X-Git-Url: https://git.donarmstrong.com/?a=blobdiff_plain;f=modules%2Fssh%2Fmanifests%2Finit.pp;h=b7df1810203409f994266e2cc64ab71fdf33931d;hb=3eb533e5499e66423bafdedaf6c7d08ead1772de;hp=271c8bdff6155c00a448f453ca4dbae244e52129;hpb=70a9bda9ef6e5fa2cebded47c59a11a2592c5511;p=dsa-puppet.git diff --git a/modules/ssh/manifests/init.pp b/modules/ssh/manifests/init.pp index 271c8bdf..b7df1810 100644 --- a/modules/ssh/manifests/init.pp +++ b/modules/ssh/manifests/init.pp @@ -1,46 +1,38 @@ class ssh { - package { - openssh-client: ensure => installed; - openssh-server: ensure => installed; - } - file { "/etc/ssh/ssh_config": - source => [ "puppet:///modules/ssh/ssh_config" ], - require => Package["openssh-client"] - ; - "/etc/ssh/sshd_config": - content => template("ssh/sshd_config.erb"), - require => Package["openssh-server"], - notify => Exec["ssh restart"] - ; - "/etc/ssh/userkeys": - ensure => directory, - owner => root, - group => root, - mode => 755, - ; - "/etc/ssh/userkeys/root": - content => template("ssh/authorized_keys.erb"), - mode => 444, - require => Package["openssh-server"] - ; + package { [ 'openssh-client', 'openssh-server']: + ensure => installed + } + + service { 'ssh': + ensure => running } - exec { "ssh restart": - path => "/etc/init.d:/usr/bin:/usr/sbin:/bin:/sbin", - refreshonly => true, - } + @ferm::rule { 'dsa-ssh': + description => 'Allow SSH from DSA', + rule => '&SERVICE_RANGE(tcp, ssh, \$SSH_SOURCES)' + } + @ferm::rule { 'dsa-ssh-v6': + description => 'Allow SSH from DSA', + domain => 'ip6', + rule => '&SERVICE_RANGE(tcp, ssh, \$SSH_V6_SOURCES)' + } - @ferm::rule { "dsa-ssh": - description => "Allow SSH from DSA", - rule => "&SERVICE_RANGE(tcp, ssh, \$SSH_SOURCES)" - } - @ferm::rule { "dsa-ssh-v6": - description => "Allow SSH from DSA", - domain => "ip6", - rule => "&SERVICE_RANGE(tcp, ssh, \$SSH_V6_SOURCES)" - } + file { '/etc/ssh/ssh_config': + content => template('ssh/ssh_config.erb'), + require => Package['openssh-client'] + } + file { '/etc/ssh/sshd_config': + content => template('ssh/sshd_config.erb'), + require => Package['openssh-server'], + notify => Service['ssh'] + } + file { '/etc/ssh/userkeys': + ensure => directory, + mode => '0755', + require => Package['openssh-server'] + } + file { '/etc/ssh/userkeys/root': + content => template('ssh/authorized_keys.erb'), + } } -# vim:set et: -# vim:set sts=4 ts=4: -# vim:set shiftwidth=4: