diff options
| author | Emil Renner Berthing <esmil@labitat.dk> | 2020-02-27 14:44:24 +0100 | 
|---|---|---|
| committer | Emil Renner Berthing <esmil@labitat.dk> | 2020-02-27 17:45:04 +0100 | 
| commit | d26fe55aa9de5f0eb51152c22d12ff28a9c488d4 (patch) | |
| tree | 04501e2a33ec62cd07e4e55efd1a4ab411abc578 /roles/fedora/tasks | |
| parent | 4115d711842ea235966868a325f5d42ee428db14 (diff) | |
| download | labitat-ansible-d26fe55aa9de5f0eb51152c22d12ff28a9c488d4.tar.gz labitat-ansible-d26fe55aa9de5f0eb51152c22d12ff28a9c488d4.tar.xz labitat-ansible-d26fe55aa9de5f0eb51152c22d12ff28a9c488d4.zip  | |
space_server: use common secrets.yml in ansible root
..and generalize and move sshd tasks to fedora role.
Diffstat (limited to 'roles/fedora/tasks')
| -rw-r--r-- | roles/fedora/tasks/main.yml | 2 | ||||
| -rw-r--r-- | roles/fedora/tasks/sshd.yml | 51 | 
2 files changed, 53 insertions, 0 deletions
diff --git a/roles/fedora/tasks/main.yml b/roles/fedora/tasks/main.yml index 4492df5..de4c160 100644 --- a/roles/fedora/tasks/main.yml +++ b/roles/fedora/tasks/main.yml @@ -20,5 +20,7 @@    tags: networkd  - import_tasks: timesyncd.yml    tags: timesyncd +- import_tasks: sshd.yml +  tags: sshd  # vim: set ts=2 sw=2 et: diff --git a/roles/fedora/tasks/sshd.yml b/roles/fedora/tasks/sshd.yml new file mode 100644 index 0000000..603fbf9 --- /dev/null +++ b/roles/fedora/tasks/sshd.yml @@ -0,0 +1,51 @@ +--- +- name: Create private host keys +  copy: +    dest: '/etc/ssh/{{ item.key }}' +    content: '{{ item.value.private }}' +    owner: root +    group: ssh_keys +    mode: 0640 +  with_dict: '{{ ssh_host_keys[hostname] }}' +  loop_control: +    label: '/etc/ssh/{{ item.key }}' +  when: ssh_host_keys is defined and hostname in ssh_host_keys + +- name: Create public host keys +  copy: +    dest: '/etc/ssh/{{ item.key }}.pub' +    content: '{{ item.value.public }}' +    owner: root +    group: root +    mode: 0644 +  with_dict: '{{ ssh_host_keys[hostname] }}' +  loop_control: +    label: '/etc/ssh/{{ item.key }}.pub' +  when: ssh_host_keys is defined and hostname in ssh_host_keys + +- name: Configure SSH daemon +  lineinfile: +    path: '/etc/ssh/sshd_config' +    regexp: '{{ item.regexp }}' +    line: '{{ item.line }}' +  with_items: +  - regexp: '^[# ]*PermitRootLogin' +    line: 'PermitRootLogin no' +  - regexp: '^PasswordAuthentication' +    line: 'PasswordAuthentication no' +  - regexp: '^[# ]*GSSAPIAuthentication' +    line: 'GSSAPIAuthentication no' +  notify: restart sshd + +- name: Enable SSH daemon +  systemd: +    name: sshd.service +    enabled: yes +    masked: no +    state: started +  when: not chroot +- name: '- when in chroot' +  command: systemctl enable sshd.service +  when: chroot|bool + +# vim: set ts=2 sw=2 et:  | 
