diff --git a/docs/index.html b/docs/index.html index 7111ed1..80d076f 100644 --- a/docs/index.html +++ b/docs/index.html @@ -158,7 +158,7 @@ id="toc-sshd_install_service">sshd_install_service id="toc-sshd_manage_firewall">sshd_manage_firewall
<OptionName>
NOTE: sshd_manage_selinux
is limited to adding
policy. It cannot be used for removing policy. If you want to
remove ports, you will need to use the selinux system role directly.
A dict containing configuration. e.g.
sshd:
+class="sourceCode yaml">sshd_config:
Compression: delayed
ListenAddress:
- 0.0.0.0
Note: This variable was previous called sshd
.
+sshd
is can still be used but is deprecated and will be
+removed in a future release.
<OptionName>
Simple variables can be used rather than a dict. Simple values override dict values. e.g.:
@@ -577,7 +580,7 @@ to the above variables, respective configuration optionsAuthorizedPrincipalsFile
(optional) need to be present the
sshd
dictionary when invoking the role. For example:
sshd:
+class="sourceCode yaml">sshd_config:
TrustedUserCAKeys: /etc/ssh/path-to-trusted-user-ca-keys/trusted-user-ca-keys.pub
AuthorizedPrincipalsFile: "/etc/ssh/path-to-auth-principals/auth_principals/%u"
To learn more about SSH Certificates, here is a - hosts: all
vars:
sshd_skip_defaults: true
- sshd:
+ sshd_config:
Compression: true
ListenAddress:
- "0.0.0.0"
@@ -636,7 +639,7 @@ class="sourceCode yaml">
name: willshersystems.sshd
vars:
sshd_skip_defaults: true
- sshd:
+ sshd_config:
Compression: true
ListenAddress:
- "0.0.0.0"
@@ -660,7 +663,7 @@ class="sourceCode yaml">
name: willshersystems.sshd
vars:
sshd_config_namespace: accept-env
- sshd:
+ sshd_config:
# there are some handy environment variables to accept
AcceptEnv:
LANG
diff --git a/latest/README.html b/latest/README.html
index 7111ed1..80d076f 100644
--- a/latest/README.html
+++ b/latest/README.html
@@ -158,7 +158,7 @@ id="toc-sshd_install_service">sshd_install_service
<OptionName>
NOTE: sshd_manage_selinux
is limited to adding
policy. It cannot be used for removing policy. If you want to
remove ports, you will need to use the selinux system role directly.
A dict containing configuration. e.g.
sshd:
+class="sourceCode yaml">sshd_config:
Compression: delayed
ListenAddress:
- 0.0.0.0
Note: This variable was previous called sshd
.
+sshd
is can still be used but is deprecated and will be
+removed in a future release.
<OptionName>
Simple variables can be used rather than a dict. Simple values override dict values. e.g.:
@@ -577,7 +580,7 @@ to the above variables, respective configuration optionsAuthorizedPrincipalsFile
(optional) need to be present the
sshd
dictionary when invoking the role. For example:
sshd:
+class="sourceCode yaml">sshd_config:
TrustedUserCAKeys: /etc/ssh/path-to-trusted-user-ca-keys/trusted-user-ca-keys.pub
AuthorizedPrincipalsFile: "/etc/ssh/path-to-auth-principals/auth_principals/%u"
To learn more about SSH Certificates, here is a - hosts: all
vars:
sshd_skip_defaults: true
- sshd:
+ sshd_config:
Compression: true
ListenAddress:
- "0.0.0.0"
@@ -636,7 +639,7 @@ class="sourceCode yaml">
name: willshersystems.sshd
vars:
sshd_skip_defaults: true
- sshd:
+ sshd_config:
Compression: true
ListenAddress:
- "0.0.0.0"
@@ -660,7 +663,7 @@ class="sourceCode yaml">
name: willshersystems.sshd
vars:
sshd_config_namespace: accept-env
- sshd:
+ sshd_config:
# there are some handy environment variables to accept
AcceptEnv:
LANG