diff --git a/roles/sftpuser/tasks/main.yml b/roles/sftpuser/tasks/main.yml index 4821c6c..be66266 100644 --- a/roles/sftpuser/tasks/main.yml +++ b/roles/sftpuser/tasks/main.yml @@ -1,35 +1,35 @@ --- -- name: "Create group {{ user }}" +- name: Create group ansible.builtin.group: - name: "{{ user }}" + name: backup system: true -- name: "Create user {{ user }}" +- name: Create user ansible.builtin.user: - name: "{{ user }}" - comment: "Service {{ user }}" + name: backup + comment: Service backup createhome: false - group: "{{ user }}" + group: backup home: /var/empty shell: /sbin/nologin system: true -- name: "Create authorized_keys for {{ user }}" +- name: Create authorized_keys ansible.builtin.copy: - dest: "/etc/ssh/authorized_keys.{{ user }}" + dest: /etc/ssh/authorized_keys.backup src: ../files/ssh/backup.pub mode: "0640" owner: root - group: "{{ user }}" + group: backup - name: Configure sshd chroot ansible.builtin.blockinfile: path: /etc/ssh/sshd_config block: | - Match User {{ user }} + Match User backup ChrootDirectory {{ chroot }} ForceCommand internal-sftp - AuthorizedKeysFile /etc/ssh/authorized_keys.{{ user }} - marker: "# {mark} ANSIBLE MANAGED BLOCK (user {{ user }})" + AuthorizedKeysFile /etc/ssh/authorized_keys.backup + marker: "# {mark} ANSIBLE MANAGED BLOCK (user backup)" validate: "sshd -t -f %s" notify: Restart sshd