summaryrefslogtreecommitdiff
path: root/puppet/modules/site_sshd
AgeCommit message (Collapse)Author
2014-05-27Add missing scope to top-level sshd class, passing necessary parametersMicah Anderson
for configuration (#3108) Change-Id: I4f94a47d47a40bfc6835359e7781707f96e91db0
2014-05-27Switch away from site_config::sshd and instead just include site_sshdMicah Anderson
The existing site_config::sshd had a non-functioning 'include sshd' line in it that was not doing what was expected (this was supposed to include the sshd module, but due to scoping was including itself). It seemed better to eliminate some of the unused pieces and consolidate into one config location. Change-Id: I79dd904e696ca646180a09abbb03b5361dfc8ab9
2014-05-27clarify comments in site_sshd::authorized_keysMicah Anderson
Change-Id: I679dfe8dff90b7c86ab0ffff43e13958f1ec2c99
2014-02-14Include check_mk monitor pubkey in /root/.ssh/authorized_keysvarac
instead of creating a /root/.ssh/authorized_keys2 see https://review.leap.se/r/148/#comment153
2014-02-12Merge branch '0.6' into 4982_check_mkvarac
2014-02-10turn off StrictHostKeyChecking for vagrant ssh clientselijah
2014-02-10use default value for hiera lookup (#5118)varac
2014-02-10Merge remote-tracking branch 'elijah/feature/known_hosts' into 4982_check_mkvarac
Conflicts: platform.rb
2014-02-09deploy a valid /etc/ssh/ssh_known_hosts for all nodes (requires new leap_cli)elijah
2014-02-06add a comment why we use a custom way to populate authorized_keysvarac
2013-06-30switch to own define for managing ssh keysvarac
The problem with puppet's built-in ssh_authorized_key is that you can purge unmanaged keys in a authorized_keys file. see https://leap.se/code/issues/3010 for details. Conflicts: puppet/modules/site_sshd/manifests/authorized_keys.pp Change-Id: I640bf7ebc0f0f7fb19cc46feb4cb2702d6561a9b
2013-06-30modularize and standardize site_sshd:Micah Anderson
. move the setting of the xterm title to site_config::shell . change the xterm file resource to use standard source lines, switch to single quotes, quote mode, and line up parameters . move the mosh pieces into a site_ssh::mosh class and only include it if the right mosh variable is enabled, passing into the class the necessary hiera parameters . lint the site_ssh::mosh resources . change the authorized_keys class to accept the key parameter which is passed in from the main ssh class (but allow for out of scope variable lookup when the tag is passed) Change-Id: Ieec5a3932de9bad1b98633032b28f88e91e46604
2013-06-28added site_sshd::authorized_keysvarac
2013-05-30site_sshd -- added xterm title, optional support for moshelijah
2012-09-23beginning of site_sshdvarac