aboutsummaryrefslogtreecommitdiff
path: root/manifests/init.pp
blob: c25e1f72b022afd0f76c48f4fff2028f0a728daa (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
# This module is distributed under the GNU Affero General Public License:
# 
# Monkeysphere module for puppet
# Copyright (C) 2009-2010 Sarava Group
# 
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License as
# published by the Free Software Foundation, either version 3 of the
# License, or any later version.
# 
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU Affero General Public License for more details.
# 
# You should have received a copy of the GNU Affero General Public License
# along with this program.  If not, see <http://www.gnu.org/licenses/>.

#
# Class for monkeysphere management
#

class monkeysphere inherits monkeysphere::defaults {
  # The needed packages
  package { monkeysphere: ensure => installed, }

  file { "monkeysphere_conf":
    path => "/etc/monkeysphere/monkeysphere.conf",
    mode => 644,
    ensure => present,
    content => template("monkeysphere/monkeysphere.conf.erb"),
  }
  file { "monkeysphere_host_conf":
    path => "/etc/monkeysphere/monkeysphere-host.conf",
    mode => 644,
    ensure => present,
    content => template("monkeysphere/monkeysphere-host.conf.erb"),
  }
  file { "monkeysphere_authentication_conf":
    path => "/etc/monkeysphere/monkeysphere-authentication.conf",
    mode => 644,
    ensure => present,
    content => template("monkeysphere/monkeysphere-authentication.conf.erb"),
  }
}

class monkeysphere::defaults {
  $keyserver = $monkeysphere_keyserver ? {
    '' => 'pool.sks-keyservers.net',
    default => $monkeysphere_keyserver
  }
}

define monkeysphere::import_key ( $scheme = 'ssh://', $port = '', $path = '/etc/ssh/ssh_host_rsa_key', $hostname = $fqdn ) {

  # if we're getting a port number, prefix with a colon so it's valid
  $prefixed_port = $port ? {
    '' => '',
    default => ":$port"
  }

  $key = "${scheme}${fqdn}${prefixed_port}"

  exec { "monkeysphere-host import-key $path $key":
    alias => "monkeysphere-import-key",
	  require => [ Package["monkeysphere"],  File["monkeysphere_host_conf"] ],
	  unless => "/usr/sbin/monkeysphere-host s | grep $key > /dev/null"
  }
}

# Server host key publication
define monkeysphere::publish_keys ( $keyid = '--all' ) { 
  exec { "monkeysphere-host publish-keys $keyid":
    environment => "MONKEYSPHERE_PROMPT=false",
	  require => [ Package["monkeysphere"], Exec["monkeysphere-import-key"], File["monkeysphere_host_conf"] ],
  }
}

# optionally, mail key somehwere 
define monkeysphere::email_keys ( $email = 'root'  ) { 
  exec { "mail -s 'monkeysphere host pgp keys for $fqdn' $email < /var/lib/monkeysphere/host_keys.pub.pgp":
	  require => [ Package["monkeysphere"], Exec["monkeysphere-import-key"] ],
  }
}

# add certifiers
define monkeysphere::add_id_certifier( $keyid ) {
  exec { "monkeysphere-authentication add-id-certifier $keyid":
	  environment => "MONKEYSPHERE_PROMPT=false",
	  require => [ Package["monkeysphere"], File["monkeysphere_authentication_conf"] ],
	  unless => "/usr/sbin/monkeysphere-authentication list-id-certifiers | grep $keyid > /dev/null"
  }
}

define monkeysphere::authorized_user_ids( $source,  $dest_dir = '/root/.monkeysphere', $dest_file = '.authorized_user_ids', $group = '') {
  $user = $title
  $calculated_group = $group ? {
    '' => $user,
    default => $group
  }

  file {
    $dest_dir:
      owner => $user,
      group => $calculated_group,
      mode => 755,
      ensure => directory,
  }
  file {
    "${dest_dir}/${dest_file}":
      owner => $user,
      group => $calculated_group,
      mode => 644,
      source => $source,
      ensure => present,
      recurse => true,
  }

  exec { "monkeysphere-authentication update-users $user":
    refreshonly => true,
    require => [ File["monkeysphere_authentication_conf"], Package["monkeysphere"] ],
    subscribe => File["${dest_dir}/${dest_file}"] 
  }
}