2014-12-18 23:12:51 +01:00
|
|
|
---
|
2014-12-22 10:25:31 +01:00
|
|
|
### USER OPTIONS
|
2020-09-14 17:07:44 +02:00
|
|
|
# Set to false to disable this role completely
|
|
|
|
sshd_enable: true
|
2018-09-08 09:14:39 +02:00
|
|
|
|
2014-12-22 10:25:31 +01:00
|
|
|
# Don't apply OS defaults when set to true
|
|
|
|
sshd_skip_defaults: false
|
2018-08-25 23:39:06 +02:00
|
|
|
|
2015-06-25 15:54:24 +02:00
|
|
|
# If the below is false, don't manage the service or reload the SSH
|
|
|
|
# daemon at all
|
2017-05-04 15:31:26 +02:00
|
|
|
sshd_manage_service: true
|
2018-08-25 23:39:06 +02:00
|
|
|
|
2020-11-04 15:56:03 +01:00
|
|
|
# If the below is false, don't reload the ssh daemon on change
|
|
|
|
sshd_allow_reload: true
|
|
|
|
|
2018-08-25 23:39:06 +02:00
|
|
|
# If the below is true, also install service files from the templates pointed
|
|
|
|
# to by the `sshd_service_template_*` variables
|
|
|
|
sshd_install_service: false
|
|
|
|
sshd_service_template_service: sshd.service.j2
|
|
|
|
sshd_service_template_at_service: sshd@.service.j2
|
|
|
|
sshd_service_template_socket: sshd.socket.j2
|
|
|
|
|
2018-07-27 16:08:17 +02:00
|
|
|
# If the below is true, create a backup of the config file when the template is copied
|
2020-09-14 18:33:13 +02:00
|
|
|
sshd_backup: true
|
2018-08-25 23:48:09 +02:00
|
|
|
|
2020-10-06 21:11:35 +02:00
|
|
|
# If the below is true, also install the sysconfig file with the below options
|
|
|
|
# (useful only on Fedora and RHEL)
|
|
|
|
sshd_sysconfig: false
|
|
|
|
|
|
|
|
# If the below is true the role will override also crypto policy configuration
|
|
|
|
sshd_sysconfig_override_crypto_policy: false
|
|
|
|
|
|
|
|
# If the below is set to non-zero value, the OpenSSL random generator is
|
|
|
|
# reseeded with the given amount of random bytes (from getrandom(2)
|
|
|
|
# with GRND_RANDOM or /dev/random). Minimum is 14 bytes when enabled.
|
2020-11-06 12:15:50 +01:00
|
|
|
# This is not recommended to enable if you do not have hardware random number
|
|
|
|
# generator
|
2020-10-06 21:11:35 +02:00
|
|
|
sshd_sysconfig_use_strong_rng: 0
|
|
|
|
|
2014-12-22 10:25:31 +01:00
|
|
|
# Empty dicts to avoid errors
|
|
|
|
sshd: {}
|
|
|
|
|
2020-11-04 15:56:03 +01:00
|
|
|
# The path to sshd_config file. This is useful when creating an included
|
|
|
|
# configuration file snippet or configuring second sshd service
|
2021-06-02 14:21:40 +02:00
|
|
|
sshd_config_file: "{{ __sshd_config_file }}"
|
2020-11-04 15:56:03 +01:00
|
|
|
|
2023-09-11 15:39:03 +02:00
|
|
|
# If not empty, list of trusted CA keys
|
|
|
|
sshd_trusted_user_ca_keys_list: []
|
|
|
|
|
|
|
|
# If not empty, dict containing principals for users in the os
|
|
|
|
sshd_principals: {}
|
|
|
|
|
2014-12-22 10:25:31 +01:00
|
|
|
### VARS DEFAULTS
|
|
|
|
### The following are defaults for OS specific configuration in var files in
|
2022-08-17 14:05:10 +02:00
|
|
|
### this role. They should not be set directly by role users, unless they know
|
|
|
|
### what they are doing, e.g. installing extra packages or installing an
|
|
|
|
### alternative SystemD service file
|
2022-08-17 13:53:56 +02:00
|
|
|
sshd_packages: "{{ __sshd_packages }}"
|
2021-06-02 14:21:40 +02:00
|
|
|
sshd_config_owner: "{{ __sshd_config_owner }}"
|
|
|
|
sshd_config_group: "{{ __sshd_config_group }}"
|
|
|
|
sshd_config_mode: "{{ __sshd_config_mode }}"
|
2022-08-17 13:53:56 +02:00
|
|
|
sshd_binary: "{{ __sshd_binary }}"
|
|
|
|
sshd_service: "{{ __sshd_service }}"
|
|
|
|
sshd_sftp_server: "{{ __sshd_sftp_server }}"
|
2018-08-25 23:39:06 +02:00
|
|
|
|
2022-08-17 16:34:35 +02:00
|
|
|
sshd_drop_in_dir_mode: "{{ __sshd_drop_in_dir_mode }}"
|
|
|
|
sshd_main_config_file: "{{ __sshd_main_config_file }}"
|
|
|
|
|
2023-09-11 15:39:03 +02:00
|
|
|
sshd_trustedusercakeys_directory_owner: "{{ __sshd_trustedusercakeys_directory_owner }}"
|
|
|
|
sshd_trustedusercakeys_directory_group: "{{ __sshd_trustedusercakeys_directory_group }}"
|
|
|
|
sshd_trustedusercakeys_directory_mode: "{{ __sshd_trustedusercakeys_directory_mode }}"
|
|
|
|
sshd_trustedusercakeys_file_owner: "{{ __sshd_trustedusercakeys_file_owner }}"
|
|
|
|
sshd_trustedusercakeys_file_group: "{{ __sshd_trustedusercakeys_file_group }}"
|
|
|
|
sshd_trustedusercakeys_file_mode: "{{ __sshd_trustedusercakeys_file_mode }}"
|
|
|
|
|
|
|
|
sshd_authorizedprincipals_directory_owner: "{{ __sshd_authorizedprincipals_directory_owner }}"
|
|
|
|
sshd_authorizedprincipals_directory_group: "{{ __sshd_authorizedprincipals_directory_group }}"
|
|
|
|
sshd_authorizedprincipals_directory_mode: "{{ __sshd_authorizedprincipals_directory_mode }}"
|
|
|
|
sshd_authorizedprincipals_file_owner: "{{ __sshd_authorizedprincipals_file_owner }}"
|
|
|
|
sshd_authorizedprincipals_file_group: "{{ __sshd_authorizedprincipals_file_group }}"
|
|
|
|
sshd_authorizedprincipals_file_mode: "{{ __sshd_authorizedprincipals_file_mode }}"
|
|
|
|
|
2020-10-23 21:10:00 +02:00
|
|
|
# This lists by default all hostkeys as rendered in the generated configuration
|
|
|
|
# file ("auto"). Before attempting to run sshd (either for verification of
|
|
|
|
# configuration or restarting), we make sure the keys exist and have correct
|
|
|
|
# permissions. To disable this check, set sshd_verify_hostkeys to false
|
|
|
|
sshd_verify_hostkeys: "auto"
|
2022-08-17 14:05:10 +02:00
|
|
|
|
2021-06-02 14:21:40 +02:00
|
|
|
sshd_hostkey_owner: "{{ __sshd_hostkey_owner }}"
|
|
|
|
sshd_hostkey_group: "{{ __sshd_hostkey_group }}"
|
|
|
|
sshd_hostkey_mode: "{{ __sshd_hostkey_mode }}"
|
2020-10-23 21:10:00 +02:00
|
|
|
|
2021-06-10 21:46:06 +02:00
|
|
|
# instead of replacing the whole configuration file, just add a specified
|
2021-05-20 16:52:29 +02:00
|
|
|
# snippet
|
2021-06-10 21:46:06 +02:00
|
|
|
sshd_config_namespace: null
|
2022-12-13 17:55:13 +01:00
|
|
|
|
|
|
|
# If this option is enabled, the role will configure firewall to open the ports
|
|
|
|
# defined in the configuration. This works only on Red Hat based systems.
|
|
|
|
sshd_manage_firewall: false
|
|
|
|
|
|
|
|
# If this option is enabled, the role will configure selinux to allow sshd to
|
|
|
|
# bind the ports defined in the configuration. This works only on Red Hat based systems.
|
|
|
|
sshd_manage_selinux: false
|