ansible-sshd/vars/main.yml
Rich Megginson a25523ddce ci: Use supported ansible-lint action; run ansible-lint against the collection
The old ansible-community ansible-lint is deprecated.  There is a
new ansible-lint github action.

The latest Ansible repo gating tests run ansible-lint against
the collection format instead of against individual roles.
We have to convert the role to collection format before running
ansible-test.

This also requires tox-lsr 3.2.1

Role developers can run this locally using
`tox -e collection,ansible-lint-collection`
See https://github.com/linux-system-roles/tox-lsr/pull/125

Fix ansible-lint and ansible-test issues reported by the
latest 2.16 versions.

Signed-off-by: Rich Megginson <rmeggins@redhat.com>
2024-01-08 10:56:53 -07:00

66 lines
2.3 KiB
YAML

---
__sshd_config_file: "/etc/ssh/sshd_config"
__sshd_config_owner: "root"
__sshd_config_group: "root"
__sshd_config_mode: "0600"
__sshd_hostkey_owner: "root"
__sshd_hostkey_group: "root"
__sshd_hostkey_mode: "0600"
__sshd_trustedusercakeys_directory_owner: "root"
__sshd_trustedusercakeys_directory_group: "root"
__sshd_trustedusercakeys_directory_mode: "0755"
__sshd_trustedusercakeys_file_owner: "root"
__sshd_trustedusercakeys_file_group: "root"
__sshd_trustedusercakeys_file_mode: "0640"
__sshd_authorizedprincipals_directory_owner: "root"
__sshd_authorizedprincipals_directory_group: "root"
__sshd_authorizedprincipals_directory_mode: "0755"
__sshd_authorizedprincipals_file_owner: "root"
__sshd_authorizedprincipals_file_group: "root"
__sshd_authorizedprincipals_file_mode: "0644"
# The OpenSSH 5.3 in RHEL6 does not support "Match all" so we need a workaround
__sshd_compat_match_all: Match all
# The hostkeys not supported in FIPS mode, if applicable
__sshd_hostkeys_nofips: []
__sshd_required_facts:
- distribution
- distribution_major_version
- os_family
__sshd_skip_virt_env:
- docker
- podman
- container
- containerd
- VirtualPC
__sshd_binary: /usr/sbin/sshd
__sshd_service: sshd
__sshd_sftp_server: /usr/lib/openssh/sftp-server
__sshd_defaults: {}
__sshd_os_supported: false
__sshd_sysconfig_supports_crypto_policy: false
__sshd_sysconfig_supports_use_strong_rng: false
# The runtime directory is used by systemd to provide termoporary directory for the service
# This is used as a RuntimeDirectory= option in the service file and it needs to exist
# before running sshd for example in the validate mode.
__sshd_runtime_directory: ~
__sshd_runtime_directory_mode: "0755"
# this is the path to the main sshd_config which is checked for Include directive when
# drop-in directory is used
__sshd_main_config_file: ~
__sshd_drop_in_dir_mode: '0755'
# The list of hostkeys to check when there are none listed in configuration file.
# This is usually the case when the selection is up to the OpenSSH defaults or
# drop-in directory is used.
__sshd_verify_hostkeys_default: []
# This switch can control if the validate step is supported by the target OS.
# This is useful for very old OpenSSH or for tests that generate invalid configurations
__sshd_supports_validate: true