Compare commits
115 Commits
14375d9bad
...
master
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
c70ac664a5 | ||
|
|
cc7f06d876 | ||
|
|
04a7e544a5 | ||
| af538bb0e9 | |||
|
|
60d451ee2c | ||
|
|
99f37cf02c | ||
|
|
65c46a04c2 | ||
| 5508f5a51f | |||
|
|
d9a07271fd | ||
|
|
72d12baece | ||
| 1e52fd312d | |||
|
|
b08e59caaf | ||
|
|
249c2de187 | ||
| fd214f6a7d | |||
| a35060c2cf | |||
|
|
ada8bc4220 | ||
|
|
b629a265bd | ||
|
|
0c2658b6da | ||
| 893ed11ce7 | |||
|
|
d7c8d71d64 | ||
|
|
4d3c86cd0c | ||
|
|
8d123c372c | ||
| 8821ff73f4 | |||
|
|
46e8642904 | ||
|
|
6578688e1f | ||
|
|
cb5b517900 | ||
| 12d58a30f7 | |||
|
|
7a0a60b12b | ||
|
|
72810343ec | ||
|
|
eba68be525 | ||
| 12ca98ceca | |||
|
|
df02776fef | ||
|
|
e0dcf663ae | ||
|
|
35e8ce37da | ||
| 5e3db16d2c | |||
|
|
2967e65743 | ||
|
|
12e800318b | ||
|
|
7006c54429 | ||
| cfe921b42f | |||
|
|
4e92d798b3 | ||
|
|
49fff33a8f | ||
| 45815fd385 | |||
|
|
01611b4b43 | ||
|
|
5f6b9d8b99 | ||
|
|
a60b6a5ae6 | ||
| 2f7d9cc812 | |||
| ca0ec2bb84 | |||
| c7e9800b5b | |||
|
|
fcd97dc6d4 | ||
|
|
3b890f83c7 | ||
| 738a0efbc7 | |||
|
|
1068f97433 | ||
|
|
9a564261f7 | ||
|
|
417dd0e23a | ||
| 2bb6c5ecb8 | |||
|
|
2c1b15e468 | ||
|
|
3dcd479229 | ||
|
|
3f98eee049 | ||
| ceeb28aa1f | |||
|
|
f68e688bfa | ||
|
|
a648676a51 | ||
|
|
77b664a6f0 | ||
| c8139772a2 | |||
|
|
6a9563ae04 | ||
|
|
3f5714f6c3 | ||
|
|
58596bf8b3 | ||
| 71a2706a3f | |||
|
|
19417ca780 | ||
|
|
e7ac45b383 | ||
|
|
b507f60c7a | ||
| c97d093d84 | |||
|
|
f1b95f2852 | ||
|
|
e9d5d6516c | ||
| 3feb4f0de7 | |||
|
|
a3844a7e5f | ||
|
|
57406bbf9a | ||
| 02252d492c | |||
|
|
e6428149be | ||
|
|
fca3e37b09 | ||
|
|
d6d81a011a | ||
| 12610cf4b9 | |||
|
|
25d2c0a5f0 | ||
|
|
0570348f10 | ||
|
|
3284cd9cb1 | ||
| f7cc2a3944 | |||
|
|
b8c1e9d6b0 | ||
|
|
c6afa78f88 | ||
|
|
cde00c3d7e | ||
| 8500d243e6 | |||
|
|
42fa991975 | ||
|
|
b8d581e00d | ||
|
|
e82ee972c0 | ||
| 94afeda0bb | |||
|
|
9d39c1b1d5 | ||
|
|
fbdc21d72f | ||
|
|
dd9fc23d28 | ||
| cf1415ceac | |||
|
|
a2a3f1c862 | ||
|
|
8353748191 | ||
|
|
d0fec8401b | ||
| 5481c36198 | |||
| 7049093171 | |||
|
|
1923be5664 | ||
|
|
a5b60a4418 | ||
|
|
cce6b6bb1b | ||
| 493f8fc2eb | |||
|
|
374852537d | ||
|
|
e7ed8dd4b0 | ||
|
|
5851033f20 | ||
| 9283cbfadc | |||
|
|
e138493b03 | ||
|
|
28e0acd73c | ||
|
|
0611cddf19 | ||
| 46898aa679 | |||
|
|
7cf01c17a9 |
3
.gitignore
vendored
3
.gitignore
vendored
@@ -2,4 +2,5 @@
|
||||
Gemfile.lock
|
||||
FileList
|
||||
.scannerwork
|
||||
.vscode
|
||||
.vscode
|
||||
.puppet-lint.rc
|
||||
130
Jenkinsfile
vendored
Normal file
130
Jenkinsfile
vendored
Normal file
@@ -0,0 +1,130 @@
|
||||
pipeline {
|
||||
agent {
|
||||
label 'puppet'
|
||||
}
|
||||
|
||||
post {
|
||||
always {
|
||||
deleteDir() /* clean up our workspace */
|
||||
}
|
||||
success {
|
||||
updateGitlabCommitStatus state: 'success'
|
||||
}
|
||||
failure {
|
||||
updateGitlabCommitStatus state: 'failed'
|
||||
step([$class: 'Mailer', notifyEveryUnstableBuild: true, recipients: 'support@confdroid.com', sendToIndividuals: true])
|
||||
}
|
||||
}
|
||||
|
||||
options {
|
||||
gitLabConnection('gitlab.confdroid.com')
|
||||
}
|
||||
|
||||
stages {
|
||||
|
||||
stage('pull master') {
|
||||
steps {
|
||||
sshagent(['edd05eb6-26b5-4c7b-a5cc-ea2ab899f4fa']) {
|
||||
sh '''
|
||||
git config user.name "Jenkins Server"
|
||||
git config user.email jenkins@confdroid.com
|
||||
git fetch origin
|
||||
source_branch="${gitlabSourceBranch:-${BRANCH_NAME:-${GIT_LOCAL_BRANCH:-$GIT_BRANCH}}}"
|
||||
source_branch="${source_branch#origin/}"
|
||||
source_branch="${source_branch#refs/heads/}"
|
||||
if [ -z "$source_branch" ]; then
|
||||
source_branch="development"
|
||||
fi
|
||||
echo "Using source branch: $source_branch"
|
||||
# Create an isolated build branch from the triggering branch revision.
|
||||
git checkout -B jenkins-build-$BUILD_NUMBER "origin/$source_branch"
|
||||
# Merge the current master into the build branch before validation.
|
||||
git merge origin/master --no-ff || { echo "Merge conflict detected"; exit 1; }
|
||||
'''
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
stage('puppet parser') {
|
||||
steps {
|
||||
sh '''for file in $(find . -iname \'*.pp\'); do
|
||||
/opt/puppetlabs/bin/puppet parser validate --color false --render-as s --modulepath=modules $file || exit 1;
|
||||
done;'''
|
||||
}
|
||||
}
|
||||
|
||||
stage('check templates') {
|
||||
steps{
|
||||
sh '''for file in $(find . -iname \'*.erb\');
|
||||
do erb -P -x -T "-" $file | ruby -c || exit 1;
|
||||
done;'''
|
||||
}
|
||||
}
|
||||
|
||||
stage('puppet-lint') {
|
||||
steps {
|
||||
sh '''/usr/local/bin/puppet-lint . \\
|
||||
--no-variable_scope-check \\
|
||||
|| { echo "Puppet lint failed"; exit 1; }
|
||||
'''
|
||||
}
|
||||
}
|
||||
|
||||
stage('SonarScan') {
|
||||
steps {
|
||||
withCredentials([string(credentialsId: 'sonar-token', variable: 'SONAR_TOKEN')]) {
|
||||
sh '''
|
||||
/opt/sonar-scanner/bin/sonar-scanner \
|
||||
-Dsonar.projectKey=confdroid_ssh \
|
||||
-Dsonar.sources=. \
|
||||
-Dsonar.host.url=https://sonarqube.confdroid.com \
|
||||
-Dsonar.token=$SONAR_TOKEN
|
||||
'''
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
stage('create Puppet documentation') {
|
||||
steps {
|
||||
sh '/opt/puppetlabs/bin/puppet strings'
|
||||
}
|
||||
}
|
||||
|
||||
stage('update repo') {
|
||||
steps {
|
||||
sshagent(['edd05eb6-26b5-4c7b-a5cc-ea2ab899f4fa']) {
|
||||
sh '''
|
||||
git config user.name "Jenkins Server"
|
||||
git config user.email jenkins@confdroid.com
|
||||
git add -A && git commit -am "Recommit for updates in build $BUILD_NUMBER" || echo "No changes to commit"
|
||||
git fetch origin
|
||||
git checkout -B master origin/master
|
||||
git merge --no-ff jenkins-build-$BUILD_NUMBER -m "Merge build $BUILD_NUMBER into master"
|
||||
git push origin master
|
||||
'''
|
||||
}
|
||||
}
|
||||
}
|
||||
stage('Mirror to Gitea') {
|
||||
steps {
|
||||
withCredentials([usernamePassword(
|
||||
credentialsId: 'Jenkins-gitea',
|
||||
usernameVariable: 'GITEA_USER',
|
||||
passwordVariable: 'GITEA_TOKEN')]) {
|
||||
script {
|
||||
sh '''
|
||||
git fetch origin
|
||||
git checkout master
|
||||
git reset --hard origin/master
|
||||
git remote get-url master >/dev/null 2>&1 \
|
||||
&& git remote set-url master https://sourcecode.confdroid.com/confdroid/confdroid_ssh.git \
|
||||
|| git remote add master https://sourcecode.confdroid.com/confdroid/confdroid_ssh.git
|
||||
git -c credential.helper="!f() { echo username=${GITEA_USER}; echo password=${GITEA_TOKEN}; }; f" \
|
||||
push --force master refs/heads/master:refs/heads/master
|
||||
'''
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
32
README.md
32
README.md
@@ -7,6 +7,7 @@
|
||||
- [Synopsis](#synopsis)
|
||||
- [WARNING](#warning)
|
||||
- [Features](#features)
|
||||
- [Adding custom configurations](#adding-custom-configurations)
|
||||
- [Support](#support)
|
||||
- [Parameter Inheritance](#parameter-inheritance)
|
||||
- [Module Deployment](#module-deployment)
|
||||
@@ -25,11 +26,34 @@
|
||||
## Features
|
||||
|
||||
- install required binaries
|
||||
- manage local custom configuration based on parameters, overriding the defaults
|
||||
- manage selinux rules
|
||||
- manage required files and directories including selinux context
|
||||
- manage service
|
||||
- (optional) manage firewall
|
||||
|
||||
|
||||
## Adding custom configurations
|
||||
|
||||
Custom configuration files live in `/etc/ssh/sshd_config.d/`. IN order to create a custom config file, add a stanza like this in your control repo:
|
||||
|
||||
```puppet
|
||||
confdroid_ssh::custom::custom_config { '30-my-custom-rule':
|
||||
config_name => '30-custom-rule',
|
||||
config_content => ['PasswordAuthentication no'],
|
||||
}
|
||||
```
|
||||
|
||||
This will create a file /etc/ssh/sshd_config.d/30-custom-rule.conf with this content:
|
||||
|
||||
```puppet
|
||||
###############################################################################
|
||||
##### DO NOT EDIT THIS FILE MANUALLY #
|
||||
##### This file is managed by Puppet. Any changes to this file will be #
|
||||
##### overwritten. Update the Puppet define input instead. #
|
||||
###############################################################################
|
||||
PasswordAuthentication no
|
||||
```
|
||||
|
||||
Note that the value for config_content **has to be an array**, even if only one key pair is in there. This field is designed to hold multiple values, which create one line in the config file each.
|
||||
|
||||
## Support
|
||||
|
||||
- Rocky 9 (Any RHEL 9 based OS should work but has not been tested)
|
||||
@@ -41,7 +65,7 @@ All parameters are listed in `params.pp` and inherited from there. Variable par
|
||||
|
||||
## Module Deployment
|
||||
|
||||
ALmost every puppet setup is done in very custom ways, and hence the way the modules are deployed to nodes are different. This module assumes [Foreman][def] as ENC, so the modules just have to be present on the master node and Foreman will take care for it.
|
||||
Almost every puppet setup is done in very custom ways, and hence the way the modules are deployed to nodes are different. This module assumes [Foreman][def] as ENC, so the modules just have to be present on the master node and Foreman will take care for it.
|
||||
|
||||
## Tests
|
||||
|
||||
|
||||
@@ -122,6 +122,30 @@
|
||||
|
||||
|
||||
|
||||
<h2>Defined Type Listing A-Z</h2>
|
||||
|
||||
|
||||
<table>
|
||||
<tr>
|
||||
<td valign='top' width="33%">
|
||||
|
||||
|
||||
<ul id="alpha_C" class="alpha">
|
||||
<li class="letter">C</li>
|
||||
<ul>
|
||||
|
||||
<li>
|
||||
<span class='object_link'><a href="puppet_defined_types/confdroid_ssh_3A_3Acustom_3A_3Acustom_config.html" title="puppet_defined_types::confdroid_ssh::custom::custom_config (puppet_defined_type)">confdroid_ssh::custom::custom_config</a></span>
|
||||
|
||||
</li>
|
||||
|
||||
</ul>
|
||||
</ul>
|
||||
|
||||
</td>
|
||||
</tr>
|
||||
</table>
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
@@ -70,6 +70,8 @@
|
||||
</li><li>
|
||||
<p><a href="#features">Features</a></p>
|
||||
</li><li>
|
||||
<p><a href="#adding-custom-configurations">Adding custom configurations</a></p>
|
||||
</li><li>
|
||||
<p><a href="#support">Support</a></p>
|
||||
</li><li>
|
||||
<p><a href="#parameter-inheritance">Parameter Inheritance</a></p>
|
||||
@@ -97,15 +99,35 @@
|
||||
<ul><li>
|
||||
<p>install required binaries</p>
|
||||
</li><li>
|
||||
<p>manage local custom configuration based on parameters, overriding the defaults</p>
|
||||
</li><li>
|
||||
<p>manage selinux rules</p>
|
||||
<p>manage required files and directories including selinux context</p>
|
||||
</li><li>
|
||||
<p>manage service</p>
|
||||
</li><li>
|
||||
<p>(optional) manage firewall</p>
|
||||
</li></ul>
|
||||
|
||||
<h2 id="label-Adding+custom+configurations">Adding custom configurations</h2>
|
||||
|
||||
<p>Custom configuration files live in <code>/etc/ssh/sshd_config.d/</code>. IN order to create a custom config file, add a stanza like this in your control repo:</p>
|
||||
|
||||
<pre class="code ruby"><code class="ruby">confdroid_ssh::custom::custom_config { '30-my-custom-rule':
|
||||
config_name => '30-custom-rule',
|
||||
config_content => ['PasswordAuthentication no'],
|
||||
}
|
||||
</code></pre>
|
||||
|
||||
<p>This will create a file /etc/ssh/sshd_config.d/30-custom-rule.conf with this content:</p>
|
||||
|
||||
<pre class="code ruby"><code class="ruby"><span class='comment'>###############################################################################
|
||||
</span><span class='comment'>##### DO NOT EDIT THIS FILE MANUALLY #
|
||||
</span><span class='comment'>##### This file is managed by Puppet. Any changes to this file will be #
|
||||
</span><span class='comment'>##### overwritten. Update the Puppet define input instead. #
|
||||
</span><span class='comment'>###############################################################################
|
||||
</span><span class='const'>PasswordAuthentication</span> <span class='id identifier rubyid_no'>no</span>
|
||||
</code></pre>
|
||||
|
||||
<p>Note that the value for config_content <strong>has to be an array</strong>, even if only one key pair is in there. This field is designed to hold multiple values, which create one line in the config file each.</p>
|
||||
|
||||
<h2 id="label-Support">Support</h2>
|
||||
<ul><li>
|
||||
<p>Rocky 9 (Any RHEL 9 based OS should work but has not been tested)</p>
|
||||
@@ -119,7 +141,7 @@
|
||||
|
||||
<h2 id="label-Module+Deployment">Module Deployment</h2>
|
||||
|
||||
<p>ALmost every puppet setup is done in very custom ways, and hence the way the modules are deployed to nodes are different. This module assumes <a href="https://www.theforeman.org/manuals/3.13/quickstart_guide.html">Foreman</a> as ENC, so the modules just have to be present on the master node and Foreman will take care for it.</p>
|
||||
<p>Almost every puppet setup is done in very custom ways, and hence the way the modules are deployed to nodes are different. This module assumes <a href="https://www.theforeman.org/manuals/3.13/quickstart_guide.html">Foreman</a> as ENC, so the modules just have to be present on the master node and Foreman will take care for it.</p>
|
||||
|
||||
<h2 id="label-Tests">Tests</h2>
|
||||
<ul><li>
|
||||
|
||||
@@ -70,6 +70,8 @@
|
||||
</li><li>
|
||||
<p><a href="#features">Features</a></p>
|
||||
</li><li>
|
||||
<p><a href="#adding-custom-configurations">Adding custom configurations</a></p>
|
||||
</li><li>
|
||||
<p><a href="#support">Support</a></p>
|
||||
</li><li>
|
||||
<p><a href="#parameter-inheritance">Parameter Inheritance</a></p>
|
||||
@@ -97,15 +99,35 @@
|
||||
<ul><li>
|
||||
<p>install required binaries</p>
|
||||
</li><li>
|
||||
<p>manage local custom configuration based on parameters, overriding the defaults</p>
|
||||
</li><li>
|
||||
<p>manage selinux rules</p>
|
||||
<p>manage required files and directories including selinux context</p>
|
||||
</li><li>
|
||||
<p>manage service</p>
|
||||
</li><li>
|
||||
<p>(optional) manage firewall</p>
|
||||
</li></ul>
|
||||
|
||||
<h2 id="label-Adding+custom+configurations">Adding custom configurations</h2>
|
||||
|
||||
<p>Custom configuration files live in <code>/etc/ssh/sshd_config.d/</code>. IN order to create a custom config file, add a stanza like this in your control repo:</p>
|
||||
|
||||
<pre class="code ruby"><code class="ruby">confdroid_ssh::custom::custom_config { '30-my-custom-rule':
|
||||
config_name => '30-custom-rule',
|
||||
config_content => ['PasswordAuthentication no'],
|
||||
}
|
||||
</code></pre>
|
||||
|
||||
<p>This will create a file /etc/ssh/sshd_config.d/30-custom-rule.conf with this content:</p>
|
||||
|
||||
<pre class="code ruby"><code class="ruby"><span class='comment'>###############################################################################
|
||||
</span><span class='comment'>##### DO NOT EDIT THIS FILE MANUALLY #
|
||||
</span><span class='comment'>##### This file is managed by Puppet. Any changes to this file will be #
|
||||
</span><span class='comment'>##### overwritten. Update the Puppet define input instead. #
|
||||
</span><span class='comment'>###############################################################################
|
||||
</span><span class='const'>PasswordAuthentication</span> <span class='id identifier rubyid_no'>no</span>
|
||||
</code></pre>
|
||||
|
||||
<p>Note that the value for config_content <strong>has to be an array</strong>, even if only one key pair is in there. This field is designed to hold multiple values, which create one line in the config file each.</p>
|
||||
|
||||
<h2 id="label-Support">Support</h2>
|
||||
<ul><li>
|
||||
<p>Rocky 9 (Any RHEL 9 based OS should work but has not been tested)</p>
|
||||
@@ -119,7 +141,7 @@
|
||||
|
||||
<h2 id="label-Module+Deployment">Module Deployment</h2>
|
||||
|
||||
<p>ALmost every puppet setup is done in very custom ways, and hence the way the modules are deployed to nodes are different. This module assumes <a href="https://www.theforeman.org/manuals/3.13/quickstart_guide.html">Foreman</a> as ENC, so the modules just have to be present on the master node and Foreman will take care for it.</p>
|
||||
<p>Almost every puppet setup is done in very custom ways, and hence the way the modules are deployed to nodes are different. This module assumes <a href="https://www.theforeman.org/manuals/3.13/quickstart_guide.html">Foreman</a> as ENC, so the modules just have to be present on the master node and Foreman will take care for it.</p>
|
||||
|
||||
<h2 id="label-Tests">Tests</h2>
|
||||
<ul><li>
|
||||
|
||||
@@ -28,6 +28,10 @@
|
||||
Puppet Classes
|
||||
</a></span>
|
||||
|
||||
<span><a target="_self" href="puppet_defined_type_list.html">
|
||||
Defined Types
|
||||
</a></span>
|
||||
|
||||
</div>
|
||||
|
||||
<div id="search">Search: <input type="text" /></div>
|
||||
|
||||
@@ -111,9 +111,7 @@
|
||||
13
|
||||
14
|
||||
15
|
||||
16
|
||||
17
|
||||
18</pre>
|
||||
16</pre>
|
||||
</td>
|
||||
<td>
|
||||
<pre class="code"><span class="info file"># File 'manifests/firewall/iptables.pp', line 6</span>
|
||||
@@ -121,14 +119,12 @@
|
||||
class confdroid_ssh::firewall::iptables (
|
||||
|
||||
) inherits confdroid_ssh::params {
|
||||
if $ssh_use_firewall {
|
||||
firewall { "${ssh_fw_order}${ssh_fw_port} allow SSH on port ${ssh_fw_port}":
|
||||
ensure => 'present',
|
||||
proto => 'tcp',
|
||||
source => $ssh_source_range,
|
||||
dport => $ssh_fw_port,
|
||||
jump => 'accept',
|
||||
}
|
||||
firewall { "${ssh_fw_order}${ssh_fw_port} allow SSH on port ${ssh_fw_port}":
|
||||
ensure => $ssh_fw_rule,
|
||||
proto => 'tcp',
|
||||
source => $ssh_source_range,
|
||||
dport => $ssh_fw_port,
|
||||
jump => 'accept',
|
||||
}
|
||||
}</pre>
|
||||
</td>
|
||||
|
||||
@@ -141,7 +141,7 @@ class confdroid_ssh::main::dirs (
|
||||
path => $ssh_etc_path,
|
||||
owner => $sshd_user,
|
||||
group => $sshd_user,
|
||||
mode => '0700',
|
||||
mode => '0755',
|
||||
selrange => s0,
|
||||
selrole => object_r,
|
||||
seltype => etc_t,
|
||||
@@ -152,7 +152,7 @@ class confdroid_ssh::main::dirs (
|
||||
ensure => directory,
|
||||
owner => $sshd_user,
|
||||
group => $sshd_user,
|
||||
mode => '0700',
|
||||
mode => '0755',
|
||||
selrange => s0,
|
||||
selrole => object_r,
|
||||
seltype => etc_t,
|
||||
|
||||
@@ -118,30 +118,7 @@
|
||||
20
|
||||
21
|
||||
22
|
||||
23
|
||||
24
|
||||
25
|
||||
26
|
||||
27
|
||||
28
|
||||
29
|
||||
30
|
||||
31
|
||||
32
|
||||
33
|
||||
34
|
||||
35
|
||||
36
|
||||
37
|
||||
38
|
||||
39
|
||||
40
|
||||
41
|
||||
42
|
||||
43
|
||||
44
|
||||
45
|
||||
46</pre>
|
||||
23</pre>
|
||||
</td>
|
||||
<td>
|
||||
<pre class="code"><span class="info file"># File 'manifests/main/files.pp', line 6</span>
|
||||
@@ -163,29 +140,6 @@ class confdroid_ssh::main::files (
|
||||
content => template($sshd_config_erb),
|
||||
notify => Service[$sshd_service],
|
||||
}
|
||||
|
||||
if $ssh_manage_config {
|
||||
file { $sshd_custom_conf:
|
||||
ensure => file,
|
||||
path => $sshd_custom_conf,
|
||||
owner => $sshd_user,
|
||||
group => $sshd_user,
|
||||
mode => '0640',
|
||||
selrange => s0,
|
||||
selrole => object_r,
|
||||
seltype => etc_t,
|
||||
seluser => system_u,
|
||||
content => template($sshd_custom_erb),
|
||||
notify => Service[$sshd_service],
|
||||
}
|
||||
# we want the default root login setting to be managed by the custom conf,
|
||||
# so we remove the default file if it exists
|
||||
file { $sshd_root_login_file:
|
||||
ensure => absent,
|
||||
path => $sshd_root_login_file,
|
||||
notify => Service[$sshd_service],
|
||||
}
|
||||
}
|
||||
}</pre>
|
||||
</td>
|
||||
</tr>
|
||||
|
||||
@@ -113,9 +113,7 @@
|
||||
15
|
||||
16
|
||||
17
|
||||
18
|
||||
19
|
||||
20</pre>
|
||||
18</pre>
|
||||
</td>
|
||||
<td>
|
||||
<pre class="code"><span class="info file"># File 'manifests/main/service.pp', line 6</span>
|
||||
@@ -124,9 +122,7 @@ class confdroid_ssh::main::service (
|
||||
) inherits confdroid_ssh::params {
|
||||
require confdroid_ssh::main::files
|
||||
require confdroid_ssh::selinux::semanage
|
||||
if $ssh_use_firewall {
|
||||
require confdroid_ssh::firewall::iptables
|
||||
}
|
||||
require confdroid_ssh::firewall::iptables
|
||||
|
||||
service { $sshd_service:
|
||||
ensure => running,
|
||||
|
||||
@@ -148,18 +148,18 @@
|
||||
|
||||
<li>
|
||||
|
||||
<span class='name'>ssh_use_firewall</span>
|
||||
<span class='name'>ssh_fw_rule</span>
|
||||
|
||||
|
||||
<span class='type'>(<tt>Boolean</tt>)</span>
|
||||
<span class='type'>(<tt>String</tt>)</span>
|
||||
|
||||
|
||||
<em class="default">(defaults to: <tt>true</tt>)</em>
|
||||
<em class="default">(defaults to: <tt>'present'</tt>)</em>
|
||||
|
||||
|
||||
—
|
||||
<div class='inline'>
|
||||
<p>whether to manage firewall settings</p>
|
||||
<p>whether set the fw rule to present or absent.</p>
|
||||
</div>
|
||||
|
||||
</li>
|
||||
@@ -214,132 +214,6 @@
|
||||
—
|
||||
<div class='inline'>
|
||||
<p>source range for firewall rule</p>
|
||||
</div>
|
||||
|
||||
</li>
|
||||
|
||||
<li>
|
||||
|
||||
<span class='name'>ssh_manage_config</span>
|
||||
|
||||
|
||||
<span class='type'>(<tt>Boolean</tt>)</span>
|
||||
|
||||
|
||||
<em class="default">(defaults to: <tt>true</tt>)</em>
|
||||
|
||||
|
||||
—
|
||||
<div class='inline'>
|
||||
<p>whether to manage the configuration</p>
|
||||
</div>
|
||||
|
||||
</li>
|
||||
|
||||
<li>
|
||||
|
||||
<span class='name'>ssh_address_family</span>
|
||||
|
||||
|
||||
<span class='type'>(<tt>String</tt>)</span>
|
||||
|
||||
|
||||
<em class="default">(defaults to: <tt>'any'</tt>)</em>
|
||||
|
||||
|
||||
—
|
||||
<div class='inline'>
|
||||
<p>AddressFamily setting for sshd_config</p>
|
||||
</div>
|
||||
|
||||
</li>
|
||||
|
||||
<li>
|
||||
|
||||
<span class='name'>ssh_listen_address</span>
|
||||
|
||||
|
||||
<span class='type'>(<tt>String</tt>)</span>
|
||||
|
||||
|
||||
<em class="default">(defaults to: <tt>'0.0.0.0'</tt>)</em>
|
||||
|
||||
|
||||
—
|
||||
<div class='inline'>
|
||||
<p>ListenAddress setting for sshd_config</p>
|
||||
</div>
|
||||
|
||||
</li>
|
||||
|
||||
<li>
|
||||
|
||||
<span class='name'>ssh_root_login</span>
|
||||
|
||||
|
||||
<span class='type'>(<tt>String</tt>)</span>
|
||||
|
||||
|
||||
<em class="default">(defaults to: <tt>'prohibit-password'</tt>)</em>
|
||||
|
||||
|
||||
—
|
||||
<div class='inline'>
|
||||
<p>PermitRootLogin setting for sshd_config</p>
|
||||
</div>
|
||||
|
||||
</li>
|
||||
|
||||
<li>
|
||||
|
||||
<span class='name'>ssh_strict_modes</span>
|
||||
|
||||
|
||||
<span class='type'>(<tt>String</tt>)</span>
|
||||
|
||||
|
||||
<em class="default">(defaults to: <tt>'yes'</tt>)</em>
|
||||
|
||||
|
||||
—
|
||||
<div class='inline'>
|
||||
<p>StrictModes setting for sshd_config</p>
|
||||
</div>
|
||||
|
||||
</li>
|
||||
|
||||
<li>
|
||||
|
||||
<span class='name'>ssh_max_auth_tries</span>
|
||||
|
||||
|
||||
<span class='type'>(<tt>String</tt>)</span>
|
||||
|
||||
|
||||
<em class="default">(defaults to: <tt>'6'</tt>)</em>
|
||||
|
||||
|
||||
—
|
||||
<div class='inline'>
|
||||
<p>MaxAuthTries setting for sshd_config</p>
|
||||
</div>
|
||||
|
||||
</li>
|
||||
|
||||
<li>
|
||||
|
||||
<span class='name'>ssh_max_sessions</span>
|
||||
|
||||
|
||||
<span class='type'>(<tt>String</tt>)</span>
|
||||
|
||||
|
||||
<em class="default">(defaults to: <tt>'10'</tt>)</em>
|
||||
|
||||
|
||||
—
|
||||
<div class='inline'>
|
||||
<p>MaxSessions setting for sshd_config</p>
|
||||
</div>
|
||||
|
||||
</li>
|
||||
@@ -355,6 +229,12 @@
|
||||
<pre class="lines">
|
||||
|
||||
|
||||
13
|
||||
14
|
||||
15
|
||||
16
|
||||
17
|
||||
18
|
||||
19
|
||||
20
|
||||
21
|
||||
@@ -378,47 +258,21 @@
|
||||
39
|
||||
40
|
||||
41
|
||||
42
|
||||
43
|
||||
44
|
||||
45
|
||||
46
|
||||
47
|
||||
48
|
||||
49
|
||||
50
|
||||
51
|
||||
52
|
||||
53
|
||||
54
|
||||
55
|
||||
56
|
||||
57
|
||||
58
|
||||
59</pre>
|
||||
42</pre>
|
||||
</td>
|
||||
<td>
|
||||
<pre class="code"><span class="info file"># File 'manifests/params.pp', line 19</span>
|
||||
<pre class="code"><span class="info file"># File 'manifests/params.pp', line 13</span>
|
||||
|
||||
class confdroid_ssh::params (
|
||||
|
||||
Array $ssh_reqpackages = ['openssh','openssh-clients','openssh-server'],
|
||||
String $pkg_ensure = 'present',
|
||||
Array $ssh_reqpackages = ['openssh','openssh-clients','openssh-server'],
|
||||
String $pkg_ensure = 'present',
|
||||
|
||||
# firewall settings
|
||||
Boolean $ssh_use_firewall = true,
|
||||
String $ssh_fw_port = '22',
|
||||
String $ssh_fw_order = '50',
|
||||
String $ssh_source_range = '0.0.0.0/0',
|
||||
|
||||
# main configuration
|
||||
Boolean $ssh_manage_config = true,
|
||||
String $ssh_address_family = 'any',
|
||||
String $ssh_listen_address = '0.0.0.0',
|
||||
String $ssh_root_login = 'prohibit-password',
|
||||
String $ssh_strict_modes = 'yes',
|
||||
String $ssh_max_auth_tries = '6',
|
||||
String $ssh_max_sessions = '10',
|
||||
String $ssh_fw_rule = 'present',
|
||||
String $ssh_fw_port = '22',
|
||||
String $ssh_fw_order = '50',
|
||||
String $ssh_source_range = '0.0.0.0/0',
|
||||
|
||||
) {
|
||||
# default facts
|
||||
@@ -433,8 +287,6 @@ class confdroid_ssh::params (
|
||||
$sshd_service = 'sshd'
|
||||
$sshd_config_path = "${ssh_etc_path}/sshd_config"
|
||||
$sshd_custom_path = "${ssh_etc_path}/sshd_config.d"
|
||||
$sshd_custom_conf = "${sshd_custom_path}/10-custom.conf"
|
||||
$sshd_custom_erb = 'confdroid_ssh/sshd_custom_conf.erb'
|
||||
$sshd_config_erb = 'confdroid_ssh/sshd_config.erb'
|
||||
$sshd_root_login_file = "${sshd_custom_path}/01-permitrootlogin.conf"
|
||||
|
||||
|
||||
54
doc/puppet_defined_type_list.html
Normal file
54
doc/puppet_defined_type_list.html
Normal file
@@ -0,0 +1,54 @@
|
||||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||||
<meta charset="utf-8" />
|
||||
|
||||
<link rel="stylesheet" href="css/full_list.css" type="text/css" media="screen" />
|
||||
|
||||
<link rel="stylesheet" href="css/common.css" type="text/css" media="screen" />
|
||||
|
||||
|
||||
|
||||
<script type="text/javascript" charset="utf-8" src="js/jquery.js"></script>
|
||||
|
||||
<script type="text/javascript" charset="utf-8" src="js/full_list.js"></script>
|
||||
|
||||
|
||||
<title>Defined Type List</title>
|
||||
<base id="base_target" target="_parent" />
|
||||
</head>
|
||||
<body>
|
||||
<div id="content">
|
||||
<div class="fixed_header">
|
||||
<h1 id="full_list_header">Defined Type List</h1>
|
||||
<div id="full_list_nav">
|
||||
|
||||
<span><a target="_self" href="puppet_class_list.html">
|
||||
Puppet Classes
|
||||
</a></span>
|
||||
|
||||
<span><a target="_self" href="puppet_defined_type_list.html">
|
||||
Defined Types
|
||||
</a></span>
|
||||
|
||||
</div>
|
||||
|
||||
<div id="search">Search: <input type="text" /></div>
|
||||
</div>
|
||||
|
||||
<ul id="full_list" class="puppet_defined_type">
|
||||
|
||||
|
||||
<li id="object_puppet_defined_types::confdroid_ssh::custom::custom_config" class="odd">
|
||||
<div class="item">
|
||||
<span class='object_link'><a href="puppet_defined_types/confdroid_ssh_3A_3Acustom_3A_3Acustom_config.html" title="puppet_defined_types::confdroid_ssh::custom::custom_config (puppet_defined_type)">confdroid_ssh::custom::custom_config</a></span>
|
||||
</div>
|
||||
</li>
|
||||
|
||||
|
||||
|
||||
</ul>
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
@@ -0,0 +1,209 @@
|
||||
<!DOCTYPE html>
|
||||
<html>
|
||||
<head>
|
||||
<meta charset="utf-8">
|
||||
<meta name="viewport" content="width=device-width, initial-scale=1.0">
|
||||
<title>
|
||||
Defined Type: confdroid_ssh::custom::custom_config
|
||||
|
||||
— Documentation by YARD 0.9.36
|
||||
|
||||
</title>
|
||||
|
||||
<link rel="stylesheet" href="../css/style.css" type="text/css" />
|
||||
|
||||
<link rel="stylesheet" href="../css/common.css" type="text/css" />
|
||||
|
||||
<script type="text/javascript">
|
||||
pathId = "puppet_defined_types::confdroid_ssh::custom::custom_config";
|
||||
relpath = '../';
|
||||
</script>
|
||||
|
||||
|
||||
<script type="text/javascript" charset="utf-8" src="../js/jquery.js"></script>
|
||||
|
||||
<script type="text/javascript" charset="utf-8" src="../js/app.js"></script>
|
||||
|
||||
|
||||
</head>
|
||||
<body>
|
||||
<div class="nav_wrap">
|
||||
<iframe id="nav" src="../puppet_defined_type_list.html?1"></iframe>
|
||||
<div id="resizer"></div>
|
||||
</div>
|
||||
|
||||
<div id="main" tabindex="-1">
|
||||
<div id="header">
|
||||
<div id="menu">
|
||||
|
||||
<a href="../_index.html">Index (c)</a> »
|
||||
<span class='title'><span class='object_link'>Defined Types</span></span>
|
||||
»
|
||||
<span class="title">confdroid_ssh::custom::custom_config</span>
|
||||
|
||||
</div>
|
||||
|
||||
<div id="search">
|
||||
|
||||
<a class="full_list_link" id="puppet_class_list_link"
|
||||
href="../puppet_class_list.html">
|
||||
|
||||
<svg width="24" height="24">
|
||||
<rect x="0" y="4" width="24" height="4" rx="1" ry="1"></rect>
|
||||
<rect x="0" y="12" width="24" height="4" rx="1" ry="1"></rect>
|
||||
<rect x="0" y="20" width="24" height="4" rx="1" ry="1"></rect>
|
||||
</svg>
|
||||
</a>
|
||||
|
||||
</div>
|
||||
<div class="clear"></div>
|
||||
</div>
|
||||
|
||||
<div id="content"><h1>Defined Type: confdroid_ssh::custom::custom_config</h1>
|
||||
<div class="box_info">
|
||||
<dl>
|
||||
<dt>Defined in:</dt>
|
||||
<dd>
|
||||
manifests/custom/custom_config.pp
|
||||
</dd>
|
||||
</dl>
|
||||
</div>
|
||||
|
||||
<h2>Summary</h2>
|
||||
Class manages custom configurations for SSH
|
||||
|
||||
<h2>Overview</h2>
|
||||
<div class="docstring">
|
||||
<div class="discussion">
|
||||
|
||||
<p>confdroid_ssh::custom::custom_config.pp Module name: confdroid_ssh Author: 12ww1160 (12ww1160@confdroid.com) } this will create a file called /etc/ssh/sshd_config.d/50-test.conf with the content: PasswordAuthentication no and notify the sshd service to reload the configuration</p>
|
||||
|
||||
</div>
|
||||
</div>
|
||||
|
||||
|
||||
|
||||
<div class="tags">
|
||||
|
||||
<div class="examples">
|
||||
<p class="tag_title">Examples:</p>
|
||||
|
||||
|
||||
<pre class="example code"><code>confdroid_ssh::custom::custom_config { '50-test':
|
||||
config_name => '50-test',
|
||||
config_content => ['PasswordAuthentication no'],</code></pre>
|
||||
|
||||
</div>
|
||||
<p class="tag_title">Parameters:</p>
|
||||
<ul class="param">
|
||||
|
||||
<li>
|
||||
|
||||
<span class='name'>config_name</span>
|
||||
|
||||
|
||||
<span class='type'>(<tt>String</tt>)</span>
|
||||
|
||||
|
||||
|
||||
—
|
||||
<div class='inline'>
|
||||
<p>name of the custom configuration file (without .conf extension)</p>
|
||||
</div>
|
||||
|
||||
</li>
|
||||
|
||||
<li>
|
||||
|
||||
<span class='name'>config_content</span>
|
||||
|
||||
|
||||
<span class='type'>(<tt>Array[String]</tt>)</span>
|
||||
|
||||
|
||||
|
||||
—
|
||||
<div class='inline'>
|
||||
<p>array of configuration lines to include in the custom config</p>
|
||||
</div>
|
||||
|
||||
</li>
|
||||
|
||||
</ul>
|
||||
|
||||
|
||||
|
||||
</div><div class="method_details_list">
|
||||
<table class="source_code">
|
||||
<tr>
|
||||
<td>
|
||||
<pre class="lines">
|
||||
|
||||
|
||||
17
|
||||
18
|
||||
19
|
||||
20
|
||||
21
|
||||
22
|
||||
23
|
||||
24
|
||||
25
|
||||
26
|
||||
27
|
||||
28
|
||||
29
|
||||
30
|
||||
31
|
||||
32
|
||||
33
|
||||
34
|
||||
35
|
||||
36
|
||||
37
|
||||
38
|
||||
39
|
||||
40
|
||||
41</pre>
|
||||
</td>
|
||||
<td>
|
||||
<pre class="code"><span class="info file"># File 'manifests/custom/custom_config.pp', line 17</span>
|
||||
|
||||
define confdroid_ssh::custom::custom_config (
|
||||
|
||||
String $config_name,
|
||||
Array[String] $config_content,
|
||||
|
||||
) {
|
||||
$sshd_custom_path = $confdroid_ssh::params::sshd_custom_path
|
||||
$sshd_service = $confdroid_ssh::params::sshd_service
|
||||
$custom_config_erb = 'confdroid_ssh/custom_config.erb'
|
||||
$config_basename = regsubst($config_name, '\\.conf$', '')
|
||||
$config_file = "${config_name}.conf"
|
||||
|
||||
file { "${sshd_custom_path}/${config_file}":
|
||||
ensure => file,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0600',
|
||||
selrange => s0,
|
||||
selrole => object_r,
|
||||
seltype => etc_t,
|
||||
seluser => system_u,
|
||||
content => template($custom_config_erb),
|
||||
notify => Service[$sshd_service],
|
||||
}
|
||||
}</pre>
|
||||
</td>
|
||||
</tr>
|
||||
</table>
|
||||
</div>
|
||||
</div>
|
||||
|
||||
<div id="footer">
|
||||
Generated by <a href="http://yardoc.org" title="Yay! A Ruby Documentation Tool" target="_parent">yard</a>.
|
||||
</div>
|
||||
|
||||
</div>
|
||||
</body>
|
||||
</html>
|
||||
41
manifests/custom/custom_config.pp
Normal file
41
manifests/custom/custom_config.pp
Normal file
@@ -0,0 +1,41 @@
|
||||
## confdroid_ssh::custom::custom_config.pp
|
||||
# Module name: confdroid_ssh
|
||||
# Author: 12ww1160 (12ww1160@confdroid.com)
|
||||
# @summary Class manages custom configurations for SSH
|
||||
# @param [String] config_name name of the custom configuration file
|
||||
# (without .conf extension)
|
||||
# @param [Array[String]] config_content array of configuration lines to
|
||||
# include in the custom config
|
||||
# @example
|
||||
# confdroid_ssh::custom::custom_config { '50-test':
|
||||
# config_name => '50-test',
|
||||
# config_content => ['PasswordAuthentication no'],
|
||||
# }
|
||||
# this will create a file called /etc/ssh/sshd_config.d/50-test.conf with the content:
|
||||
# PasswordAuthentication no and notify the sshd service to reload the configuration
|
||||
##############################################################################
|
||||
define confdroid_ssh::custom::custom_config (
|
||||
|
||||
String $config_name,
|
||||
Array[String] $config_content,
|
||||
|
||||
) {
|
||||
$sshd_custom_path = $confdroid_ssh::params::sshd_custom_path
|
||||
$sshd_service = $confdroid_ssh::params::sshd_service
|
||||
$custom_config_erb = 'confdroid_ssh/custom_config.erb'
|
||||
$config_basename = regsubst($config_name, '\\.conf$', '')
|
||||
$config_file = "${config_name}.conf"
|
||||
|
||||
file { "${sshd_custom_path}/${config_file}":
|
||||
ensure => file,
|
||||
owner => 'root',
|
||||
group => 'root',
|
||||
mode => '0600',
|
||||
selrange => s0,
|
||||
selrole => object_r,
|
||||
seltype => etc_t,
|
||||
seluser => system_u,
|
||||
content => template($custom_config_erb),
|
||||
notify => Service[$sshd_service],
|
||||
}
|
||||
}
|
||||
@@ -6,13 +6,11 @@
|
||||
class confdroid_ssh::firewall::iptables (
|
||||
|
||||
) inherits confdroid_ssh::params {
|
||||
if $ssh_use_firewall {
|
||||
firewall { "${ssh_fw_order}${ssh_fw_port} allow SSH on port ${ssh_fw_port}":
|
||||
ensure => 'present',
|
||||
proto => 'tcp',
|
||||
source => $ssh_source_range,
|
||||
dport => $ssh_fw_port,
|
||||
jump => 'accept',
|
||||
}
|
||||
firewall { "${ssh_fw_order}${ssh_fw_port} allow SSH on port ${ssh_fw_port}":
|
||||
ensure => $ssh_fw_rule,
|
||||
proto => 'tcp',
|
||||
source => $ssh_source_range,
|
||||
dport => $ssh_fw_port,
|
||||
jump => 'accept',
|
||||
}
|
||||
}
|
||||
|
||||
@@ -12,7 +12,7 @@ class confdroid_ssh::main::dirs (
|
||||
path => $ssh_etc_path,
|
||||
owner => $sshd_user,
|
||||
group => $sshd_user,
|
||||
mode => '0700',
|
||||
mode => '0755',
|
||||
selrange => s0,
|
||||
selrole => object_r,
|
||||
seltype => etc_t,
|
||||
@@ -23,7 +23,7 @@ class confdroid_ssh::main::dirs (
|
||||
ensure => directory,
|
||||
owner => $sshd_user,
|
||||
group => $sshd_user,
|
||||
mode => '0700',
|
||||
mode => '0755',
|
||||
selrange => s0,
|
||||
selrole => object_r,
|
||||
seltype => etc_t,
|
||||
|
||||
@@ -20,27 +20,4 @@ class confdroid_ssh::main::files (
|
||||
content => template($sshd_config_erb),
|
||||
notify => Service[$sshd_service],
|
||||
}
|
||||
|
||||
if $ssh_manage_config {
|
||||
file { $sshd_custom_conf:
|
||||
ensure => file,
|
||||
path => $sshd_custom_conf,
|
||||
owner => $sshd_user,
|
||||
group => $sshd_user,
|
||||
mode => '0640',
|
||||
selrange => s0,
|
||||
selrole => object_r,
|
||||
seltype => etc_t,
|
||||
seluser => system_u,
|
||||
content => template($sshd_custom_erb),
|
||||
notify => Service[$sshd_service],
|
||||
}
|
||||
# we want the default root login setting to be managed by the custom conf,
|
||||
# so we remove the default file if it exists
|
||||
file { $sshd_root_login_file:
|
||||
ensure => absent,
|
||||
path => $sshd_root_login_file,
|
||||
notify => Service[$sshd_service],
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
@@ -7,9 +7,7 @@ class confdroid_ssh::main::service (
|
||||
) inherits confdroid_ssh::params {
|
||||
require confdroid_ssh::main::files
|
||||
require confdroid_ssh::selinux::semanage
|
||||
if $ssh_use_firewall {
|
||||
require confdroid_ssh::firewall::iptables
|
||||
}
|
||||
require confdroid_ssh::firewall::iptables
|
||||
|
||||
service { $sshd_service:
|
||||
ensure => running,
|
||||
|
||||
@@ -4,37 +4,22 @@
|
||||
# @summary Class contains all class parameters for confdroid_ssh
|
||||
# @param [Array] ssh_reqpackages packages to install
|
||||
# @param [String] pkg_ensure version to install: 'present' or 'latest'
|
||||
# @param [Boolean] ssh_use_firewall whether to manage firewall settings
|
||||
# @param [String] ssh_fw_rule whether set the fw rule to
|
||||
# present or absent.
|
||||
# @param [String] ssh_fw_port port to use for SSHD and in fw
|
||||
# @param [String] ssh_fw_order order of firewall rule
|
||||
# @param [String] ssh_source_range source range for firewall rule
|
||||
# @param [Boolean] ssh_manage_config whether to manage the configuration
|
||||
# @param [String] ssh_address_family AddressFamily setting for sshd_config
|
||||
# @param [String] ssh_listen_address ListenAddress setting for sshd_config
|
||||
# @param [String] ssh_root_login PermitRootLogin setting for sshd_config
|
||||
# @param [String] ssh_strict_modes StrictModes setting for sshd_config
|
||||
# @param [String] ssh_max_auth_tries MaxAuthTries setting for sshd_config
|
||||
# @param [String] ssh_max_sessions MaxSessions setting for sshd_config
|
||||
##############################################################################
|
||||
###############################################################################
|
||||
class confdroid_ssh::params (
|
||||
|
||||
Array $ssh_reqpackages = ['openssh','openssh-clients','openssh-server'],
|
||||
String $pkg_ensure = 'present',
|
||||
Array $ssh_reqpackages = ['openssh','openssh-clients','openssh-server'],
|
||||
String $pkg_ensure = 'present',
|
||||
|
||||
# firewall settings
|
||||
Boolean $ssh_use_firewall = true,
|
||||
String $ssh_fw_port = '22',
|
||||
String $ssh_fw_order = '50',
|
||||
String $ssh_source_range = '0.0.0.0/0',
|
||||
|
||||
# main configuration
|
||||
Boolean $ssh_manage_config = true,
|
||||
String $ssh_address_family = 'any',
|
||||
String $ssh_listen_address = '0.0.0.0',
|
||||
String $ssh_root_login = 'prohibit-password',
|
||||
String $ssh_strict_modes = 'yes',
|
||||
String $ssh_max_auth_tries = '6',
|
||||
String $ssh_max_sessions = '10',
|
||||
String $ssh_fw_rule = 'present',
|
||||
String $ssh_fw_port = '22',
|
||||
String $ssh_fw_order = '50',
|
||||
String $ssh_source_range = '0.0.0.0/0',
|
||||
|
||||
) {
|
||||
# default facts
|
||||
@@ -49,8 +34,6 @@ class confdroid_ssh::params (
|
||||
$sshd_service = 'sshd'
|
||||
$sshd_config_path = "${ssh_etc_path}/sshd_config"
|
||||
$sshd_custom_path = "${ssh_etc_path}/sshd_config.d"
|
||||
$sshd_custom_conf = "${sshd_custom_path}/10-custom.conf"
|
||||
$sshd_custom_erb = 'confdroid_ssh/sshd_custom_conf.erb'
|
||||
$sshd_config_erb = 'confdroid_ssh/sshd_config.erb'
|
||||
$sshd_root_login_file = "${sshd_custom_path}/01-permitrootlogin.conf"
|
||||
|
||||
|
||||
8
templates/custom_config.erb
Normal file
8
templates/custom_config.erb
Normal file
@@ -0,0 +1,8 @@
|
||||
###############################################################################
|
||||
##### DO NOT EDIT THIS FILE MANUALLY #
|
||||
##### This file is managed by Puppet. Any changes to this file will be #
|
||||
##### overwritten. Update the Puppet define input instead. #
|
||||
###############################################################################
|
||||
<% @config_content.each do |config_line| -%>
|
||||
<%= config_line %>
|
||||
<% end -%>
|
||||
@@ -1,15 +0,0 @@
|
||||
###############################################################################
|
||||
##### DO NOT EDIT THIS FILE MANUALLY #
|
||||
##### This file is managed by Puppet. Any changes to this file will be #
|
||||
##### overwritten. The file is built via parameters, so any changes should #
|
||||
##### be made in the Puppet manifest parameters. #
|
||||
###############################################################################
|
||||
|
||||
Port <%= @ssh_fw_port %>
|
||||
AddressFamily <%= @ssh_address_family %>
|
||||
ListenAddress <%= @ssh_listen_address %>
|
||||
|
||||
PermitRootLogin <%= @ssh_root_login %>
|
||||
StrictModes <%= @ssh_strict_modes %>
|
||||
MaxAuthTries <%= @ssh_max_auth_tries %>
|
||||
MaxSessions <%= @ssh_max_sessions %>
|
||||
Reference in New Issue
Block a user