Andrew Tomaka
29748842a7
By declaring the directory copy with recurse set to true, there is no longer a need to manage every single individual file in the directory. This might (almost certainly?) have consequences when files are removed from the repository, but that's not really a concern in this specific scenario.
172 lines
4 KiB
Puppet
172 lines
4 KiB
Puppet
# GROUPS
|
|
group { 'web':
|
|
ensure => present,
|
|
}
|
|
|
|
# USERS
|
|
# atomaka, with SSH key
|
|
user { 'atomaka':
|
|
ensure => present,
|
|
groups => ['sudo', 'web', 'maverick', 'iceman'],
|
|
managehome => true,
|
|
shell => '/bin/zsh',
|
|
require => [
|
|
Package['zsh'],
|
|
Group['web'],
|
|
User['maverick'],
|
|
User['iceman'],
|
|
],
|
|
}
|
|
file { '/home/atomaka/.ssh':
|
|
ensure => directory,
|
|
owner => 'atomaka',
|
|
group => 'atomaka',
|
|
mode => '0700',
|
|
require => User['atomaka'],
|
|
}
|
|
file { '/home/atomaka/.ssh/authorized_keys':
|
|
ensure => present,
|
|
owner => 'atomaka',
|
|
group => 'atomaka',
|
|
mode => '0600',
|
|
content => file('/tmp/puppet/files/keys/atomaka'),
|
|
require => File['/home/atomaka/.ssh'],
|
|
}
|
|
# jeff, with password
|
|
user { 'jeff':
|
|
ensure => present,
|
|
groups => ['web'],
|
|
managehome => true,
|
|
shell => '/bin/bash',
|
|
password => '$6$.AURF9sE09Q$..S10CFY7G.AVXzSW//w6GoV6yPzBzdvyUl8a7oyYbW/XzBU.o6AdHxTgTkCSWb64zmN3QoKovoUyLJhE/MFP/',
|
|
require => Group['web'],
|
|
}
|
|
#maverick and iceman, no login
|
|
user { 'maverick':
|
|
ensure => present,
|
|
shell => '/sbin/nologin',
|
|
}
|
|
user { 'iceman':
|
|
ensure => present,
|
|
shell => '/sbin/nologin',
|
|
}
|
|
|
|
# PACKAGES
|
|
package { 'mosh': }
|
|
package { 'zsh': }
|
|
package { 'mailutils': }
|
|
|
|
# CLASSES
|
|
include augeas
|
|
include sudo
|
|
|
|
class { 'ssh::server':
|
|
require => Class['augeas'],
|
|
}
|
|
|
|
class { 'apache':
|
|
default_vhost => false,
|
|
}
|
|
|
|
# CONFIGURATIONS
|
|
ssh::server::configline { 'Port': value => '22985' }
|
|
ssh::server::configline { 'PermitRootLogin': value => 'no' }
|
|
ssh::server::configline { 'PasswordAuthentication': value => 'yes' }
|
|
ssh::server::configline { 'AllowUsers/1': value => 'atomaka' }
|
|
ssh::server::configline { 'AllowUsers/2': value => 'jeff' }
|
|
|
|
sudo::conf { 'sudo':
|
|
priority => 10,
|
|
content => "%sudo ALL=(ALL) NOPASSWD: ALL\n",
|
|
}
|
|
|
|
apache::vhost { 'tc362.atomaka.com':
|
|
default_vhost => true,
|
|
port => '80',
|
|
docroot => '/var/www/tc362.atomaka.com',
|
|
docroot_owner => 'atomaka',
|
|
docroot_group => 'web',
|
|
}
|
|
|
|
apache::vhost { 'maverick.atomaka.com':
|
|
port => '80',
|
|
docroot => '/var/www/maverick.atomaka.com',
|
|
docroot_owner => 'maverick',
|
|
docroot_group => 'maverick',
|
|
}
|
|
|
|
apache::vhost { 'iceman.atomaka.com':
|
|
port => '80',
|
|
docroot => '/var/www/iceman.atomaka.com',
|
|
docroot_owner => 'iceman',
|
|
docroot_group => 'iceman',
|
|
}
|
|
|
|
# FILES
|
|
file { '/var/www/tc362.atomaka.com':
|
|
ensure => directory,
|
|
owner => 'atomaka',
|
|
group => 'web',
|
|
mode => '2775',
|
|
source => '/tmp/puppet/files/tc362',
|
|
recurse => true,
|
|
before => Apache::Vhost['tc362.atomaka.com'],
|
|
}
|
|
|
|
file { '/var/www/maverick.atomaka.com':
|
|
ensure => directory,
|
|
owner => 'maverick',
|
|
group => 'maverick',
|
|
mode => '2775',
|
|
source => '/tmp/puppet/files/maverick',
|
|
recurse => true,
|
|
before => Apache::Vhost['maverick.atomaka.com'],
|
|
}
|
|
|
|
file { '/var/www/iceman.atomaka.com':
|
|
ensure => directory,
|
|
owner => 'iceman',
|
|
group => 'iceman',
|
|
mode => '2775',
|
|
source => '/tmp/puppet/files/iceman',
|
|
recurse => true,
|
|
before => Apache::Vhost['iceman.atomaka.com'],
|
|
}
|
|
|
|
file { '/home/atomaka/web':
|
|
ensure => link,
|
|
owner => 'atomaka',
|
|
group => 'atomaka',
|
|
target => '/var/www/tc362.atomaka.com',
|
|
require => [ User['atomaka'], File['/var/www/tc362.atomaka.com'] ],
|
|
}
|
|
|
|
file { '/home/atomaka/maverick':
|
|
ensure => link,
|
|
owner => 'atomaka',
|
|
group => 'atomaka',
|
|
target => '/var/www/maverick.atomaka.com',
|
|
require => [ User['atomaka'], File['/var/www/maverick.atomaka.com'] ],
|
|
}
|
|
|
|
file { '/home/atomaka/iceman':
|
|
ensure => link,
|
|
owner => 'atomaka',
|
|
group => 'atomaka',
|
|
target => '/var/www/iceman.atomaka.com',
|
|
require => [ User['atomaka'], File['/var/www/iceman.atomaka.com'] ],
|
|
}
|
|
|
|
file { '/home/jeff/web':
|
|
ensure => link,
|
|
owner => 'jeff',
|
|
group => 'jeff',
|
|
target => '/var/www/tc362.atomaka.com',
|
|
require => [ User['jeff'], File['/var/www/tc362.atomaka.com'] ],
|
|
}
|
|
|
|
file { '/etc/profile':
|
|
ensure => present,
|
|
content => file('/tmp/puppet/files/profile'),
|
|
require => Package['mailutils'],
|
|
}
|