2013-07-28 00:53:23 +02:00
|
|
|
users:
|
2014-04-23 13:38:31 +02:00
|
|
|
## Minimal required pillar values
|
2013-07-28 00:53:23 +02:00
|
|
|
auser:
|
2014-04-23 13:38:31 +02:00
|
|
|
fullname: A User
|
2014-01-30 03:46:54 +01:00
|
|
|
|
2014-04-23 13:38:31 +02:00
|
|
|
## Full list of pillar values
|
2014-01-30 03:46:54 +01:00
|
|
|
buser:
|
|
|
|
fullname: B User
|
2014-04-25 04:51:11 +02:00
|
|
|
password: $6$w.............
|
2014-03-30 20:31:47 +02:00
|
|
|
home: /custom/buser
|
2014-09-07 07:23:06 +02:00
|
|
|
createhome: True
|
2015-06-11 23:34:16 +02:00
|
|
|
manage_vimrc: False
|
|
|
|
manage_bashrc: False
|
2014-12-22 14:22:46 +01:00
|
|
|
expire: 16426
|
2014-01-30 03:46:54 +01:00
|
|
|
sudouser: True
|
2015-07-04 14:30:50 +02:00
|
|
|
# sudo_rules doesn't need the username as a prefix for the rule
|
|
|
|
# this is added automatically by the formula.
|
|
|
|
# ----------------------------------------------------------------------
|
|
|
|
# In case your sudo_rules have a colon please have in mind to not leave
|
|
|
|
# spaces around it. For example:
|
|
|
|
# ALL=(ALL) NOPASSWD: ALL <--- THIS WILL NOT WORK (Besides syntax is ok)
|
|
|
|
# ALL=(ALL) NOPASSWD:ALL <--- THIS WILL WORK
|
2014-12-22 14:22:46 +01:00
|
|
|
sudo_rules:
|
2014-03-30 22:31:20 +02:00
|
|
|
- ALL=(root) /usr/bin/find
|
|
|
|
- ALL=(otheruser) /usr/bin/script.sh
|
2015-04-06 21:34:59 +02:00
|
|
|
sudo_defaults:
|
2015-04-11 14:14:36 +02:00
|
|
|
- '!requiretty'
|
2014-01-30 03:46:54 +01:00
|
|
|
shell: /bin/bash
|
|
|
|
prime_group:
|
2014-01-30 04:53:29 +01:00
|
|
|
name: primarygroup
|
|
|
|
gid: 500
|
2014-01-30 03:46:54 +01:00
|
|
|
groups:
|
|
|
|
- users
|
2014-01-31 20:44:41 +01:00
|
|
|
ssh_key_type: rsa
|
2015-05-01 17:48:28 +02:00
|
|
|
# You can inline the private keys ...
|
2014-01-30 03:46:54 +01:00
|
|
|
ssh_keys:
|
2014-01-30 04:53:29 +01:00
|
|
|
privkey: PRIVATEKEY
|
|
|
|
pubkey: PUBLICKEY
|
2015-05-01 17:48:28 +02:00
|
|
|
# ... or you can pull them from a different pillar,
|
|
|
|
# for example one called "ssh_keys":
|
|
|
|
ssh_keys_pillar:
|
|
|
|
id_rsa: "ssh_keys"
|
|
|
|
another_key_pair: "ssh_keys"
|
2013-07-28 00:53:23 +02:00
|
|
|
ssh_auth:
|
2014-02-14 15:33:03 +01:00
|
|
|
- PUBLICKEY
|
2014-08-03 01:40:27 +02:00
|
|
|
ssh_auth.absent:
|
|
|
|
- PUBLICKEY_TO_BE_REMOVED
|
2015-02-12 23:09:56 +01:00
|
|
|
# Generates an authorized_keys file for the user
|
|
|
|
# with the given keys
|
|
|
|
ssh_auth_file:
|
|
|
|
- PUBLICKEY
|
2015-04-02 19:01:30 +02:00
|
|
|
# If you prefer to keep public keys as files rather
|
|
|
|
# than inline in pillar, this works.
|
|
|
|
ssh_auth_sources:
|
|
|
|
- salt://keys/buser.id_rsa.pub
|
2015-05-15 21:47:40 +02:00
|
|
|
# Manage the ~/.ssh/config file
|
|
|
|
ssh_config:
|
|
|
|
all:
|
|
|
|
hostname: "*"
|
|
|
|
options:
|
|
|
|
- "StrictHostKeyChecking no"
|
|
|
|
- "UserKnownHostsFile=/dev/null"
|
|
|
|
importanthost:
|
|
|
|
hostname: "needcheck.example.com"
|
|
|
|
options:
|
|
|
|
- "StrictHostKeyChecking yes"
|
2015-04-02 19:01:30 +02:00
|
|
|
|
2015-07-01 18:15:31 +02:00
|
|
|
google_2fa: True
|
2015-01-15 14:28:51 +01:00
|
|
|
google_auth:
|
|
|
|
ssh: |
|
|
|
|
SOMEGAUTHHASHVAL
|
|
|
|
" RESETTING_TIME_SKEW 46956472+2 46991595-2
|
|
|
|
" RATE_LIMIT 3 30 1415800560
|
|
|
|
" DISALLOW_REUSE 47193352
|
|
|
|
" TOTP_AUTH
|
|
|
|
11111111
|
|
|
|
22222222
|
|
|
|
33333333
|
|
|
|
44444444
|
|
|
|
55555555
|
2013-08-08 18:08:01 +02:00
|
|
|
|
2014-04-23 13:38:31 +02:00
|
|
|
## Absent user
|
|
|
|
cuser:
|
|
|
|
absent: True
|
|
|
|
purge: True
|
|
|
|
force: True
|
|
|
|
|
|
|
|
|
|
|
|
## Old syntax of absent_users still supported
|
2013-08-08 18:08:01 +02:00
|
|
|
absent_users:
|
|
|
|
- donald
|
|
|
|
- bad_guy
|