X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=modules%2Fssl%2Fmanifests%2Fservice.pp;h=f01a75c5ed86249efe50786b4a81d11ed32f2a97;hb=0e375233af569acc80ddd55b3e0b4d522eabb04c;hp=133c9b4ee136499490fc4c77484b93c3765db2b7;hpb=806b9885875cb9a589ad8f54df0114b12a8e1d4f;p=mirror%2Fdsa-puppet.git diff --git a/modules/ssl/manifests/service.pp b/modules/ssl/manifests/service.pp index 133c9b4ee..f01a75c5e 100644 --- a/modules/ssl/manifests/service.pp +++ b/modules/ssl/manifests/service.pp @@ -1,27 +1,57 @@ -define ssl::service($ensure = present, $tlsaport = 443) { - $link_target = $ensure ? { - present => link, - absent => absent, - default => fail ( "Unknown ensure value: '$ensure'" ), - } +define ssl::service($ensure = present, $tlsaport = 443, $notify = [], $key = false) { + $tlsaports = any2array($tlsaport) - file { "/etc/munin/plugins/${name}": - ensure => $link_target, - target => "/usr/share/munin/plugins/${link}", - require => Package['munin-node'], - notify => Service['munin-node'], + if ($ensure == "ifstatic") { + $ssl_ensure = has_static_component($name) ? { + true => "present", + false => "absent" + } + } else { + $ssl_ensure = $ensure } file { "/etc/ssl/debian/certs/$name.crt": - source => "puppet:///modules/ssl/servicecerts/${name}.crt", - notify => Exec['c_rehash /etc/ssl/debian/certs'], + ensure => $ssl_ensure, + source => [ "puppet:///modules/ssl/servicecerts/${name}.crt", "puppet:///modules/ssl/from-letsencrypt/${name}.crt" ], + notify => [ Exec['refresh_debian_hashes'], $notify ], + } + file { "/etc/ssl/debian/certs/$name.crt-chain": + ensure => $ssl_ensure, + source => [ "puppet:///modules/ssl/chains/${name}.crt", "puppet:///modules/ssl/servicecerts/${name}.crt", "puppet:///modules/ssl/from-letsencrypt/${name}.crt-chain" ], + notify => [ $notify ], + links => follow, + } + file { "/etc/ssl/debian/certs/$name.crt-chained": + ensure => $ssl_ensure, + content => template('ssl/chained.erb'), + notify => [ $notify ], + } + if $key { + file { "/etc/ssl/private/$name.key": + ensure => $ssl_ensure, + mode => '0440', + group => 'ssl-cert', + source => [ "puppet:///modules/ssl/keys/${name}.crt", "puppet:///modules/ssl/from-letsencrypt/${name}.key" ], + notify => [ $notify ], + links => follow, + } + + file { "/etc/ssl/private/$name.key-certchain": + ensure => $ssl_ensure, + mode => '0440', + group => 'ssl-cert', + content => template('ssl/key-chained.erb'), + notify => [ $notify ], + links => follow, + } } - if $tlsaport > 0 { - dnsextras::tlsa_record{ "tlsa-${tlsaport}": - zone => 'debian.org', - certfile => "/etc/puppet/modules/ssl/files/servicecerts/${name}.crt", - port => $tlsaport, + if (size($tlsaports) > 0 and $ssl_ensure == "present") { + $portlist = join($tlsaports, "-") + dnsextras::tlsa_record{ "tlsa-${name}-${portlist}": + zone => 'debian.org', + certfile => [ "/etc/puppet/modules/ssl/files/servicecerts/${name}.crt", "/etc/puppet/modules/ssl/files/from-letsencrypt/${name}.crt" ], + port => $tlsaport, hostname => "$name", } }