I’ve started looking at Ansible to manage all the laptops, VMs, SBCs that I have running Arch Got the ol’ pacman installs / updates working fine, but I’m having some problems understanding how to setup AUR to install some of those packages.

Main issue is where Ansible is basically doing everything as root, and AUR helpers don’t want to run as root, so ok, create a 2nd non-root user first…

But even installing an AUR helper (yay) brings problems:

I can setup a folder in /tmp/aur , I can git clone the yay package, but then I have no idea how to run makepkg or then yay as that non-root user.

Does anyone have this already figured out?

Or… am I going about this the wrong way?

  • mumblerfish@lemmy.world
    link
    fedilink
    arrow-up
    5
    ·
    edit-2
    10 months ago

    Sound like you have configured your Ansible to run as root per default. You should remove that from your ansible.cfg. The tasks you do need root for you use the keyword ‘become: true’ to use sudo for that task alone (or use ‘become’ for a block if several tasks).

    • SayCyberOnceMore@feddit.ukOP
      link
      fedilink
      English
      arrow-up
      2
      arrow-down
      1
      ·
      10 months ago

      Ah! Ok, I’ll dig into that and have a look.

      I thought I was SSHing into the clients as a non-root user, but I guess that’s where I’m going wrong.

      Yeah, looking at the /tmp/aur folder it creates, it’s owner is root… hmmm.

      Thanks

      • mumblerfish@lemmy.world
        link
        fedilink
        arrow-up
        2
        ·
        10 months ago

        I may be wrong, but if you did ssh as roothen it seems like your ssh configuration leaves a bit to be desired. If you can ssh in as root, you may want disallow that in your ssh configuration… don’t remember the setting now, ‘AllowRoot no’ maybe? Then it also should be that you have your pub key in root’s .ssh/authorized_keys, you may want to remove that. Allowing anyone to ssh in as root is probably not a good idea. For example ‘root’ is a very common username used in bruteforce attacks on exposed ssh ports, so locking down any possibility to get in as root directly is probably a good idea.