roles/common: Only allow ssh access by provisioning user
Signed-off-by: Alan Orth <alan.orth@gmail.com>
This commit is contained in:
parent
4b18f91438
commit
8b336352d7
@ -90,8 +90,5 @@ Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.
|
|||||||
MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-ripemd160-etm@openssh.com,umac-128-etm@openssh.com
|
MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-ripemd160-etm@openssh.com,umac-128-etm@openssh.com
|
||||||
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256
|
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256
|
||||||
|
|
||||||
{% if ssh_allowed_users is defined and ssh_allowed_users %}
|
# only allow shell access by provisioning user
|
||||||
# Is there a list of allowed users?
|
AllowUsers {{ provisioning_user.name }}
|
||||||
# Is it populated? (An empty list is 'None', which evaluates as False in Python)
|
|
||||||
AllowUsers {{ ssh_allowed_users }} provisioning
|
|
||||||
{% endif %}
|
|
||||||
|
@ -90,8 +90,5 @@ Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.
|
|||||||
MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-ripemd160-etm@openssh.com,umac-128-etm@openssh.com
|
MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-ripemd160-etm@openssh.com,umac-128-etm@openssh.com
|
||||||
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256
|
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256
|
||||||
|
|
||||||
{% if ssh_allowed_users is defined and ssh_allowed_users %}
|
# only allow shell access by provisioning user
|
||||||
# Is there a list of allowed users?
|
AllowUsers {{ provisioning_user.name }}
|
||||||
# Is it populated? (An empty list is 'None', which evaluates as False in Python)
|
|
||||||
AllowUsers {{ ssh_allowed_users }} provisioning
|
|
||||||
{% endif %}
|
|
||||||
|
@ -90,8 +90,5 @@ Ciphers chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.
|
|||||||
MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-ripemd160-etm@openssh.com,umac-128-etm@openssh.com
|
MACs hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,hmac-ripemd160-etm@openssh.com,umac-128-etm@openssh.com
|
||||||
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256
|
KexAlgorithms curve25519-sha256@libssh.org,diffie-hellman-group-exchange-sha256
|
||||||
|
|
||||||
{% if ssh_allowed_users is defined and ssh_allowed_users %}
|
# only allow shell access by provisioning user
|
||||||
# Is there a list of allowed users?
|
AllowUsers {{ provisioning_user.name }}
|
||||||
# Is it populated? (An empty list is 'None', which evaluates as False in Python)
|
|
||||||
AllowUsers {{ ssh_allowed_users }} provisioning
|
|
||||||
{% endif %}
|
|
||||||
|
Loading…
Reference in New Issue
Block a user