diff --git a/docs/index.html b/docs/index.html index 7111ed1..80d076f 100644 --- a/docs/index.html +++ b/docs/index.html @@ -158,7 +158,7 @@ id="toc-sshd_install_service">sshd_install_service id="toc-sshd_manage_firewall">sshd_manage_firewall
  • sshd_manage_selinux
  • -
  • sshd
  • +
  • sshd_config
  • sshd_<OptionName>
  • false.

    NOTE: sshd_manage_selinux is limited to adding policy. It cannot be used for removing policy. If you want to remove ports, you will need to use the selinux system role directly.

    -

    sshd

    +

    sshd_config

    A dict containing configuration. e.g.

    sshd:
    +class="sourceCode yaml">sshd_config:
       Compression: delayed
       ListenAddress:
         - 0.0.0.0
    +

    Note: This variable was previous called sshd. +sshd is can still be used but is deprecated and will be +removed in a future release.

    sshd_<OptionName>

    Simple variables can be used rather than a dict. Simple values override dict values. e.g.:

    @@ -577,7 +580,7 @@ to the above variables, respective configuration options AuthorizedPrincipalsFile (optional) need to be present the sshd dictionary when invoking the role. For example:

    sshd:
    +class="sourceCode yaml">sshd_config:
       TrustedUserCAKeys: /etc/ssh/path-to-trusted-user-ca-keys/trusted-user-ca-keys.pub
       AuthorizedPrincipalsFile: "/etc/ssh/path-to-auth-principals/auth_principals/%u"

    To learn more about SSH Certificates, here is a - hosts: all vars: sshd_skip_defaults: true - sshd: + sshd_config: Compression: true ListenAddress: - "0.0.0.0" @@ -636,7 +639,7 @@ class="sourceCode yaml"> name: willshersystems.sshd vars: sshd_skip_defaults: true - sshd: + sshd_config: Compression: true ListenAddress: - "0.0.0.0" @@ -660,7 +663,7 @@ class="sourceCode yaml"> name: willshersystems.sshd vars: sshd_config_namespace: accept-env - sshd: + sshd_config: # there are some handy environment variables to accept AcceptEnv: LANG diff --git a/latest/README.html b/latest/README.html index 7111ed1..80d076f 100644 --- a/latest/README.html +++ b/latest/README.html @@ -158,7 +158,7 @@ id="toc-sshd_install_service">sshd_install_service

  • id="toc-sshd_manage_firewall">sshd_manage_firewall
  • sshd_manage_selinux
  • -
  • sshd
  • +
  • sshd_config
  • sshd_<OptionName>
  • false.

    NOTE: sshd_manage_selinux is limited to adding policy. It cannot be used for removing policy. If you want to remove ports, you will need to use the selinux system role directly.

    -

    sshd

    +

    sshd_config

    A dict containing configuration. e.g.

    sshd:
    +class="sourceCode yaml">sshd_config:
       Compression: delayed
       ListenAddress:
         - 0.0.0.0
    +

    Note: This variable was previous called sshd. +sshd is can still be used but is deprecated and will be +removed in a future release.

    sshd_<OptionName>

    Simple variables can be used rather than a dict. Simple values override dict values. e.g.:

    @@ -577,7 +580,7 @@ to the above variables, respective configuration options AuthorizedPrincipalsFile (optional) need to be present the sshd dictionary when invoking the role. For example:

    sshd:
    +class="sourceCode yaml">sshd_config:
       TrustedUserCAKeys: /etc/ssh/path-to-trusted-user-ca-keys/trusted-user-ca-keys.pub
       AuthorizedPrincipalsFile: "/etc/ssh/path-to-auth-principals/auth_principals/%u"

    To learn more about SSH Certificates, here is a - hosts: all vars: sshd_skip_defaults: true - sshd: + sshd_config: Compression: true ListenAddress: - "0.0.0.0" @@ -636,7 +639,7 @@ class="sourceCode yaml"> name: willshersystems.sshd vars: sshd_skip_defaults: true - sshd: + sshd_config: Compression: true ListenAddress: - "0.0.0.0" @@ -660,7 +663,7 @@ class="sourceCode yaml"> name: willshersystems.sshd vars: sshd_config_namespace: accept-env - sshd: + sshd_config: # there are some handy environment variables to accept AcceptEnv: LANG