whitespace change
authorPeter Palfrader <peter@palfrader.org>
Sun, 22 Sep 2019 16:40:23 +0000 (18:40 +0200)
committerPeter Palfrader <peter@palfrader.org>
Sun, 22 Sep 2019 16:41:59 +0000 (18:41 +0200)
modules/ssh/manifests/init.pp

index 566a3f1..43d89df 100644 (file)
@@ -1,62 +1,62 @@
 class ssh {
-       package { [ 'openssh-client', 'openssh-server']:
-               ensure => installed
-       }
+  package { [ 'openssh-client', 'openssh-server']:
+    ensure => installed
+  }
 
-       service { 'ssh':
-               ensure  => running,
-               require => Package['openssh-server']
-       }
+  service { 'ssh':
+    ensure  => running,
+    require => Package['openssh-server']
+  }
 
-       ferm::rule::simple { 'dsa-ssh':
-               description => 'check ssh access',
-               port        => 'ssh',
-               target      => 'ssh',
-       }
-       ferm::rule { 'dsa-ssh-sources':
-               description => 'Allow SSH from DSA',
-               chain       => 'ssh',
-               rule        => 'saddr ($SSH_SOURCES) ACCEPT'
-       }
+  ferm::rule::simple { 'dsa-ssh':
+    description => 'check ssh access',
+    port        => 'ssh',
+    target      => 'ssh',
+  }
+  ferm::rule { 'dsa-ssh-sources':
+    description => 'Allow SSH from DSA',
+    chain       => 'ssh',
+    rule        => 'saddr ($SSH_SOURCES) ACCEPT'
+  }
 
-       file { '/etc/ssh/ssh_config':
-               content => template('ssh/ssh_config.erb'),
-               require => Package['openssh-client']
-       }
-       file { '/etc/ssh/sshd_config':
-               content => template('ssh/sshd_config.erb'),
-               require => Package['openssh-server'],
-               notify  => Service['ssh']
-       }
-       file { '/etc/ssh/userkeys':
-               ensure  => directory,
-               mode    => '0755',
-               require => Package['openssh-server']
-       }
-       file { '/etc/ssh/puppetkeys':
-               ensure  => directory,
-               mode    => '0755',
-               purge   => true,
-               recurse => true,
-               force   => true,
-               source  => 'puppet:///files/empty/',
-               require => Package['openssh-server']
-       }
-       file { '/etc/ssh/userkeys/root':
-               content => template('ssh/authorized_keys.erb'),
-       }
+  file { '/etc/ssh/ssh_config':
+    content => template('ssh/ssh_config.erb'),
+    require => Package['openssh-client']
+  }
+  file { '/etc/ssh/sshd_config':
+    content => template('ssh/sshd_config.erb'),
+    require => Package['openssh-server'],
+    notify  => Service['ssh']
+  }
+  file { '/etc/ssh/userkeys':
+    ensure  => directory,
+    mode    => '0755',
+    require => Package['openssh-server']
+  }
+  file { '/etc/ssh/puppetkeys':
+    ensure  => directory,
+    mode    => '0755',
+    purge   => true,
+    recurse => true,
+    force   => true,
+    source  => 'puppet:///files/empty/',
+    require => Package['openssh-server']
+  }
+  file { '/etc/ssh/userkeys/root':
+    content => template('ssh/authorized_keys.erb'),
+  }
 
-       if (versioncmp($::lsbmajdistrelease, '8') >= 0) {
-               if ! $has_etc_ssh_ssh_host_ed25519_key {
-                       exec { 'create-ed25519-host-key':
-                               command => 'ssh-keygen -f /etc/ssh/ssh_host_ed25519_key -q -P "" -t ed25519',
-                       }
-               }
+  if (versioncmp($::lsbmajdistrelease, '8') >= 0) {
+    if ! $has_etc_ssh_ssh_host_ed25519_key {
+      exec { 'create-ed25519-host-key':
+        command => 'ssh-keygen -f /etc/ssh/ssh_host_ed25519_key -q -P "" -t ed25519',
+      }
+    }
 
-               if $systemd {
-                       package { [ 'libpam-systemd' ]:
-                               ensure => installed
-                       }
-               }
-       }
+    if $systemd {
+      package { [ 'libpam-systemd' ]:
+        ensure => installed
+      }
+    }
+  }
 }