1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
|
class openssh {
class server {
# some trick to manage sftp server, who is arch dependent on mdv
$path_to_sftp = "$lib_dir/ssh/"
package { "openssh-server":
ensure => installed
}
service { sshd:
ensure => running,
path => "/etc/init.d/sshd",
subscribe => [ Package["openssh-server"] ]
}
file { "/etc/ssh/sshd_config":
ensure => present,
owner => root,
group => root,
mode => 644,
require => Package["openssh-server"],
content => template("openssh/sshd_config"),
notify => Service["sshd"]
}
}
# root account authorized_keys will be symlinked
# if you want to add symlink on other accounts, use $symlink_users parameter
class ssh_keys_from_ldap($symlink_users = []) inherits server {
File ["/etc/ssh/sshd_config"] {
content => template("openssh/sshd_config","openssh/sshd_config_ldap")
}
package { 'python-ldap':
ensure => installed,
}
$pubkeys_directory = "/var/lib/pubkeys"
file { $pubkeys_directory:
ensure => directory,
owner => root,
group => root,
mode => 755,
# before => Class["openssh"]
}
file { "$pubkeys_directory/root":
ensure => directory,
owner => root,
group => root,
mode => 700,
}
file { "$pubkeys_directory/root/authorized_keys":
ensure => "/root/.ssh/authorized_keys",
mode => 700,
}
define symlink_user() {
file { "$pubkeys_directory/$name":
ensure => directory,
owner => $name,
group => $name,
mode => 700,
}
file { "$pubkeys_directory/$name/authorized_keys":
ensure => "~$name/.ssh/authorized_keys",
mode => 700,
}
}
symlink_user { $symlink_users: }
$sshkey2file = "/usr/local/bin/ldap-sshkey2file.py"
$ldap_pwfile = "/etc/ldap.secret"
file { $sshkey2file:
ensure => present,
owner => root,
group => root,
mode => 755,
content => template("restrictshell/ldap-sshkey2file.py"),
require => Package['python-ldap']
}
cron { 'sshkey2file':
command => $sshkey2file,
hour => "*",
minute => "*/10",
user => root,
environment => "MAILTO=root",
require => File[$sshkey2file],
}
}
}
|