X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=modules%2Fstunnel4%2Fmanifests%2Finit.pp;h=d76684671b1b7a87ecd0f8c7c66efdf112b67e56;hb=0a02f36748e254e39c4c21446ebc58a354cf780e;hp=36b5ce06ff949933572c432bcb53ed9ed615a148;hpb=3b9bedfb9c7e5cd42e2d198b8dbd7a8649a3608d;p=mirror%2Fdsa-puppet.git diff --git a/modules/stunnel4/manifests/init.pp b/modules/stunnel4/manifests/init.pp index 36b5ce06f..d76684671 100644 --- a/modules/stunnel4/manifests/init.pp +++ b/modules/stunnel4/manifests/init.pp @@ -1,10 +1,47 @@ class stunnel4 { define stunnel_generic($client, $verify, $cafile, $crlfile=false, $accept, $connect, $local=false) { file { + "/etc/stunnel": + ensure => directory, + owner => root, + group => root, + mode => 755, + ; "/etc/stunnel/puppet-${name}.conf": content => template("stunnel4/stunnel.conf.erb"), - notify => Exec['restart_stunnel'], + notify => Exec["restart_stunnel_${name}"], ; + "/etc/init.d/stunnel4": + source => "puppet:///modules/stunnel4/etc-init.d-stunnel4", + mode => 555, + ; + } + + case $client { + true: { + $certfile = "/etc/ssl/debian/certs/thishost.crt" + $keyfile = "/etc/ssl/debian/keys/thishost.key" + } + default: { + $certfile = "/etc/exim4/ssl/thishost.crt" + $keyfile = "/etc/exim4/ssl/thishost.key" + } + } + + exec { + "restart_stunnel_${name}": + command => "true && cd / && env -i /etc/init.d/stunnel4 restart puppet-${name}", + require => [ File['/etc/stunnel/stunnel.conf'], + File['/etc/init.d/stunnel4'], + Exec['enable_stunnel4'], + Exec['kill_file_override'], + Package['stunnel4'] + ], + subscribe => [ File[$certfile], + File[$keyfile] + ], + refreshonly => true, + ; } } @@ -29,8 +66,12 @@ class stunnel4 { @ferm::rule { "stunnel-${name}": description => "stunnel ${name}", - rule => "&TCP_UDP_SERVICE(${accept})", - domain => "(ip ip6)", + rule => "&SERVICE_RANGE(tcp, ${accept}, \$HOST_DEBIAN_V4)", + ; + "stunnel-${name}-v6": + domain => 'ip6', + description => "stunnel ${name}", + rule => "&SERVICE_RANGE(tcp, ${accept}, \$HOST_DEBIAN_V6)", ; } } @@ -40,7 +81,7 @@ class stunnel4 { # source => "puppet:///modules/exim/certs/${connecthost}.crt", content => generate("/bin/cat", "/etc/puppet/modules/exim/files/certs/${connecthost}.crt", "/etc/puppet/modules/exim/files/certs/ca.crt"), - notify => Exec['restart_stunnel'], + notify => Exec["restart_stunnel_${name}"], ; } stunnel_generic { @@ -50,7 +91,6 @@ class stunnel4 { cafile => "/etc/stunnel/puppet-${name}-peer.pem", accept => "${accept}", connect => "${connecthost}:${connectport}", - require => [ File["/etc/stunnel/puppet-${name}-peer.pem"] ], ; } } @@ -63,6 +103,7 @@ class stunnel4 { file { "/etc/stunnel/stunnel.conf": ensure => absent, + require => [ Package['stunnel4'] ], ; } @@ -72,10 +113,10 @@ class stunnel4 { unless => "grep -q '^ENABLED=1' /etc/default/stunnel4", require => [ Package['stunnel4'] ], ; - "restart_stunnel": - command => "true && cd / && env -i /etc/init.d/stunnel4 restart", - require => [ File['/etc/stunnel/stunnel.conf'], Exec['enable_stunnel4'], Package['stunnel4'] ], - refreshonly => true, + "kill_file_override": + command => "sed -i -e 's/^FILES=/#&/' /etc/default/stunnel4", + onlyif => "grep -q '^FILES=' /etc/default/stunnel4", + require => [ Package['stunnel4'] ], ; } }