Openssh-server
Description
Openssh-server is a sandboxed environment that allows ssh access without giving keys to the entire server. Giving ssh access via private key often means giving full access to the server. This container creates a limited and sandboxed environment that others can ssh into. The users only have access to the folders mapped and the processes running inside this container.
Image
linuxserver/openssh-server:latest
Categories
- Managementutilityserver
Ports
- 2222:2222/tcp
Volumes
Container | Bind |
---|---|
/config | /opt/appdata/openssh-server |
Environment Variables
Name | Label | Default | Description |
---|---|---|---|
PUID | PUID | 1024 | for GroupID |
PGID | PGID | 100 | for UserID |
TZ | TZ | Europe/Amsterdam | Specify a timezone to use for example Europe/Amsterdam |
PUBLIC_KEY | PUBLIC_KEY | yourpublickey | Optional ssh public key, which will automatically be added to authorized_keys. |
PUBLIC_KEY_FILE | PUBLIC_KEY_FILE | /path/to/file | Optionally specify a file containing the public key (works with docker secrets). |
PUBLIC_KEY_DIR | PUBLIC_KEY_DIR | /path/to/directory/containing/_only_/pubkeys | Optionally specify a directory containing the public keys (works with docker secrets). |
PUBLIC_KEY_URL | PUBLIC_KEY_URL | https://github.com/username.keys | Optionally specify a URL containing the public key. |
SUDO_ACCESS | SUDO_ACCESS | false | Set to `true` to allow `linuxserver.io`, the ssh user, sudo access. Without `USER_PASSWORD` set, this will allow passwordless sudo access. |
PASSWORD_ACCESS | PASSWORD_ACCESS | false | Set to `true` to allow user/password ssh access. You will want to set `USER_PASSWORD` or `USER_PASSWORD_FILE` as well. |
USER_PASSWORD | USER_PASSWORD | password | Optionally set a sudo password for `linuxserver.io`, the ssh user. If this or `USER_PASSWORD_FILE` are not set but `SUDO_ACCESS` is set to true, the user will have passwordless sudo access. |
USER_PASSWORD_FILE | USER_PASSWORD_FILE | /path/to/file | Optionally specify a file that contains the password. This setting supersedes the `USER_PASSWORD` option (works with docker secrets). |
USER_NAME | USER_NAME | linuxserver.io | Optionally specify a user name (Default:`linuxserver.io`) |
Labels
Key | Value |
---|---|
traefik.enable | true |
traefik.http.routers.openssh-server.rule | Host(`openssh-server.{$TRAEFIK_INGRESS_DOMAIN}`) |
traefik.http.routers.openssh-server.entrypoints | https |
traefik.http.services.openssh-server.loadbalancer.server.port | 2222 |
traefik.http.routers.openssh-server.tls | true |
traefik.http.routers.openssh-server.tls.certresolver | default |
traefik.http.routers.openssh-server.middlewares | traefik-forward-auth |
mafl.enable | true |
mafl.title | Openssh-server |
mafl.description | Openssh-server is a sandboxed environment that allows ssh access without giving keys to the entire server. |
mafl.link | https://openssh-server.{$TRAEFIK_INGRESS_DOMAIN} |
mafl.icon.wrap | true |
mafl.icon.color | #007acc |
mafl.status.enabled | true |
mafl.status.interval | 60 |
mafl.group | Managementutilityserver |
mafl.icon.url | https://upload.wikimedia.org/wikipedia/en/6/65/OpenSSH_logo.png |