2 package { [ 'openssh-client', 'openssh-server']:
8 require => Package['openssh-server']
11 ferm::rule::simple { 'dsa-ssh':
12 description => 'check ssh access',
16 ferm::rule { 'dsa-ssh-sources':
17 description => 'Allow SSH from DSA',
20 rule => 'saddr ($SSH_SOURCES) ACCEPT'
22 Ferm::Rule::Simple <<| tag == 'ssh::server::from::nagios' |>>
24 file { '/etc/ssh/ssh_config':
25 content => template('ssh/ssh_config.erb'),
26 require => Package['openssh-client']
28 file { '/etc/ssh/sshd_config':
29 content => template('ssh/sshd_config.erb'),
30 require => Package['openssh-server'],
31 notify => Service['ssh']
33 file { '/etc/ssh/userkeys':
36 require => Package['openssh-server']
38 file { '/etc/ssh/puppetkeys':
44 source => 'puppet:///files/empty/',
45 require => Package['openssh-server']
47 file { '/etc/ssh/userkeys/root':
48 content => template('ssh/authorized_keys.erb'),
51 if (versioncmp($::lsbmajdistrelease, '8') >= 0) {
52 if ! $facts['has_etc_ssh_ssh_host_ed25519_key'] {
53 exec { 'create-ed25519-host-key':
54 command => 'ssh-keygen -f /etc/ssh/ssh_host_ed25519_key -q -P "" -t ed25519',
58 if $facts['systemd'] {
59 package { [ 'libpam-systemd' ]: