Version information
This version is compatible with:
- Puppet Enterprise 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x, 2019.8.x, 2019.7.x, 2019.5.x, 2019.4.x, 2019.3.x, 2019.2.x, 2019.1.x
- Puppet >= 6.1.0 < 8.0.0
- , , , , , , ,
Start using this module
Add this module to your Puppetfile:
mod 'hbenalitn-augeasproviders_ssh', '5.0.1'
Learn more about managing modules with a PuppetfileDocumentation
puppet-augeasproviders_ssh
ssh: type/provider for ssh files for Puppet
This module provides a new type/provider for Puppet to read and modify ssh config files using the Augeas configuration library.
The advantage of using Augeas over the default Puppet parsedfile
implementations is that Augeas will go to great lengths to preserve file
formatting and comments, while also failing safely when needed.
This provider will hide all of the Augeas commands etc., you don't need to know anything about Augeas to make use of it.
Requirements
Ensure both Augeas and ruby-augeas 0.3.0+ bindings are installed and working as normal. Both are usually bundled in the puppet agent AIO packages from Puppet Inc.
See Puppet/Augeas pre-requisites.
Installing
The module can be installed easily (documentation):
puppet module install puppet/augeasproviders_ssh
Ensure the module is present in your puppetmaster's own environment (it doesn't
have to use it) and that the master has pluginsync enabled. Run the agent on
the puppetmaster to cause the custom types to be synced to its local libdir
(puppet master --configprint libdir
) and then restart the puppetmaster so it
loads them.
Compatibility
Puppet versions
In theory. Puppet 2.7 is the minimal version. We currently (2022-08-29) we test against Puppet 6 and 7. Check the Puppet version range in metadata.json for supported versions.
Augeas versions
Augeas Versions | 0.10.0 | 1.0.0 | 1.1.0 | 1.2.0 |
---|---|---|---|---|
FEATURES | ||||
case-insensitive keys | no | yes | yes | yes |
PROVIDERS | ||||
ssh_config | yes | yes | yes | yes |
sshd_config | yes | yes | yes | yes |
sshd_config_match | yes | yes | yes | yes |
sshd_config_subsystem | yes | yes | yes | yes |
sshkey | yes | yes | yes | yes |
Documentation and examples
Type documentation can be generated with puppet doc -r type
or viewed on the
Puppet Forge page.
ssh_config provider
manage simple entry
ssh_config { "ForwardAgent":
ensure => present,
value => "yes",
}
manage array entry
ssh_config { "SendEnv":
ensure => present,
value => ["LC_*", "LANG"],
}
manage entry for a specific host
ssh_config { "X11Forwarding":
ensure => present,
host => "example.net",
value => "yes",
}
manage entries with same name for different hosts
ssh_config { "ForwardAgent global":
ensure => present,
key => "ForwardAgent",
value => "no",
}
ssh_config { "ForwardAgent on example.net":
ensure => present,
key => "ForwardAgent",
host => "example.net",
value => "yes",
}
manage entry with a comment
ssh_config { "ForwardAgent":
ensure => present,
key => "ForwardAgent",
value => "no",
comment => "Do not forward",
}
delete entry
ssh_config { "HashKnownHosts":
ensure => absent,
}
ssh_config { "BatchMode":
ensure => absent,
host => "example.net",
}
manage entry in another ssh_config location
ssh_config { "CheckHostIP":
ensure => present,
value => "yes",
target => "/etc/ssh/another_sshd_config",
}
sshd_config provider
manage simple entry
sshd_config { "PermitRootLogin":
ensure => present,
value => "yes",
}
manage array entry
sshd_config { "AllowGroups":
ensure => present,
value => ["sshgroups", "admins"],
}
append to array entry
sshd_config { "AllowGroups":
ensure => present,
value => ["sshgroups", "admins"],
array_append => true,
}
manage entry in a Match block
sshd_config { "X11Forwarding":
ensure => present,
condition => "Host foo User root",
value => "yes",
}
sshd_config { "AllowAgentForwarding":
ensure => present,
condition => "Host *.example.net",
value => "yes",
}
manage entries with same name in different blocks
sshd_config { "X11Forwarding global":
ensure => present,
key => "X11Forwarding",
value => "no",
}
sshd_config { "X11Forwarding foo":
ensure => present,
key => "X11Forwarding",
condition => "User foo",
value => "yes",
}
sshd_config { "X11Forwarding root":
ensure => present,
key => "X11Forwarding",
condition => "User root",
value => "no",
}
manage entry with a comment
sshd_config { "X11Forwarding":
ensure => present,
key => "X11Forwarding",
value => "no",
comment => "No X11",
}
delete entry
sshd_config { "PermitRootLogin":
ensure => absent,
}
sshd_config { "AllowAgentForwarding":
ensure => absent,
condition => "Host *.example.net User *",
}
manage entry in another sshd_config location
sshd_config { "PermitRootLogin":
ensure => present,
value => "yes",
target => "/etc/ssh/another_sshd_config",
}
sshd_config_match provider
manage entry
sshd_config_match { "Host *.example.net":
ensure => present,
}
manage entry with position
sshd_config_match { "Host *.example.net":
ensure => present,
position => "before first match",
}
sshd_config_match { "User foo":
ensure => present,
position => "after Host *.example.net",
}
manage entry with a comment
sshd_config_match { "Host *.example.net":
ensure => present,
comment => "Example network",
}
delete entry
sshd_config_match { "User foo Host *.example.net":
ensure => absent,
}
manage entry in another sshd_config location
sshd_config_match { "Host *.example.net":
ensure => present,
target => "/etc/ssh/another_sshd_config",
}
sshd_config_subsystem provider
manage entry
sshd_config_subsystem { "sftp":
ensure => present,
command => "/usr/lib/openssh/sftp-server",
}
manage entry with a comment
sshd_config_subsystem { "sftp":
ensure => present,
command => "/usr/lib/openssh/sftp-server",
comment => "SFTP sub",
}
delete entry
sshd_config_subsystem { "sftp":
ensure => absent,
}
manage entry in another sshd_config location
sshd_config_subsystem { "sftp":
ensure => present,
command => "/usr/lib/openssh/sftp-server",
target => "/etc/ssh/another_sshd_config",
}
sshkey provider
manage entry
sshkey { "foo.example.com":
ensure => present,
type => "ssh-rsa",
key => "AAADEADMEAT",
}
manage entry with aliases
sshkey { "foo.example.com":
ensure => present,
type => "ssh-rsa",
key => "AAADEADMEAT",
host_aliases => [ 'foo', '192.168.0.1' ],
}
manage hashed entry
sshkey { "foo.example.com":
ensure => present,
type => "ssh-rsa",
key => "AAADEADMEAT",
hash_hostname => true,
}
hash existing entry
sshkey { "foo.example.com":
ensure => hashed,
type => "ssh-rsa",
key => "AAADEADMEAT",
hash_hostname => true,
}
delete entry
sshkey { "foo.example.com":
ensure => absent,
}
manage entry in another ssh_known_hosts location
sshkey { "foo.example.com":
ensure => present,
type => "ssh-rsa",
key => "AAADEADMEAT",
target => "/root/.ssh/known_hosts",
}
Issues
Please file any issues or suggestions on GitHub.
Reference
Table of Contents
Resource types
ssh_config
: Manages settings in an OpenSSH ssh_config file. The resource name is used for the setting name, but if thehost
is given, then the name casshd_config
: Manages settings in an OpenSSH sshd_config file. The resource name is used for the setting name, but if thecondition
is given, then the nsshd_config_match
: Manages Match groups in an OpenSSH sshd_config file.sshd_config_subsystem
: Manages Subsystem settings in an OpenSSH sshd_config file.
Resource types
ssh_config
Manages settings in an OpenSSH ssh_config file.
The resource name is used for the setting name, but if the host
is
given, then the name can be something else and the key
given as the name
of the setting.
Properties
The following properties are available in the ssh_config
type.
comment
Text to be stored in a comment immediately above the entry. It will be automatically prepended with the name of the variable in order for the provider to know whether it controls the comment or not.
ensure
Valid values: present
, absent
The basic property that the resource should be in.
Default value: present
value
Value to change the setting to. The follow parameters take an array of values:
- MACs;
- Ciphers;
- SendEnv.
All other parameters take a string. When passing an array to other parameters, only the first value in the array will be considered.
Parameters
The following parameters are available in the ssh_config
type.
host
Host condition for the entry.
key
Overrides setting name to prevent resource conflicts if host
is
given.
name
namevar
The name of the setting, or a unique string if host
given.
provider
The specific backend to use for this ssh_config
resource. You will seldom need to specify this --- Puppet will usually
discover the appropriate provider for your platform.
target
The file in which to store the settings, defaults to
/etc/ssh/ssh_config
.
sshd_config
Manages settings in an OpenSSH sshd_config file.
The resource name is used for the setting name, but if the condition
is
given, then the name can be something else and the key
given as the name
of the setting.
Subsystem entries are not managed by this type. There is a specific sshd_config_subsystem
type to manage these entries.
Properties
The following properties are available in the sshd_config
type.
comment
Text to be stored in a comment immediately above the entry. It will be automatically prepended with the name of the variable in order for the provider to know whether it controls the comment or not.
ensure
Valid values: present
, absent
The basic property that the resource should be in.
Default value: present
value
Value to change the setting to. The follow parameters take an array of values:
- AcceptEnv;
- AllowGroups;
- AllowUsers;
- Ciphers;
- DenyGroups;
- DenyUsers;
- Port;
- KexAlgorithms;
- MACs;
- HostKeyAlgorithms.
All other parameters take a string. When passing an array to other parameters, only the first value in the array will be considered.
Parameters
The following parameters are available in the sshd_config
type.
array_append
Valid values: false
, true
Whether to add to existing array values or replace all values.
Default value: false
condition
Match group condition for the entry, in the format:
sshd_config { 'PermitRootLogin':
value => 'without-password',
condition => 'Host example.net',
}
The value can contain multiple conditions, concatenated together with
whitespace. This is used if the Match
block has multiple criteria.
condition => 'Host example.net User root'
key
Overrides setting name to prevent resource conflicts if condition
is
given.
name
namevar
The name of the setting, or a unique string if condition
given.
provider
The specific backend to use for this sshd_config
resource. You will seldom need to specify this --- Puppet will
usually discover the appropriate provider for your platform.
target
The file in which to store the settings, defaults to
/etc/ssh/sshd_config
.
sshd_config_match
Manages Match groups in an OpenSSH sshd_config file.
Properties
The following properties are available in the sshd_config_match
type.
comment
Text to be stored in a comment immediately above the entry. It will be automatically prepended with the name of the variable in order for the provider to know whether it controls the comment or not.
ensure
Valid values: present
, absent
, positioned
The basic property that the resource should be in.
Default value: present
Parameters
The following parameters are available in the sshd_config_match
type.
condition
namevar
The condition of the Match group
name
The default namevar
position
Where to place the new entry
provider
The specific backend to use for this sshd_config_match
resource. You will seldom need to specify this --- Puppet will
usually discover the appropriate provider for your platform.
target
namevar
The file in which to manage the sshd_config_match entry
sshd_config_subsystem
Manages Subsystem settings in an OpenSSH sshd_config file.
Properties
The following properties are available in the sshd_config_subsystem
type.
command
The command to execute upon subsystem request.
comment
Text to be stored in a comment immediately above the entry. It will be automatically prepended with the name of the variable in order for the provider to know whether it controls the comment or not.
ensure
Valid values: present
, absent
The basic property that the resource should be in.
Default value: present
Parameters
The following parameters are available in the sshd_config_subsystem
type.
name
namevar
The name of the subsystem to set.
provider
The specific backend to use for this sshd_config_subsystem
resource. You will seldom need to specify this --- Puppet
will usually discover the appropriate provider for your platform.
target
The file in which to store the settings, defaults to
/etc/ssh/sshd_config
.
Changelog
All notable changes to this project will be documented in this file. Each new release typically also includes the latest modulesync defaults. These should not affect the functionality of the module.
v5.0.0 (2022-08-30)
Breaking changes:
- Drop Non LTS Ubuntu 18.10/19.04/19.10; Add 22.04 #78 (bastelfreak)
- Drop Eol Debian 7/8/9; Add Debian 10/11 support #77 (bastelfreak)
- Drop RHEL 6 support #76 (bastelfreak)
Merged pull requests:
- cleanup README.md #79 (bastelfreak)
- Move Forge org to "puppet" #73 (op-ct)
- Dependency and Support Bump #72 (trevor-vaughan)
- Fix HostKeyAlgorithms in sshd_config #68 (loopiv)
4.0.0 (2020-07-16)
- Deprecate support for Augeas < 1.0.0
- Update supported Ubuntu versions
- sshd_config: close array regexp (GH #54), fix GH #52
- sshd_config_match: remove duplicated condition param in test (GH #58)
- sshkey: do not test type update, it's a parameter in Puppet 6 (GH #59)
- Add support for comments in types and providers (GH #61)
- Update copyright and authors infos
3.3.0
- Add EL8 support
- Add 'Port' to the list of items supporting Arrays in the documentation
3.2.1
- Fix puppet requirement to < 7.0.0
3.2.0
- add support for Puppet 5 & 6
- deprecate support for Puppet < 5
- update supported OSes in metadata.json
3.1.0
- Add support for array_append to sshd_config type (GH #43)
3.0.0
- Fix support for 'puppet generate types'
- Bumped supported puppet version to less than 6.0.0
- Updated the spec_helper.rb to correctly load for Puppet 5
- Added CentOS and OracleLinux to supported OS list
2.5.3
- ssh_config: fix HostKeyAlgorithms and KexAlgorithms (#GH 36)
2.5.2
- Added docker acceptance test
- Refactor the travis.yml for the current LTS versions of Puppet
2.5.1
- Bugfix Release:
- Allow multiple values for GlobalKnownHostsFile (#GH 32)
- Ensure that AddressFamily comes before ListenAddress (#GH 34)
2.5.0
- Implement instances for sshkey (only for non-hashed entries)
2.4.0
- Add sshd_config_match type and provider (#GH 5)
- Purge multiple array entries in ssh_config provider (GH #12)
2.3.0
- Add sshkey provider (GH #13)
- sshd_config: munge condition parameter
- Improve test setup
- Get rid of Gemfile.lock
- Improve README badges
2.2.2
- Properly insert values after commented out entry if case doesn't match (GH #6)
2.2.1
- Convert specs to rspec3 syntax
- Fix metadata.json
2.2.0
- sshd_config: consider KexAlgorithms and Ciphers as array values (GH #4)
2.1.0
- Add ssh_config type & provider
2.0.0
- First release of split module.
* This Changelog was automatically generated by github_changelog_generator
Dependencies
- puppet/augeasproviders_core (>=3.2.0 <4.0.0)
augeasproviders: alternative Augeas-based providers for Puppet Copyright (c) 2012-2016 Dominic Cleal and Raphaël Pinson Copyright (c) 2017-2020 Raphaël Pinson Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.