__sshd_config_file: "/etc/ssh/sshd_config" __sshd_config_owner: "root" __sshd_config_group: "root" __sshd_config_mode: "0600" __sshd_hostkey_owner: "root" __sshd_hostkey_group: "root" __sshd_hostkey_mode: "0600" # The OpenSSH 5.3 in RHEL6 does not support "Match all" so we need a workaround __sshd_compat_match_all: Match all # The hostkeys not supported in FIPS mode, if applicable __sshd_hostkeys_nofips: [] __sshd_required_facts: - distribution - distribution_major_version - os_family __sshd_skip_virt_env: - docker - podman - container - containerd - VirtualPC __sshd_binary: /usr/sbin/sshd __sshd_service: sshd __sshd_sftp_server: /usr/lib/openssh/sftp-server __sshd_defaults: {} __sshd_os_supported: false __sshd_sysconfig_supports_crypto_policy: false __sshd_sysconfig_supports_use_strong_rng: false # The runtime directory is used by systemd to provide termoporary directory for the service # This is used as a RuntimeDirectory= option in the service file and it needs to exist # before running sshd for example in the validate mode. __sshd_runtime_directory: ~ __sshd_runtime_directory_mode: "0755" # this is the path to the main sshd_config which is checked for Include directive when # drop-in directory is used __sshd_main_config_file: ~ __sshd_drop_in_dir_mode: '0755' # The list of hostkeys to check when there are none listed in configuration file. # This is usually the case when the selection is up to the OpenSSH defaults or # drop-in directory is used. __sshd_verify_hostkeys_default: [] # This switch can control if the validate step is supported by the target OS. # This is useful for very old OpenSSH or for tests that generate invalid configurations __sshd_supports_validate: true