X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=modules%2Fssh%2Fmanifests%2Finit.pp;h=df986bc236ac9c0544ccbcb97a652f0d8c465396;hb=f8b10b0e0516ad8e0e0f2cf1ed7ab9fb73922b97;hp=75fb47597466e4c181b174559659154067eb0d98;hpb=0d5176e1034bd04ce9c76d790caa819f8b8d5341;p=mirror%2Fdsa-puppet.git diff --git a/modules/ssh/manifests/init.pp b/modules/ssh/manifests/init.pp index 75fb47597..df986bc23 100644 --- a/modules/ssh/manifests/init.pp +++ b/modules/ssh/manifests/init.pp @@ -1,16 +1,67 @@ -class ssh { - package { - openssh-client: ensure => installed; - openssh-server: ensure => installed; - } +# @param extraports Addresses/ports to listen on, in addition to 22 +class ssh ( + Array[String] $extraports = [], +) { + package { [ 'openssh-client', 'openssh-server']: + ensure => installed + } - file { "/etc/ssh/ssh_config": - source => [ "puppet:///ssh/ssh_config" ], - require => Package["openssh-client"] - ; - "/etc/ssh/sshd_config": - content => template("ssh/sshd_config.erb"), - require => Package["openssh-server"] - ; - } + service { 'ssh': + ensure => running, + require => Package['openssh-server'] + } + + ferm::rule::simple { 'dsa-ssh': + description => 'check ssh access', + port => 'ssh', + target => 'ssh', + } + ferm::rule { 'dsa-ssh-sources': + description => 'Allow SSH from DSA', + domain => '(ip ip6)', + chain => 'ssh', + rule => 'saddr ($SSH_SOURCES) ACCEPT' + } + Ferm::Rule::Simple <<| tag == 'ssh::server::from::nagios' |>> + + file { '/etc/ssh/ssh_config': + content => template('ssh/ssh_config.erb'), + require => Package['openssh-client'] + } + file { '/etc/ssh/sshd_config': + content => template('ssh/sshd_config.erb'), + require => Package['openssh-server'], + notify => Service['ssh'] + } + file { '/etc/ssh/userkeys': + ensure => directory, + mode => '0755', + require => Package['openssh-server'] + } + file { '/etc/ssh/puppetkeys': + ensure => directory, + mode => '0755', + purge => true, + recurse => true, + force => true, + source => 'puppet:///files/empty/', + require => Package['openssh-server'] + } + file { '/etc/ssh/userkeys/root': + content => template('ssh/authorized_keys.erb'), + } + + if (versioncmp($::lsbmajdistrelease, '8') >= 0) { + if ! $facts['has_etc_ssh_ssh_host_ed25519_key'] { + exec { 'create-ed25519-host-key': + command => 'ssh-keygen -f /etc/ssh/ssh_host_ed25519_key -q -P "" -t ed25519', + } + } + + if $facts['systemd'] { + package { [ 'libpam-systemd' ]: + ensure => installed + } + } + } }