aboutsummaryrefslogtreecommitdiffstats
path: root/modules/openssh/manifests/init.pp
blob: 2e3fa3ae22b526516bd4a06776e0e4b305495e79 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
class openssh {
    class server {
        # some trick to manage sftp server, who is arch dependent on mdv    
        $path_to_sftp = "$lib_dir/ssh/"

        package { "openssh-server":
            ensure => installed
        }

        service { sshd:
            ensure => running,
            path => "/etc/init.d/sshd",
            subscribe => [ Package["openssh-server"] ]
        }


        file { "/etc/ssh/sshd_config":
            ensure => present,
            owner => root,
            group => root,
            mode => 644,
            require => Package["openssh-server"],
            content => template("openssh/sshd_config"),
            notify => Service["sshd"]
        }
    }

    # root account authorized_keys will be symlinked
    # if you want to add symlink on other accounts, use $symlink_users parameter
    class ssh_keys_from_ldap($symlink_users = []) inherits server {

        File ["/etc/ssh/sshd_config"] {
            content => template("openssh/sshd_config","openssh/sshd_config_ldap")
        }

        package { 'python-ldap':
            ensure => installed,
        }

        $pubkeys_directory = "/var/lib/pubkeys"
        file { $pubkeys_directory:
            ensure => directory,
            owner => root,
            group => root,
            mode => 755,
        #    before => Class["openssh"] 
        }

        file { "$pubkeys_directory/root":
            ensure => directory,
            owner => root,
            group => root,
            mode => 700,
        }

        file { "$pubkeys_directory/root/authorized_keys":
            ensure => "/root/.ssh/authorized_keys",
            mode => 700,
        }

        define symlink_user() {
    	    file { "$pubkeys_directory/$name":
	    	    ensure => directory,
		        owner => $name,
		        group => $name,
		        mode => 700,
	        }   

	        file { "$pubkeys_directory/$name/authorized_keys":
		        ensure => "~$name/.ssh/authorized_keys",
		        mode => 700,
	        }
        }

        symlink_user { $symlink_users: } 


	$sshkey2file = "/usr/local/bin/ldap-sshkey2file.py"
        $ldap_pwfile = "/etc/ldap.secret"
        file { $sshkey2file:
            ensure => present,
            owner => root,
            group => root,
            mode => 755,
            content => template("restrictshell/ldap-sshkey2file.py"),
            require => Package['python-ldap']
        }
        cron { 'sshkey2file':
            command => $sshkey2file,
            hour => "*",
            minute => "*/10",
            user => root,
            environment => "MAILTO=root",
	    require => File[$sshkey2file],
        }
    } 
}