Execution
Date
08 Dec 2025 13:27:39 +0000
Duration
00:05:33.94
Controller
aio1.openstack.local
User
root
Versions
Ansible
2.18.6
ara
1.7.4 / 1.7.4
Python
3.12.3
Summary
2
Hosts
316
Tasks
313
Results
18
Plays
136
Files
0
Records
File: /etc/ansible/ansible_collections/openstack/osa/roles/ssh_keypairs/defaults/main.yml
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 | --- # Copyright 2022, BBC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # host where the generated keypairs are kept ssh_keypairs_setup_host: localhost # Python interpreter that will be used during keypair generation ssh_keypairs_setup_host_python_interpreter: >- {{ (ssh_keypairs_setup_host == 'localhost') | ternary(ansible_playbook_python, ansible_facts['python']['executable']) }} # base directory on the ssh keypair setup host for storing keypairs ssh_keypairs_dir: "/etc/ssh_keypairs" # method used to create keypairs ssh_keypairs_method: "standalone" # -------- # KEYPAIRS # -------- # boolean to enable/disable creation of keys ssh_keypairs_create_keys: true # ssh keypairs to create # # ssh_keypairs: # # A keypair which whose private key will be used to create signed SSH keys # - name: "Example-CA-Key" # # A keypair which is signed by the CA private key, and given the 'webservers' principal # - name: "My-Signed-Key" # cert: # signed_by: "Example-CA-Key" # principals: # - 'webservers' # valid_from: "always" # valid_to: "forever" # # A regular SSH keypair which is not signed # - name: "Regular-SSH-Key" # ssh_keypairs: [] # ssh keypairs to install # # ssh_keypairs_install_keys: # #optional setting for owner and group of all installed files # owner: 'foo' # group: 'foo' # keys: # # Install the public, private and signed parts of the key named 'cert' # # to a specified location, with .pub and -cert.pub suffixes automatically added # - cert: "My-Signed-Key" # dest: "/home/foo/.ssh/id_rsa" # # Install the public and private parts of the key named 'keypair' # # to a specified location, with the .pub suffix automatically added # - keypair: "Regular-SSH-Key" # dest: "/home/bar/.ssh/id_rsa" # # Install any part of a keypair by referencing the path on ssh_keypairs_setup_host directly # - src: "{{ ssh_keypairs_dir }}/Regular-SSH-Key.pub" # dest: "/home/bar/.ssh/id_rsa.pub" # owner: 'bar' # override ownership for this specific key # group: 'bar' # mode: '0644' # override permissions for this specific file ssh_keypairs_install_keys: [] # boolean to enable/disable installation of ssh keys ssh_keypairs_install_keypairs: true # ---------- # TRUSTED CA # ---------- # location for the combined sshd trusted CA list ssh_keypairs_trusted_ca_file: "/etc/ssh/trusted_ca" # keypair names to take the public key and install as a trusted CA # # ssh_keypairs_install_ca: # # Install this public key into SSHD as a trusted user CA # - name: "Example-CA-Key" # ssh_keypairs_install_ca: [] # filename in /etc/ssh/sshd_config.d to hold the CA and principals enablement config ssh_keypairs_trusted_ca_config_file: "00-openstack-ansible-trusted-ca.conf" # location for the files defining authorised principals for ssh users ssh_keypairs_authorized_principals_file: "/etc/ssh/auth_principals/%u_principals" # Install user principals configuration # # ssh_keypairs_principals: # # To login to the root user a signed SSH key must have either the # # 'root-everywhere' or 'webservers' principal. # - user: root # principals: # - 'root-everywhere' # - 'webservers' # ssh_keypairs_principals: [] # boolean to enable/disable installation of sshd certificate authorities ssh_keypairs_install_authorities: true |