 | 345 | sshkey_mode => $sshkey_mode, |
347 | 346 | purge_user_home => $purge_user_home, |
348 | | - require => Accounts::Home_dir[$_home] |
| 347 | + require => Accounts::Home_dir[$_home], |
349 | 348 | } |
350 | 349 | } elsif $sshkeys != [] { |
351 | 350 | # We are not managing the user's home directory but we have specified a |
|
361 | 360 | sshkey_mode => $sshkey_mode, |
362 | 361 | sshkey_custom_path => $sshkey_custom_path, |
363 | 362 | } |
364 | | - } |
365 | | - else { |
366 | | - warning("ssh keys were passed for user ${name} but $managehome is set to false; not managing user ssh keys") |
| 363 | + } else { |
| 364 | + warning("ssh keys were passed for user ${name} but managehome is set to false; not managing user ssh keys") |
367 | 365 | } |
368 | 366 | } |
369 | 367 | } |
|
0 commit comments