This cookbook maintains the openssh server.
Unlike other sshd cookbooks, this cookbook respects the default settings of the current operating systems, unless these settings are explicitly overwritten.
This cookbook takes (or at least tries to) the default sshd configruation of the distribution you are using as a default. Then you can overwrite specific settings.
See below for the default settings.
You can specify the package that installs sshd, using the following attribute. There's defaults for most linux distributions.
node['sshd']['package'] # Package to install openssh-server
The following settings will be filled in using the defaults of the distribution you're using, unless you overwrite it in your node configuration / resource
node['sshd']['sshd_path'] # Path to sshd executable
node['sshd']['config_file'] # Path to sshd_config
node['sshd']['sshd_config_mode'] # File mode of sshd_config
node['sshd']['service_name'] # OpenSSH service name
You can specify every configuration option that openssh-server supports in the
sshd_config
attribute. The settings you specify will be merged with the
distributions default settings.
node['sshd']['sshd_config']['Port'] = 22
Conditional blocks are defined using hashes
node['sshd']['sshd_config']['Match']['User fred']['X11Forwarding'] = 'no'
node['sshd']['sshd_config']['Match'] = {
'User john' => {
'ChrootDirectory' => '/srv',
'ForceCommand' => 'internal-sftp',
'AllowTcpForwarding' => 'no',
'X11Forwarding' => 'no'
}
}
Some configuration options can be specified multiple times. You can reflect this using an array
node['sshd']['sshd_config']['HostKey'] = %w(key1 key2)
Runs the install recipe, then configures openssh-server according to the node attributes.
Just installs openssh-server without configuring it, as well as enabling and starting the daemon.
You can also maintain openssh-server using the resource. This is the recommended way.
To use the resource, make sure your metadata.rb includes
depends 'sshd'
To install and configure openssh-server from other recipes, use the following resource:
sshd_server node['sshd']['config_file']
or, if you need a configuration which differs from the default
sshd_server '/etc/sshd_config' do
sshd_config(
Port: 1234,
X11Forward: 'no'
)
end
The resource accepts all configuration options sshd_config
supports.
sshd_server node['sshd']['config_file'] do
sshd_config(
Port: 1234
X11Forward: 'yes'
# To specify an option multiple times, use an array
HostKey: %w(/etc/ssh/ssh_host_dsa_key /etc/ssh/ssh_host_rsa_key)
# For conditional blocks, use a hash
Match: {
'User fred' => { 'X11Forwarding' => 'no' },
'User john' => {
'ChrootDirectory' => '/srv',
'ForceCommand' => 'internal-sftp',
'AllowTcpForwarding' => 'no',
'X11Forwarding' => 'no'
}
}
end
In case you need it, you can also use a custom template to use for sshd_config
sshd_server node['sshd']['config_file'] do
cookbook 'mycookbook'
source 'mytemplate.erb'
end
The following options are set by default
Port 22
Protocol 2
AcceptEnv LANG LC_*
HostKey /etc/ssh/ssh_host_ed25519_key
HostKey /etc/ssh/ssh_host_rsa_key
HostKey /etc/ssh/ssh_host_dsa_key
HostKey /etc/ssh/ssh_host_ecdsa_key
PasswordAuthentication yes
ChallengeResponseAuthentication no
X11Forwarding yes
UsePAM yes
Plus, on debian/ubuntu machines
SyslogFacility AUTH
GSSAPIAuthentication no
Subsystem sftp /usr/lib/openssh/sftp-server
And on centos/compatible machines
SyslogFacility AUTHPRIV
GSSAPIAuthentication yes
Subsystem sftp /usr/libexec/openssh/sftp-server
You fixed a bug, or added a new feature? Yippie!
- Fork the repository on Github
- Create a named feature branch (like
add\_component\_x
) - Write your change
- Write tests for your change (if applicable)
- Run the tests, ensuring they all pass
- Submit a Pull Request using Github
Contributions of any sort are very welcome!
Authors: Chris Aumann [email protected] Contributors: Jeremy Olliver, Andy Thompson, Peter Walz, Kevin Olbrich, Johnny Martin, Renato Covarrubias, Jose A. Hernandez