Browse Source

Merge pull request #49 from cloud-hero/master

Added configuration options for ssh_config
master
puneet kandhari 9 years ago
parent
commit
67e500fb11
6 changed files with 126 additions and 3 deletions
  1. +3
    -0
      README.rst
  2. +8
    -0
      openssh/config.sls
  3. +2
    -0
      openssh/defaults.yaml
  4. +88
    -0
      openssh/files/ssh_config
  5. +2
    -3
      openssh/files/sshd_config
  6. +23
    -0
      pillar.example

+ 3
- 0
README.rst View File

by values from pillar. ``pillar.example`` results in the generation by values from pillar. ``pillar.example`` results in the generation
of the default ``sshd_config`` file on Debian Wheezy. of the default ``sshd_config`` file on Debian Wheezy.


It is highly recommended ``PermitRootLogin`` is added to pillar
so root login will be disabled.

``openssh.known_hosts`` ``openssh.known_hosts``
----------------------- -----------------------



+ 8
- 0
openssh/config.sls View File

- watch_in: - watch_in:
- service: openssh - service: openssh


ssh_config:
file.managed:
- name: {{ openssh.ssh_config }}
- source: {{ openssh.ssh_config_src }}
- template: jinja
- user: root
- mode: 644

{% for keyType in ['ecdsa', 'dsa', 'rsa', 'ed25519'] %} {% for keyType in ['ecdsa', 'dsa', 'rsa', 'ed25519'] %}
{% if salt['pillar.get']('openssh:generate_' ~ keyType ~ '_keys', False) %} {% if salt['pillar.get']('openssh:generate_' ~ keyType ~ '_keys', False) %}
ssh_generate_host_{{ keyType }}_key: ssh_generate_host_{{ keyType }}_key:

+ 2
- 0
openssh/defaults.yaml View File

openssh: openssh:
sshd_config: /etc/ssh/sshd_config sshd_config: /etc/ssh/sshd_config
sshd_config_src: salt://openssh/files/sshd_config sshd_config_src: salt://openssh/files/sshd_config
ssh_config: /etc/ssh/ssh_config
ssh_config_src: salt://openssh/files/ssh_config
banner: /etc/ssh/banner banner: /etc/ssh/banner
banner_src: salt://openssh/files/banner banner_src: salt://openssh/files/banner
ssh_known_hosts: /etc/ssh/ssh_known_hosts ssh_known_hosts: /etc/ssh/ssh_known_hosts

+ 88
- 0
openssh/files/ssh_config View File

{%- set ssh_config = pillar.get('ssh_config', {}) -%}
{#- present in ssh_config and known in actual file options -#}
{%- set processed_options = [] -%}

{#- generic renderer used for ssh matches, known options, -#}
{#- and unknown options -#}
{%- macro render_option(keyword, default, config_dict=ssh_config) -%}
{%- set value = config_dict.get(keyword, default) -%}
{%- if value is sameas true -%}
{{ keyword }} yes
{%- elif value is sameas false -%}
{{ keyword }} no
{%- elif value is string or value is number -%}
{{ keyword }} {{ value }}
{%- else -%}
{%- for single_value in value -%}
{{ keyword }} {{ single_value }}
{% endfor -%}
{%- endif -%}
{%- endmacro -%}

{#- macros for render option according to present -#}
{%- macro option_impl(keyword, default, present) -%}
{%- if present -%}
{%- do processed_options.append(keyword) -%}
{%- set prefix='' -%}
{%- else -%}
{%- set prefix='#' -%}
{%- endif -%}
{#- add prefix to keyword -#}
{%- set keyword = prefix ~ keyword -%}
{{ render_option(keyword, default) }}
{%- endmacro -%}

{#- macros for render option commented by default -#}
{%- macro option(keyword, default, present) -%}
{{ option_impl(keyword, default, keyword in ssh_config) }}
{%- endmacro -%}

{#- macros for render option uncommented by default -#}
{%- macro option_default_uncommented(keyword, default, present) -%}
{{ option_impl(keyword, default, True) }}
{%- endmacro -%}

# Do not edit this file manually!
# It will be overwritten by salt!

{{ option_default_uncommented('Host', '*') }}
{{ option(' ForwardAgent', 'no') }}
{{ option(' ForwardX11', 'no') }}
{{ option(' RhostsRSAAuthentication', 'no') }}
{{ option(' RSAAuthentication', 'yes') }}
{{ option(' PasswordAuthentication', 'yes') }}
{{ option(' HostbasedAuthentication', 'no') }}
{{ option(' GSSAPIAuthentication', 'no') }}
{{ option(' GSSAPIDelegateCredentials', 'no') }}
{{ option(' BatchMode', 'no') }}
{{ option(' CheckHostIP', 'yes') }}
{{ option(' AddressFamily', 'any') }}
{{ option(' ConnectTimeout', 0) }}
{{ option(' StrictHostKeyChecking', 'ask') }}
{{ option(' IdentityFile', '~/.ssh/id_rsa') }}
{{ option(' Port', 22) }}
{{ option(' Protocol', 2) }}
{{ option(' Cipher', '3des') }}
{{ option(' Tunnel', 'no') }}
{{ option(' TunnelDevice', 'any:any') }}
{{ option(' PermitLocalCommand', 'no') }}
{{ option(' VisualHostKey', 'no') }}

{# Handling unknown in salt template options #}
{%- for keyword in ssh_config.keys() %}
{#- Matches have to be at the bottom and should be handled differently -#}
{%- if not keyword in processed_options and keyword != 'matches' -%}
{#- send a blank default as it doesn't matter #}
{{ render_option(keyword, '') }}
{%- endif -%}
{%- endfor %}

{# Handle matches last as they need to go at the bottom #}
{%- if 'matches' in ssh_config %}
{%- for match in ssh_config['matches'].values() %}
Match {{ match['type'].keys()[0] }} {{ match['type'].values()[0] }}
{%- for keyword in match['options'].keys() %}
{{ render_option(keyword, '', config_dict=match['options']) }}
{%- endfor %}
{%- endfor %}
{%- endif %}

+ 2
- 3
openssh/files/sshd_config View File

# Use these options to restrict which interfaces/protocols sshd will bind to # Use these options to restrict which interfaces/protocols sshd will bind to
{{ option('ListenAddress', ['::', '0.0.0.0']) }} {{ option('ListenAddress', ['::', '0.0.0.0']) }}
{{ option_default_uncommented('Protocol', 2) }} {{ option_default_uncommented('Protocol', 2) }}

# HostKeys for protocol version 2 # HostKeys for protocol version 2
{{ option_default_uncommented('HostKey', ['/etc/ssh/ssh_host_rsa_key', '/etc/ssh/ssh_host_dsa_key', '/etc/ssh/ssh_host_ecdsa_key', '/etc/ssh/ssh_host_ed25519_key']) -}} {{ option_default_uncommented('HostKey', ['/etc/ssh/ssh_host_rsa_key', '/etc/ssh/ssh_host_dsa_key', '/etc/ssh/ssh_host_ecdsa_key', '/etc/ssh/ssh_host_ed25519_key']) -}}




# Authentication: # Authentication:
{{ option_default_uncommented('LoginGraceTime', 120) }} {{ option_default_uncommented('LoginGraceTime', 120) }}
{{ option_default_uncommented('PermitRootLogin', 'no') }}
{{ option_default_uncommented('PermitRootLogin', 'yes') }}
{{ option_default_uncommented('StrictModes', 'yes') }} {{ option_default_uncommented('StrictModes', 'yes') }}


{{ option('DSAAuthentication', 'yes') }} {{ option('DSAAuthentication', 'yes') }}


{# Handling unknown in salt template options #} {# Handling unknown in salt template options #}
{%- for keyword in sshd_config.keys() %} {%- for keyword in sshd_config.keys() %}
{#- Matches have to be at the bottem and should be handled differently -#}
{#- Matches have to be at the bottom and should be handled differently -#}
{%- if not keyword in processed_options and keyword != 'matches' -%} {%- if not keyword in processed_options and keyword != 'matches' -%}
{#- send a blank default as it doesn't matter #} {#- send a blank default as it doesn't matter #}
{{ render_option(keyword, '') }} {{ render_option(keyword, '') }}

+ 23
- 0
pillar.example View File

Ciphers: 'aes128-ctr,aes256-ctr' Ciphers: 'aes128-ctr,aes256-ctr'
MACs: 'hmac-sha1' MACs: 'hmac-sha1'


ssh_config:
StrictHostKeyChecking: no
ForwardAgent: no
ForwardX11: no
RhostsRSAAuthentication: no
RSAAuthentication: yes
PasswordAuthentication: yes
HostbasedAuthentication: no
GSSAPIAuthentication: no
GSSAPIDelegateCredentials: no
BatchMode: 'yes'
CheckHostIP: 'yes'
AddressFamily: 'any'
ConnectTimeout: 0
IdentityFile: '~/.ssh/id_rsa'
Port: 22
Protocol: 2
Cipher: '3des'
Tunnel: 'no'
TunnelDevice: 'any:any'
PermitLocalCommand: 'no'
VisualHostKey: 'no'

openssh: openssh:
auth: auth:
joe-valid-ssh-key-desktop: joe-valid-ssh-key-desktop:

Loading…
Cancel
Save