Files

112 lines
2.9 KiB
ObjectPascal
Raw Permalink Normal View History

2026-02-10 17:43:42 +01:00
## confdroid_nrpe::main::files.pp
# Module name: confdroid_nrpe
# Author: 12ww1160 (12ww1160@ConfDroid.com)
# @summary Class manages all configuration files required for confdroid_nrpe.
2017-07-28 16:42:50 +01:00
##############################################################################
2026-02-10 17:43:42 +01:00
class confdroid_nrpe::main::files (
2017-07-28 16:42:50 +01:00
2026-02-10 17:43:42 +01:00
) inherits confdroid_nrpe::params {
require confdroid_nrpe::main::dirs
2017-07-28 16:42:50 +01:00
2017-07-28 17:54:42 +01:00
# manage /etc/nagios/nrpe.cfg
2017-07-28 16:42:50 +01:00
file { $ne_main_conf_file:
2025-05-12 16:58:52 +02:00
ensure => file,
path => $ne_main_conf_file,
owner => 'root',
group => 'root',
mode => '0644',
selrange => s0,
selrole => object_r,
seltype => nrpe_etc_t,
seluser => system_u,
content => template($ne_main_conf_erb),
notify => Service[$ne_service],
2017-07-28 17:54:42 +01:00
}
# manage /etc/sysconfig/nrpe
file { $ne_nrpe_conf_file:
2025-05-12 16:58:52 +02:00
ensure => file,
path => $ne_nrpe_conf_file,
owner => 'root',
group => 'root',
mode => '0644',
selrange => s0,
selrole => object_r,
seltype => etc_t,
seluser => system_u,
content => template($ne_nrpe_conf_erb),
notify => Service[$ne_service],
2017-07-28 16:42:50 +01:00
}
2017-07-30 15:01:52 +01:00
if $ne_allow_sudo == true {
file { $ne_sudo_file:
2025-05-12 16:58:52 +02:00
ensure => file,
path => $ne_sudo_file,
owner => 'root',
group => 'root',
mode => '0440',
selrange => s0,
selrole => object_r,
seltype => etc_t,
seluser => system_u,
content => template($ne_sudo_rule_erb),
2017-07-30 15:01:52 +01:00
}
2019-04-23 19:53:49 +02:00
# file for sudo selinux policy
file { $ne_nrpe_te_file:
2025-05-12 16:58:52 +02:00
ensure => file,
path => $ne_nrpe_te_file,
owner => 'root',
group => 'root',
mode => '0440',
selrange => s0,
selrole => object_r,
seltype => nrpe_etc_t,
seluser => system_u,
content => template($ne_nrpe_te_erb),
notify => Exec['create_nrpe_pp'],
2019-04-23 19:53:49 +02:00
}
}
# file for ssl certificate
if $ne_enable_ssl == true {
file { $ne_ssl_cert_file:
ensure => file,
path => $ne_ssl_cert_file,
2026-03-15 16:59:12 +01:00
owner => $ne_user,
group => $ne_user,
mode => '0440',
selrange => s0,
selrole => object_r,
seltype => cert_t,
seluser => system_u,
content => template($ne_ssl_cert_erb),
}
file { $ne_ssl_privatekey_file:
ensure => file,
path => $ne_ssl_privatekey_file,
2026-03-15 16:59:12 +01:00
owner => $ne_user,
group => $ne_user,
mode => '0400',
selrange => s0,
selrole => object_r,
seltype => cert_t,
seluser => system_u,
content => template($ne_ssl_privatekey_erb),
}
file { $ne_ssl_ca_cert_file:
ensure => file,
path => $ne_ssl_ca_cert_file,
2026-03-15 16:59:12 +01:00
owner => $ne_user,
group => $ne_user,
mode => '0440',
selrange => s0,
selrole => object_r,
seltype => cert_t,
seluser => system_u,
content => template($ne_ssl_ca_cert_erb),
}
2017-07-30 15:01:52 +01:00
}
2017-07-28 16:42:50 +01:00
}