1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
|
class ssl {
file { [ "/etc/ssl", "/etc/ssl/certs", "/etc/ssl/private" ]:
ensure => directory,
owner => "root",
group => "root",
}
file { "/usr/local/bin/ssl-cert-check":
ensure => present,
owner => "root",
group => "root",
mode => 755,
source => "puppet://$server/modules/ssl/ssl-cert-check",
}
define cert($ensure = present, $owner = 'root', $group = 'root',
$pubmode = '644', $privmode = '600', $base = '/etc/ssl',
$private = true) {
file { "${base}/certs/$name.crt":
ensure => $ensure,
owner => $owner,
group => $group,
mode => $pubmode,
source => "puppet:///modules/site_keys/ssl/$name.crt",
require => File["${base}/certs"],
}
if ($private == true) {
file { "${base}/private/$name.pem":
ensure => $ensure,
owner => $owner,
group => $group,
mode => $privmode,
backup => false, # Do not backup the private key
source => "puppet:///modules/site_keys/ssl/$name.pem",
require => File["${base}/private"],
}
}
}
define check($port = '443', $interval = '60', $email = 'root',
$hour = '0', $minute = '0', $weekday = '0',
$file = false, $ensure = present, $base = '/etc/ssl') {
$ssl_cert_check = "/usr/local/bin/ssl-cert-check -a -q -x ${interval} -e ${email}"
$command = $file ? {
false => "$ssl_cert_check -s ${name} -p ${port}",
true => "$ssl_cert_check -c ${base}/certs/cert.crt",
default => "$ssl_cert_check -c ${file}",
}
cron { "ssl-cert-check-${name}":
command => $command,
user => root,
hour => $hour,
minute => $minute,
weekday => $weekday,
ensure => $ensure,
require => File["/usr/local/bin/ssl-cert-check"],
}
}
}
|