aboutsummaryrefslogtreecommitdiffstats
path: root/modules/openssh/templates
Commit message (Collapse)AuthorAgeFilesLines
* this is python2 codeThomas Backlund2021-11-281-1/+1
|
* Disable ChallengeResponseAuthenticationPascal Terjan2018-03-041-1/+1
|
* sshd: disable UsePAMThomas Backlund2018-03-041-1/+1
|
* Stop using ssh_host_key on Mageia 6Pascal Terjan2017-09-241-0/+2
|
* Drop deprecated sshd optionPascal Terjan2017-09-241-0/+2
|
* Make Mageia 6 fix more widely avaialablePascal Terjan2017-09-241-6/+6
|
* Workaround lack of mga6 support in our configsPascal Terjan2017-09-241-0/+9
|
* ldap-sshkey2file.py: add dry-run and verbose modeOlivier Blin2017-02-231-0/+16
|
* ldap-sshkey2file.py: use argparse for options parsing and usageOlivier Blin2017-02-231-16/+15
|
* ldap-sshkey2file.py: reorder code in write_keys to prepare adding a dry-run modeOlivier Blin2017-02-231-29/+29
|
* ldap-sshkey2file.py: fix path of authorized_keys in usageOlivier Blin2017-02-231-1/+1
|
* Fix ldap-sshkey2file so it doesn't crash when a user has no uidNumberDan Fandrich2017-02-231-3/+3
| | | | | This shouldn't happen in normal operation, but can happen when binding to a DN who doesn't have access to that attribute.
* Allow mga-unrestricted_shell_access group login on duvelOlivier Blin2017-02-211-1/+1
| | | | Also-by: Dan Fandrich <dan@coneharvesters.com>
* Remove unnecessary AllowGroups sshd restriction on rabbitOlivier Blin2017-02-211-4/+0
| | | | | | | | This is already covered by pam.d/system-auth, which only allows local users and authorized access classes. Otherwise, login fails: sshd[1234]: fatal: Access denied for user XXX by PAM account configuration [preauth]
* Disable password for ssh on all machinesPascal Terjan2016-10-131-1/+1
|
* Allow iurt to ssh to rabbitPascal Terjan2016-10-131-1/+1
|
* Restrict ssh access on rabbitPascal Terjan2016-10-131-0/+4
|
* openssh: Fix writing ssh public keys, with new ldap secret locationOlivier Blin2016-02-211-5/+39
| | | | ldap secret is now stored in the bindpw field of /etc/nslcd.conf
* Allow members of mga-sysadmin to log in via sshDan Fandrich2016-02-191-1/+1
| | | | | This only works on hosts where users' ssh keys are copied, namely those including openssh::ssh_keys_from_ldap
* openssh: do not force command for git userOlivier Blin2016-02-071-1/+2
| | | | | The "gitolite <username>" is already set in /var/lib/git/.ssh/authorized_keys, and we do not want to override it.
* openssh: fix forcing sv_membersh commandOlivier Blin2016-02-071-1/+1
| | | | | | | | | | The following rule did not work as intended: Match User !schedbot User !root This one does (with a leading wildcard): Match User *,!schedbot,!root See http://superuser.com/questions/952235/why-arent-my-negative-matches-working
* Force sv_membersh.pl in ssh on duvelPascal Terjan2016-02-071-0/+4
| | | | | That way we don't need to have it as default shell for everyone on the machine It should probably not hardcode duvel though
* openssh: Ensure ownership is set correctly on authorized_keysColin Guthrie2015-02-061-0/+5
| | | | | | This was highlighted by a problem encountered by Nicolas Salguero. Many thanks for your patience.
* openssh: Fix python copy/paste error.Colin Guthrie2015-02-031-1/+1
| | | | Introduced in d5148ffbb0514c37893002e4988c5f7f379586bf
* openssh: Return failure when no keys are updated.Colin Guthrie2015-01-181-2/+15
| | | | We can then use this exit status to run other commands when keys are updated.
* openssh: Only write authorized_keys file when it's differentColin Guthrie2015-01-181-7/+20
| | | | | This saves disk churn and will eventually allow us to take further action when keys actually change.
* openssh: Use temp file when writing keys from LDAP.Colin Guthrie2015-01-181-7/+12
| | | | | | | This helps avoid a race condition when the file is not yet written properly when a new SSH connection from that user comes in. This isn't really a problem in practice, but we may as well do it.
* Revert "Temporary hack to work around LDAP server sync problem"Colin Guthrie2014-09-231-6/+0
| | | | | | This reverts commit cc302084ccf54fb8f067f8dd5d7f7c07ed50b019. Slave LDAP now back cookin' on gas!
* Temporary hack to work around LDAP server sync problemColin Guthrie2014-09-161-0/+6
|
* Partially revert part of r3378 which wasn't meant to be in the commit :(Colin Guthrie2013-12-051-2/+0
|
* Add mgaonline to the freeze exception pkg regexpColin Guthrie2013-12-051-0/+2
|
* openssh: switch to standard path for authorized_keys fileNicolas Vigier2013-07-061-3/+0
|
* ldap-sshkey2file.py: export ssh keys to /home directoryNicolas Vigier2013-07-061-5/+14
| | | | Thanks to Colin for help on this
* do not use start tls on ldaps connection, as this produce a tracebackMichael Scherer2012-01-281-1/+2
|
* iuse the new get_ldap_servers to get the list of all ldap serversMichael Scherer2012-01-221-1/+4
|
* move ldap-sshkey2file.py to openssh module (where it is used)Nicolas Vigier2011-08-211-0/+92
|
* - seems I cannot use the variable in the templateMichael Scherer2011-01-171-1/+1
|
* - fix directory ( this prevent login on rabbit )Michael Scherer2011-01-171-1/+1
|
* disable tcp forwarding, so people cannot use our svn server to bounce to ↵Michael Scherer2011-01-071-1/+1
| | | | others server
* the previous trick didn't work as tags are dependent in the order ofMichael Scherer2010-11-232-4/+3
| | | | declaration ( and that's bad (tm) ). This one is safer.
* move the ldap key from ssh logic to openssh module ( more logical ), and add ↵Michael Scherer2010-11-231-0/+5
| | | | the hook in openssh config file
* - use pam for openssh ( I am not sure if we need to restrict its useMichael Scherer2010-11-231-1/+1
| | | | only on ldap hosts )
* - add openssh moduleMichael Scherer2010-10-261-0/+122