summaryrefslogtreecommitdiffstats
path: root/zarb-ml/mageia-sysadm/attachments/20101122/0d8af62e/attachment-0001.html
diff options
context:
space:
mode:
Diffstat (limited to 'zarb-ml/mageia-sysadm/attachments/20101122/0d8af62e/attachment-0001.html')
-rw-r--r--zarb-ml/mageia-sysadm/attachments/20101122/0d8af62e/attachment-0001.html405
1 files changed, 405 insertions, 0 deletions
diff --git a/zarb-ml/mageia-sysadm/attachments/20101122/0d8af62e/attachment-0001.html b/zarb-ml/mageia-sysadm/attachments/20101122/0d8af62e/attachment-0001.html
new file mode 100644
index 000000000..ddf9b0c9f
--- /dev/null
+++ b/zarb-ml/mageia-sysadm/attachments/20101122/0d8af62e/attachment-0001.html
@@ -0,0 +1,405 @@
+<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.1//EN"
+"http://www.w3.org/TR/xhtml11/DTD/xhtml11.dtd">
+<html xmlns="http://www.w3.org/1999/xhtml">
+<head><meta http-equiv="content-type" content="text/html; charset=utf-8" />
+<title>[367] really add ssh::auth</title>
+</head>
+<body>
+
+<style type="text/css"><!--
+#msg dl.meta { border: 1px #006 solid; background: #369; padding: 6px; color: #fff; }
+#msg dl.meta dt { float: left; width: 6em; font-weight: bold; }
+#msg dt:after { content:':';}
+#msg dl, #msg dt, #msg ul, #msg li, #header, #footer, #logmsg { font-family: verdana,arial,helvetica,sans-serif; font-size: 10pt; }
+#msg dl a { font-weight: bold}
+#msg dl a:link { color:#fc3; }
+#msg dl a:active { color:#ff0; }
+#msg dl a:visited { color:#cc6; }
+h3 { font-family: verdana,arial,helvetica,sans-serif; font-size: 10pt; font-weight: bold; }
+#msg pre { overflow: auto; background: #ffc; border: 1px #fa0 solid; padding: 6px; }
+#logmsg { background: #ffc; border: 1px #fa0 solid; padding: 1em 1em 0 1em; }
+#logmsg p, #logmsg pre, #logmsg blockquote { margin: 0 0 1em 0; }
+#logmsg p, #logmsg li, #logmsg dt, #logmsg dd { line-height: 14pt; }
+#logmsg h1, #logmsg h2, #logmsg h3, #logmsg h4, #logmsg h5, #logmsg h6 { margin: .5em 0; }
+#logmsg h1:first-child, #logmsg h2:first-child, #logmsg h3:first-child, #logmsg h4:first-child, #logmsg h5:first-child, #logmsg h6:first-child { margin-top: 0; }
+#logmsg ul, #logmsg ol { padding: 0; list-style-position: inside; margin: 0 0 0 1em; }
+#logmsg ul { text-indent: -1em; padding-left: 1em; }#logmsg ol { text-indent: -1.5em; padding-left: 1.5em; }
+#logmsg > ul, #logmsg > ol { margin: 0 0 1em 0; }
+#logmsg pre { background: #eee; padding: 1em; }
+#logmsg blockquote { border: 1px solid #fa0; border-left-width: 10px; padding: 1em 1em 0 1em; background: white;}
+#logmsg dl { margin: 0; }
+#logmsg dt { font-weight: bold; }
+#logmsg dd { margin: 0; padding: 0 0 0.5em 0; }
+#logmsg dd:before { content:'\00bb';}
+#logmsg table { border-spacing: 0px; border-collapse: collapse; border-top: 4px solid #fa0; border-bottom: 1px solid #fa0; background: #fff; }
+#logmsg table th { text-align: left; font-weight: normal; padding: 0.2em 0.5em; border-top: 1px dotted #fa0; }
+#logmsg table td { text-align: right; border-top: 1px dotted #fa0; padding: 0.2em 0.5em; }
+#logmsg table thead th { text-align: center; border-bottom: 1px solid #fa0; }
+#logmsg table th.Corner { text-align: left; }
+#logmsg hr { border: none 0; border-top: 2px dashed #fa0; height: 1px; }
+#header, #footer { color: #fff; background: #636; border: 1px #300 solid; padding: 6px; }
+#patch { width: 100%; }
+--></style>
+<div id="msg">
+<dl class="meta">
+<dt>Revision</dt> <dd>367</dd>
+<dt>Author</dt> <dd>blino</dd>
+<dt>Date</dt> <dd>2010-11-22 01:22:53 +0100 (Mon, 22 Nov 2010)</dd>
+</dl>
+
+<h3>Log Message</h3>
+<pre>really add ssh::auth</pre>
+
+<h3>Added Paths</h3>
+<ul>
+<li><a href="#puppetmodulesssh_authmanifestsinitpp">puppet/modules/ssh_auth/manifests/init.pp</a></li>
+</ul>
+
+</div>
+<div id="patch"><pre>
+<a id="puppetmodulesssh_authmanifestsinitpp">Added: puppet/modules/ssh_auth/manifests/init.pp</a>
+===================================================================
+--- puppet/modules/ssh_auth/manifests/init.pp (rev 0)
++++ puppet/modules/ssh_auth/manifests/init.pp 2010-11-22 00:22:53 UTC (rev 367)
+@@ -0,0 +1,336 @@
++# =========
++# ssh::auth
++# =========
++#
++# The latest official release and documentation for ssh::auth can always
++# be found at http://reductivelabs.com/trac/puppet/wiki/Recipes/ModuleSSHAuth .
++#
++# Version: 0.3.2
++# Release date: 2009-12-29
++
++class ssh::auth {
++
++$keymaster_storage = &quot;/var/lib/keys&quot;
++
++Exec { path =&gt; &quot;/usr/bin:/usr/sbin:/bin:/sbin&quot; }
++Notify { withpath =&gt; false }
++
++
++##########################################################################
++
++
++# ssh::auth::key
++
++# Declare keys. The approach here is just to define a bunch of
++# virtual resources, representing key files on the keymaster, client,
++# and server. The virtual keys are then realized by
++# ssh::auth::{keymaster,client,server}, respectively. The reason for
++# doing things that way is that it makes ssh::auth::key into a &quot;one
++# stop shop&quot; where users can declare their keys with all of their
++# parameters, whether those parameters apply to the keymaster, server,
++# or client. The real work of creating, installing, and removing keys
++# is done in the private definitions called by the virtual resources:
++# ssh_auth_key_{master,server,client}.
++
++define key ($ensure = &quot;present&quot;, $filename = &quot;&quot;, $force = false, $group = &quot;puppet&quot;, $home = &quot;&quot;, $keytype = &quot;rsa&quot;, $length = 2048, $maxdays = &quot;&quot;, $mindate = &quot;&quot;, $options = &quot;&quot;, $user = &quot;&quot;) {
++
++ ssh_auth_key_namecheck { &quot;${title}-title&quot;: parm =&gt; &quot;title&quot;, value =&gt; $title }
++
++ # apply defaults
++ $_filename = $filename ? { &quot;&quot; =&gt; &quot;id_${keytype}&quot;, default =&gt; $filename }
++ $_length = $keytype ? { &quot;rsa&quot; =&gt; $length, &quot;dsa&quot; =&gt; 1024 }
++ $_user = $user ? {
++ &quot;&quot; =&gt; regsubst($title, '^([^@]*)@?.*$', '\1'),
++ default =&gt; $user,
++ }
++ $_home = $home ? { &quot;&quot; =&gt; &quot;/home/$_user&quot;, default =&gt; $home }
++
++ ssh_auth_key_namecheck { &quot;${title}-filename&quot;: parm =&gt; &quot;filename&quot;, value =&gt; $_filename }
++
++ @ssh_auth_key_master { $title:
++ ensure =&gt; $ensure,
++ force =&gt; $force,
++ keytype =&gt; $keytype,
++ length =&gt; $_length,
++ maxdays =&gt; $maxdays,
++ mindate =&gt; $mindate,
++ }
++ @ssh_auth_key_client { $title:
++ ensure =&gt; $ensure,
++ filename =&gt; $_filename,
++ group =&gt; $group,
++ home =&gt; $_home,
++ user =&gt; $_user,
++ }
++ @ssh_auth_key_server { $title:
++ ensure =&gt; $ensure,
++ group =&gt; $group,
++ home =&gt; $_home,
++ options =&gt; $options,
++ user =&gt; $_user,
++ }
++}
++
++
++##########################################################################
++
++
++# ssh::auth::keymaster
++#
++# Keymaster host:
++# Create key storage; create, regenerate, and remove key pairs
++
++class keymaster {
++
++ # Set up key storage
++
++ file { $ssh::auth::keymaster_storage:
++ ensure =&gt; directory,
++ owner =&gt; puppet,
++ group =&gt; puppet,
++ mode =&gt; 644,
++ }
++
++ # Realize all virtual master keys
++ Ssh_auth_key_master &lt;| |&gt;
++
++} # class keymaster
++
++
++##########################################################################
++
++
++# ssh::auth::client
++#
++# Install generated key pairs onto clients
++
++define client ($ensure = &quot;&quot;, $filename = &quot;&quot;, $group = &quot;&quot;, $home = &quot;&quot;, $user = &quot;&quot;) {
++
++ # Realize the virtual client keys.
++ # Override the defaults set in ssh::auth::key, as needed.
++ if $ensure { Ssh_auth_key_client &lt;| title == $title |&gt; { ensure =&gt; $ensure } }
++ if $filename { Ssh_auth_key_client &lt;| title == $title |&gt; { filename =&gt; $filename } }
++ if $group { Ssh_auth_key_client &lt;| title == $title |&gt; { group =&gt; $group } }
++
++ if $user { Ssh_auth_key_client &lt;| title == $title |&gt; { user =&gt; $user, home =&gt; &quot;/home/$user&quot; } }
++ if $home { Ssh_auth_key_client &lt;| title == $title |&gt; { home =&gt; $home } }
++
++ realize Ssh_auth_key_client[$title]
++
++} # define client
++
++
++##########################################################################
++
++
++# ssh::auth::server
++#
++# Install public keys onto clients
++
++define server ($ensure = &quot;&quot;, $group = &quot;&quot;, $home = &quot;&quot;, $options = &quot;&quot;, $user = &quot;&quot;) {
++
++ # Realize the virtual server keys.
++ # Override the defaults set in ssh::auth::key, as needed.
++ if $ensure { Ssh_auth_key_server &lt;| title == $title |&gt; { ensure =&gt; $ensure } }
++ if $group { Ssh_auth_key_server &lt;| title == $title |&gt; { group =&gt; $group } }
++ if $options { Ssh_auth_key_server &lt;| title == $title |&gt; { options =&gt; $options } }
++
++ if $user { Ssh_auth_key_server &lt;| title == $title |&gt; { user =&gt; $user, home =&gt; &quot;/home/$user&quot; } }
++ if $home { Ssh_auth_key_server &lt;| title == $title |&gt; { home =&gt; $home } }
++
++ realize Ssh_auth_key_server[$title]
++
++} # define server
++
++} # class ssh::auth
++
++
++##########################################################################
++
++
++# ssh_auth_key_master
++#
++# Create/regenerate/remove a key pair on the keymaster.
++# This definition is private, i.e. it is not intended to be called directly by users.
++# ssh::auth::key calls it to create virtual keys, which are realized in ssh::auth::keymaster.
++
++define ssh_auth_key_master ($ensure, $force, $keytype, $length, $maxdays, $mindate) {
++
++ Exec { path =&gt; &quot;/usr/bin:/usr/sbin:/bin:/sbin&quot; }
++ File {
++ owner =&gt; puppet,
++ group =&gt; puppet,
++ mode =&gt; 600,
++ }
++
++ $keydir = &quot;${ssh::auth::keymaster_storage}/${title}&quot;
++ $keyfile = &quot;${keydir}/key&quot;
++
++ file {
++ &quot;$keydir&quot;:
++ ensure =&gt; directory,
++ mode =&gt; 644;
++ &quot;$keyfile&quot;:
++ ensure =&gt; $ensure;
++ &quot;${keyfile}.pub&quot;:
++ ensure =&gt; $ensure,
++ mode =&gt; 644;
++ }
++
++ if $ensure == &quot;present&quot; {
++
++ # Remove the existing key pair, if
++ # * $force is true, or
++ # * $maxdays or $mindate criteria aren't met, or
++ # * $keytype or $length have changed
++
++ $keycontent = file(&quot;${keyfile}.pub&quot;, &quot;/dev/null&quot;)
++ if $keycontent {
++
++ if $force {
++ $reason = &quot;force=true&quot;
++ }
++ if !$reason and $mindate and generate(&quot;/usr/bin/find&quot;, $keyfile, &quot;!&quot;, &quot;-newermt&quot;, &quot;${mindate}&quot;) {
++ $reason = &quot;created before ${mindate}&quot;
++ }
++ if !$reason and $maxdays and generate(&quot;/usr/bin/find&quot;, $keyfile, &quot;-mtime&quot;, &quot;+${maxdays}&quot;) {
++ $reason = &quot;older than ${maxdays} days&quot;
++ }
++ if !$reason and $keycontent =~ /^ssh-... [^ ]+ (...) (\d+)$/ {
++ if $keytype != $1 { $reason = &quot;keytype changed: $1 -&gt; $keytype&quot; }
++ else { if $length != $2 { $reason = &quot;length changed: $2 -&gt; $length&quot; } }
++ }
++ if $reason {
++ exec { &quot;Revoke previous key ${title}: ${reason}&quot;:
++ command =&gt; &quot;rm $keyfile ${keyfile}.pub&quot;,
++ before =&gt; Exec[&quot;Create key $title: $keytype, $length bits&quot;],
++ }
++ }
++ }
++
++ # Create the key pair.
++ # We &quot;repurpose&quot; the comment field in public keys on the keymaster to
++ # store data about the key, i.e. $keytype and $length. This avoids
++ # having to rerun ssh-keygen -l on every key at every run to determine
++ # the key length.
++ exec { &quot;Create key $title: $keytype, $length bits&quot;:
++ command =&gt; &quot;ssh-keygen -t ${keytype} -b ${length} -f ${keyfile} -C \&quot;${keytype} ${length}\&quot; -N \&quot;\&quot;&quot;,
++ user =&gt; &quot;puppet&quot;,
++ group =&gt; &quot;puppet&quot;,
++ creates =&gt; $keyfile,
++ require =&gt; File[$keydir],
++ before =&gt; File[$keyfile, &quot;${keyfile}.pub&quot;],
++ }
++
++ } # if $ensure == &quot;present&quot;
++
++} # define ssh_auth_key_master
++
++
++##########################################################################
++
++
++# ssh_auth_key_client
++#
++# Install a key pair into a user's account.
++# This definition is private, i.e. it is not intended to be called directly by users.
++
++define ssh_auth_key_client ($ensure, $filename, $group, $home, $user) {
++
++ File {
++ owner =&gt; $user,
++ group =&gt; $group,
++ mode =&gt; 600,
++ require =&gt; [ User[$user], File[$home]],
++ }
++
++ $key_src_file = &quot;${ssh::auth::keymaster_storage}/${title}/key&quot; # on the keymaster
++ $key_tgt_file = &quot;${home}/.ssh/${filename}&quot; # on the client
++
++ $key_src_content_pub = file(&quot;${key_src_file}.pub&quot;, &quot;/dev/null&quot;)
++ if $ensure == &quot;absent&quot; or $key_src_content_pub =~ /^(ssh-...) ([^ ]+)/ {
++ $keytype = $1
++ $modulus = $2
++ file {
++ $key_tgt_file:
++ ensure =&gt; $ensure,
++ content =&gt; file($key_src_file, &quot;/dev/null&quot;);
++ &quot;${key_tgt_file}.pub&quot;:
++ ensure =&gt; $ensure,
++ content =&gt; &quot;$keytype $modulus $title\n&quot;,
++ mode =&gt; 644;
++ }
++ } else {
++ notify { &quot;Private key file $key_src_file for key $title not found on keymaster; skipping ensure =&gt; present&quot;: }
++ }
++
++} # define ssh_auth_key_client
++
++
++##########################################################################
++
++
++# ssh_auth_key_server
++#
++# Install a public key into a server user's authorized_keys(5) file.
++# This definition is private, i.e. it is not intended to be called directly by users.
++
++define ssh_auth_key_server ($ensure, $group, $home, $options, $user) {
++
++ # on the keymaster:
++ $key_src_dir = &quot;${ssh::auth::keymaster_storage}/${title}&quot;
++ $key_src_file = &quot;${key_src_dir}/key.pub&quot;
++ # on the server:
++ $key_tgt_file = &quot;${home}/.ssh/authorized_keys&quot;
++
++ File {
++ owner =&gt; $user,
++ group =&gt; $group,
++ require =&gt; User[$user],
++ mode =&gt; 600,
++ }
++ Ssh_authorized_key {
++ user =&gt; $user,
++ target =&gt; $key_tgt_file,
++ }
++
++ if $ensure == &quot;absent&quot; {
++ ssh_authorized_key { $title: ensure =&gt; &quot;absent&quot; }
++ }
++ else {
++ $key_src_content = file($key_src_file, &quot;/dev/null&quot;)
++ if ! $key_src_content {
++ notify { &quot;Public key file $key_src_file for key $title not found on keymaster; skipping ensure =&gt; present&quot;: }
++ } else { if $ensure == &quot;present&quot; and $key_src_content !~ /^(ssh-...) ([^ ]*)/ {
++ err(&quot;Can't parse public key file $key_src_file&quot;)
++ notify { &quot;Can't parse public key file $key_src_file for key $title on the keymaster: skipping ensure =&gt; $ensure&quot;: }
++ } else {
++ $keytype = $1
++ $modulus = $2
++ ssh_authorized_key { $title:
++ ensure =&gt; &quot;present&quot;,
++ type =&gt; $keytype,
++ key =&gt; $modulus,
++ options =&gt; $options ? { &quot;&quot; =&gt; undef, default =&gt; $options },
++ }
++ }} # if ... else ... else
++ } # if ... else
++
++} # define ssh_auth_key_server
++
++
++##########################################################################
++
++
++# ssh_auth_key_namecheck
++#
++# Check a name (e.g. key title or filename) for the allowed form
++
++define ssh_auth_key_namecheck ($parm, $value) {
++ if $value !~ /^[A-Za-z0-9]/ {
++ fail(&quot;ssh::auth::key: $parm '$value' not allowed: must begin with a letter or digit&quot;)
++ }
++ if $value !~ /^[A-Za-z0-9_.:@-]+$/ {
++ fail(&quot;ssh::auth::key: $parm '$value' not allowed: may only contain the characters A-Za-z0-9_.:@-&quot;)
++ }
++} # define namecheck
+
+</pre></div>
+
+</body>
+</html> \ No newline at end of file