Version information
This version is compatible with:
- Puppet Enterprise 2023.8.x, 2023.7.x, 2023.6.x, 2023.5.x, 2023.4.x, 2023.3.x, 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x, 2019.8.x, 2019.7.x, 2019.5.x, 2019.4.x, 2019.3.x, 2019.2.x, 2019.1.x, 2019.0.x, 2018.1.x, 2017.3.x, 2017.2.x, 2017.1.x, 2016.5.x, 2016.4.x
- Puppet >=2.7.11
- , , ,
Start using this module
Add this module to your Puppetfile:
mod 'aptituz-ssh', '2.4.0'
Learn more about managing modules with a PuppetfileDocumentation
Puppet module: ssh
Table of contents
- Overview
- Module Description - What the module does and why it is useful
- Backwards incompatibility
- Setup - The basics of getting started with ssh
- Usage - Configuration options and additional functionality
- Reference - An under-the-hood peek at what the module is doing and how
- Limitations - OS compatibility, etc.
- Development - Guide for contributing to the module
- Contributors
##Overview
This is a puppet module to manage openssh, including management of hostkeys and a global known_hosts file. Works on puppet >= 2.7 and Debian- aswell as RedHat-based systems.
##Module description
openssh is an integral part of most linux infrastructures and this module provides a way to manage it. Apart from package installation, configuration and service management, it supports two ways to manage a global known_hosts file:
- based on storeconfig/puppetdb, by collecting the keys created with the package installation
- based on keys generated by the module, cached on the server and rolled out by puppet (enduring re-provisioning and working without storeconfig)
Backwards incompatibility
This module has just gone through a refactoring, from the module previously written for my employer (credativ/puppet-ssh-hiera). It is no longer compatible to that module, since some of its distinct features (user management) and specifics have been removed and/or changed. This module is no longer using the params_lookup function, nor is it managing anything except ssh.
Setup
What ssh effects
- openssh package
- openssh configuration
- openssh hostkey
- openssh service
- /etc/ssh/ssh_known_hosts
Beginning with ssh
If you just want a client installed, you can run include '::ssh::client'.
If you just want a server being installed and managed with default option, you can include '::ssh::server'.
If you need to customize options, such as the ListenAddress of the server or other configurations, you need to pass an options hash or use the appropriate parameters for a few often used cases.
class { '::ssh::server':
permit_root_login => 'yes',
listen_address => '192.168.1.1',
options => $options_hash
}
Refer to the template to see what keys can be used in the options hash. Its also possible to specify an own template via the config_template parameter.
Setup requirements
This module does not have specific requirements, except if you want it to generate and manage the hostkeys of the system. Then its required to mkdir a directory /etc/puppet/ssh on your puppetmaster host and give it appropriate permissions so that puppetmaster can create and write files.
##Usage
You can include the classes you need and configure it via the parameters it supports. Please see the class docs for supported parameters and their meaning.
Classes
ssh::client
Currently only installs a ssh-client.
ssh::server
Installs and configures openssh-server, manages configuration and service by default and optionally hostkeys.
Parser Functions
ssh_keygen
The module includes a parser function ssh_keygen which can create and cache ssh keys on the server. Its used internally by the module if the module is configured to manage the hostkey.
Reference
The module contains the following public clases:
- ssh::client
- ssh::server
The following classes are currently not meant to be used directly, but used by the ssh::server class (depending on the parameters given).
- ssh::known_hosts
- ssh::known_hosts::storeconfig
- ssh::hostkey
Limitations
This module has been tested and is used primarily on Debian-based systems. Other systems are supported but cannot be guaranted.
Development
I happily accept bug reports and pull requests via github.
Contributors
This module is written and being maintained by
Patrick Schoenfeld <patrick.schoenfeld@credativ.de>.
It has been based on the module credativ/puppet-ssh-hiera, previously written for my employer and maintained together with my colleagues. It contains contributions from at least the following authors:
- Damian Lukowski
- Arnd Hannemann
- Alexander Wirt
- Tomas Barton
- Simon Page
Change log
All notable changes to this project will be documented in this file. This project adheres to Semantic Versioning.
[2.4.0]
Summary:
Mostly a maintenance release with some bugfixes provided by the community (thank you!) and one new feature: Added support for custom config fragments.
This is probably the last non-breaking release, since I'm going to prepare for future parser soon and might make use of the new features.
Changes:
- Feature: Add support for custom config fragments: Which builds sshd_config from some concat resources and adds the ssh::server::custom_config resource.
- Feature: Module now passes the hostaliases parameter to the storeconfig class (if this is used) instead of using a hardcoded list of facts. The old way is still supported when hostaliases are not defined but will soon be obsolete.
- Bugfix for listen_address and permit_root_login for PE 2015.2 and CentOS 7
- Bugfix for non working manage_known_hosts switch
- Template fixes and added support for cipher setting
- Several changes to the build support files, including update to a new puppet-lint version.
Dependencies
- puppetlabs/stdlib (>=1.0.0)
- puppetlabs/concat (>=1.2.0)
Copyright (c) 2014 Patrick Schoenfeld Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.