From f7eae20be1b64c3688676bac3db082e43a0823cb Mon Sep 17 00:00:00 2001 From: Peter Palfrader Date: Sun, 22 Sep 2019 18:40:23 +0200 Subject: [PATCH] whitespace change --- modules/ssh/manifests/init.pp | 110 +++++++++++++++++----------------- 1 file changed, 55 insertions(+), 55 deletions(-) diff --git a/modules/ssh/manifests/init.pp b/modules/ssh/manifests/init.pp index 566a3f127..43d89df01 100644 --- a/modules/ssh/manifests/init.pp +++ b/modules/ssh/manifests/init.pp @@ -1,62 +1,62 @@ class ssh { - package { [ 'openssh-client', 'openssh-server']: - ensure => installed - } + package { [ 'openssh-client', 'openssh-server']: + ensure => installed + } - service { 'ssh': - ensure => running, - require => Package['openssh-server'] - } + service { 'ssh': + ensure => running, + require => Package['openssh-server'] + } - ferm::rule::simple { 'dsa-ssh': - description => 'check ssh access', - port => 'ssh', - target => 'ssh', - } - ferm::rule { 'dsa-ssh-sources': - description => 'Allow SSH from DSA', - chain => 'ssh', - rule => 'saddr ($SSH_SOURCES) ACCEPT' - } + ferm::rule::simple { 'dsa-ssh': + description => 'check ssh access', + port => 'ssh', + target => 'ssh', + } + ferm::rule { 'dsa-ssh-sources': + description => 'Allow SSH from DSA', + chain => 'ssh', + rule => 'saddr ($SSH_SOURCES) ACCEPT' + } - file { '/etc/ssh/ssh_config': - content => template('ssh/ssh_config.erb'), - require => Package['openssh-client'] - } - file { '/etc/ssh/sshd_config': - content => template('ssh/sshd_config.erb'), - require => Package['openssh-server'], - notify => Service['ssh'] - } - file { '/etc/ssh/userkeys': - ensure => directory, - mode => '0755', - require => Package['openssh-server'] - } - file { '/etc/ssh/puppetkeys': - ensure => directory, - mode => '0755', - purge => true, - recurse => true, - force => true, - source => 'puppet:///files/empty/', - require => Package['openssh-server'] - } - file { '/etc/ssh/userkeys/root': - content => template('ssh/authorized_keys.erb'), - } + file { '/etc/ssh/ssh_config': + content => template('ssh/ssh_config.erb'), + require => Package['openssh-client'] + } + file { '/etc/ssh/sshd_config': + content => template('ssh/sshd_config.erb'), + require => Package['openssh-server'], + notify => Service['ssh'] + } + file { '/etc/ssh/userkeys': + ensure => directory, + mode => '0755', + require => Package['openssh-server'] + } + file { '/etc/ssh/puppetkeys': + ensure => directory, + mode => '0755', + purge => true, + recurse => true, + force => true, + source => 'puppet:///files/empty/', + require => Package['openssh-server'] + } + file { '/etc/ssh/userkeys/root': + content => template('ssh/authorized_keys.erb'), + } - if (versioncmp($::lsbmajdistrelease, '8') >= 0) { - if ! $has_etc_ssh_ssh_host_ed25519_key { - exec { 'create-ed25519-host-key': - command => 'ssh-keygen -f /etc/ssh/ssh_host_ed25519_key -q -P "" -t ed25519', - } - } + if (versioncmp($::lsbmajdistrelease, '8') >= 0) { + if ! $has_etc_ssh_ssh_host_ed25519_key { + exec { 'create-ed25519-host-key': + command => 'ssh-keygen -f /etc/ssh/ssh_host_ed25519_key -q -P "" -t ed25519', + } + } - if $systemd { - package { [ 'libpam-systemd' ]: - ensure => installed - } - } - } + if $systemd { + package { [ 'libpam-systemd' ]: + ensure => installed + } + } + } } -- 2.20.1