@@ -125,22 +125,22 @@ will autorequire this user if it is being managed as a `user` resource.
125
125
126
126
The following parameters are available in the ` ssh_authorized_key ` type.
127
127
128
- * [ ` drop_privileges ` ] ( #drop_privileges )
129
- * [ ` name ` ] ( #name )
130
- * [ ` provider ` ] ( #provider )
128
+ * [ ` drop_privileges ` ] ( #-ssh_authorized_key-- drop_privileges )
129
+ * [ ` name ` ] ( #-ssh_authorized_key-- name )
130
+ * [ ` provider ` ] ( #-ssh_authorized_key-- provider )
131
131
132
- ##### <a name =" drop_privileges " ></a >` drop_privileges `
132
+ ##### <a name =" -ssh_authorized_key-- drop_privileges" ></a >` drop_privileges `
133
133
134
- Valid values: `` true `` , `` false ` ` , ` yes ` , ` no `
134
+ Valid values: ` true ` , ` false ` , ` yes ` , ` no `
135
135
136
136
Whether to drop privileges when writing the key file. This is
137
137
useful for creating files in paths not writable by the target user. Note
138
138
the possible security implications of managing file ownership and
139
139
permissions as a privileged user.
140
140
141
- Default value: `` true ` `
141
+ Default value: ` true `
142
142
143
- ##### <a name =" name " ></a >` name `
143
+ ##### <a name =" -ssh_authorized_key-- name" ></a >` name `
144
144
145
145
namevar
146
146
@@ -151,7 +151,7 @@ Due to internal limitations, this must be unique across all user accounts;
151
151
if you want to specify one key for multiple users, you must use a different
152
152
comment for each instance.
153
153
154
- ##### <a name =" provider " ></a >` provider `
154
+ ##### <a name =" -ssh_authorized_key-- provider" ></a >` provider `
155
155
156
156
The specific backend to use for this ` ssh_authorized_key ` resource. You will seldom need to specify this --- Puppet will
157
157
usually discover the appropriate provider for your platform.
@@ -201,22 +201,22 @@ the `parsed` provider.
201
201
202
202
The following parameters are available in the ` sshkey ` type.
203
203
204
- * [ ` name ` ] ( #name )
205
- * [ ` provider ` ] ( #provider )
206
- * [ ` type ` ] ( #type )
204
+ * [ ` name ` ] ( #-sshkey-- name )
205
+ * [ ` provider ` ] ( #-sshkey-- provider )
206
+ * [ ` type ` ] ( #-sshkey-- type )
207
207
208
- ##### <a name =" name " ></a >` name `
208
+ ##### <a name =" -sshkey-- name" ></a >` name `
209
209
210
210
namevar
211
211
212
212
The host name that the key is associated with.
213
213
214
- ##### <a name =" provider " ></a >` provider `
214
+ ##### <a name =" -sshkey-- provider" ></a >` provider `
215
215
216
216
The specific backend to use for this ` sshkey ` resource. You will seldom need to specify this --- Puppet will usually
217
217
discover the appropriate provider for your platform.
218
218
219
- ##### <a name =" type " ></a >` type `
219
+ ##### <a name =" -sshkey-- type" ></a >` type `
220
220
221
221
Valid values: ` ssh-dss ` , ` ssh-ed25519 ` , ` ssh-rsa ` , ` ecdsa-sha2-nistp256 ` , ` ecdsa-sha2-nistp384 ` , ` ecdsa-sha2-nistp521 ` , ` sk-ecdsa-sha2-nistp256@openssh.com ` , ` sk-ssh-ed25519@openssh.com ` , ` dsa ` , ` ed25519 ` , ` rsa ` , ` ecdsa-sk ` , ` ed25519-sk `
222
222
0 commit comments