- 'debian-admin@debian.org'
paths:
letsencrypt_dir: '/srv/puppet.debian.org/from-letsencrypt'
+ auto_certs_dir: '/srv/puppet.debian.org/ca/RESULT/certs'
+ auto_clientcerts_dir: '/srv/puppet.debian.org/ca/RESULT/clientcerts'
roles:
bugsmx:
- buxtehude.debian.org
domain => 'ip6',
rule => "&SERVICE_RANGE(tcp, $mail_port, \$SMTP_V6_SOURCES)"
}
+ $autocertdir = hiera('paths.auto_certs_dir')
dnsextras::tlsa_record{ 'tlsa-mailport':
zone => 'debian.org',
- certfile => "/etc/puppet/modules/ssl/files/auto-certs/${::fqdn}.crt",
+ certfile => "${autocertdir}/${::fqdn}.crt",
port => $mail_port,
hostname => $::fqdn,
}
source => 'puppet:///modules/exim/common/logrotate-exim4-paniclog'
}
file { '/etc/exim4/ssl/thishost.crt':
- source => "puppet:///modules/ssl/auto-certs/${::fqdn}.crt",
+ content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/" + @fqdn + ".crt") %>'),
group => 'Debian-exim',
mode => '0640',
}
file { '/etc/exim4/ssl/thishost.key':
- source => "puppet:///modules/ssl/auto-certs/${::fqdn}.key",
+ content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/" + @fqdn + ".key") %>'),
group => 'Debian-exim',
mode => '0640',
}
file { '/etc/exim4/ssl/ca.crt':
- source => 'puppet:///modules/ssl/auto-certs/ca.crt',
+ content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/ca.crt") %>'),
group => 'Debian-exim',
mode => '0640',
}
file { '/etc/exim4/ssl/ca.crl':
- source => 'puppet:///modules/ssl/auto-certs/ca.crl',
+ content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/ca.crl") %>'),
group => 'Debian-exim',
mode => '0640',
}
domain => 'ip6',
rule => '&SERVICE_RANGE(tcp, submission, $SMTP_V6_SOURCES)',
}
+ $autocertdir = hiera('paths.auto_certs_dir')
dnsextras::tlsa_record{ "tlsa-submission":
zone => 'debian.org',
- certfile => "/etc/puppet/modules/ssl/files/auto-certs/${::fqdn}.crt",
+ certfile => "${autocertdir}/${::fqdn}.crt",
port => 587,
hostname => "$::fqdn",
}
mode => '0755',
}
file { '/etc/ssl/debian/certs/thishost.crt':
- source => "puppet:///modules/ssl/auto-clientcerts/${::fqdn}.client.crt",
+ content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_clientcerts_dir"]) + "/" + @fqdn + "client.crt") %>'),
notify => Exec['refresh_debian_hashes'],
}
file { '/etc/ssl/debian/certs/ca.crt':
- source => 'puppet:///modules/ssl/auto-clientcerts/ca.crt',
+ content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_clientcerts_dir"]) + "/ca.crt") %>'),
notify => Exec['refresh_debian_hashes'],
}
file { '/etc/ssl/debian/crls/ca.crl':
- source => 'puppet:///modules/ssl/auto-clientcerts/ca.crl',
+ content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_clientcerts_dir"]) + "/ca.crl") %>'),
}
file { '/etc/ssl/debian/certs/thishost-server.crt':
- source => "puppet:///modules/ssl/auto-certs/${::fqdn}.crt",
+ content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/" + @fqdn + ".crt") %>'),
notify => Exec['refresh_debian_hashes'],
}
force => true,
}
file { '/etc/ssl/private/thishost.key':
- source => "puppet:///modules/ssl/auto-clientcerts/${::fqdn}.key",
+ content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_clientcerts_dir"]) + "/" + @fqdn + ".key") %>'),
mode => '0440',
group => ssl-cert,
require => Package['ssl-cert'],
}
file { '/etc/ssl/private/thishost-server.key':
- source => "puppet:///modules/ssl/auto-certs/${::fqdn}.key",
+ content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/" + @fqdn + ".key") %>'),
mode => '0440',
group => ssl-cert,
require => Package['ssl-cert'],
include stunnel4
file { "/etc/stunnel/puppet-${name}-peer.pem":
- content => generate('/bin/cat', "/etc/puppet/modules/ssl/files/auto-certs/${connecthost}.crt",
- '/etc/puppet/modules/ssl/files/auto-certs/ca.crt'),
+ content => inline_template( @("EOF"),
+ <%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/" + @connecthost + ".crt") %>
+ <%= File.read(scope().call_function("hiera", ["paths.auto_certs_dir"]) + "/ca.crt") %>
+ | EOF
+ ),
notify => Exec["restart_stunnel_${name}"],
}