Skip to content

Add ssh password authentication config explanation#987

Open
martindekov wants to merge 2 commits intoharvester:mainfrom
martindekov:sshpass8548
Open

Add ssh password authentication config explanation#987
martindekov wants to merge 2 commits intoharvester:mainfrom
martindekov:sshpass8548

Conversation

@martindekov
Copy link
Member

@martindekov martindekov commented Mar 11, 2026

Adding reference and explanation for the new feature of the installer which enables you to enable or
disable ssh authentication through password for 1.8+

Problem:

Misleading reference for sshd after latest feature being added

Solution:

Add all relevant fields for 1.8+ version

Related Issue(s):

harvester/harvester#8548

Test plan:

https://69b137c84d43a8bc6a162643--harvester-preview.netlify.app/v1.8/install/harvester-configuration/#ossshd

Additional documentation or context

Copy link
Contributor

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates the Harvester configuration documentation to reflect the newer installer capability (v1.8+) to control SSH password authentication behavior in addition to SFTP enablement.

Changes:

  • Updates the os.sshd documentation wording to mention SSH password authentication control.
  • Adds disable_password_auth to the YAML example for os.sshd.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

You can also share your feedback on Copilot code review. Take the survey.

Adding reference and explanation for the new feature
of the installer which enables you to enable or
disable ssh authentication through password for 1.8+

Signed-off-by: Martin Dekov <martin.dekov@suse.com>
@github-actions
Copy link

github-actions bot commented Mar 11, 2026

Name Link
🔨 Latest commit 4dbfd37
😎 Deploy Preview https://69b26c401232522bd2c4ab82--harvester-preview.netlify.app

Co-authored-by: Ivan Sim <1330522+ihcsim@users.noreply.github.com>
Signed-off-by: Martin Dekov <martin.dekov@suse.com>
os:
sshd:
sftp: true # The SFTP subsystem is enabled.
disable_password_auth: true # SSH password authentication is disabled.
Copy link
Member

@w13915984028 w13915984028 Mar 12, 2026

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

please also mention this takes effects only when a ssh key is existing

and update https://docs.harvesterhci.io/v1.8/install/index step 14

BTW, if user uses a configure file (e.g. pxe mode), where key is not set but password_auth is disabled, what happens? thanks.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Maybe user wants it that way for some nodes. In a true immutable infra environment, no one should have any access to the hosts. I think if we are concerned that user ends up locking themselves out, we should make the SSH key setting a required configuration.

Also, I thought I mentioned somewhere (guess not?), please update the screenshot in step 14 of https://docs.harvesterhci.io/v1.8/install/index - thanks.

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

On ISO mode, diasable_password_auth can't be set (and defaults to false) if no key is input.

I am not clear about the configuration_file used when ISO/PXE, if it follows similar logic. need to double check.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yeah, I sorta wondered why we needed that for ISO mode when I first reviewed it, but thought it was also ok.

If user truly locked themselves out, they should have some out-of-band remote access to their server over serial port.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants