forked from duosecurity/puppet-duo_unix
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathinit.pp
80 lines (72 loc) · 1.86 KB
/
init.pp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
# == Class: duo_unix
#
# Core class for duo_unix module
#
# === Authors
#
# Mark Stanislav <[email protected]>
class duo_unix (
$usage = '',
$ikey = '',
$skey = '',
$host = '',
$group = '',
$http_proxy = '',
$fallback_local_ip = 'no',
$failmode = 'safe',
$pushinfo = 'no',
$autopush = 'no',
$motd = 'no',
$prompts = '3',
$accept_env_factor = 'no',
$manage_ssh = true,
$manage_pam = true,
$pam_unix_control = 'requisite',
$package_version = 'installed',
) {
if $ikey == '' or $skey == '' or $host == '' {
fail('ikey, skey, and host must all be defined.')
}
if $usage != 'login' and $usage != 'pam' {
fail('You must configure a usage of duo_unix, either login or pam.')
}
case $::osfamily {
'RedHat': {
$duo_package = 'duo_unix'
$ssh_service = 'sshd'
$gpg_file = '/etc/pki/rpm-gpg/RPM-GPG-KEY-DUO'
$pam_file = $::operatingsystemrelease ? {
/^5/ => '/etc/pam.d/system-auth',
/^(6|7|2014)/ => '/etc/pam.d/password-auth'
}
$pam_module = $::architecture ? {
i386 => '/lib/security/pam_duo.so',
i686 => '/lib/security/pam_duo.so',
x86_64 => '/lib64/security/pam_duo.so'
}
include duo_unix::yum
include duo_unix::generic
}
'Debian': {
$duo_package = 'duo-unix'
$ssh_service = 'ssh'
$gpg_file = '/etc/apt/DEB-GPG-KEY-DUO'
$pam_file = '/etc/pam.d/common-auth'
$pam_module = $::architecture ? {
i386 => '/lib/security/pam_duo.so',
i686 => '/lib/security/pam_duo.so',
amd64 => '/lib64/security/pam_duo.so'
}
include duo_unix::apt
include duo_unix::generic
}
default: {
fail("Module ${module_name} does not support ${::operatingsystem}")
}
}
if $usage == 'login' {
include duo_unix::login
} else {
include duo_unix::pam
}
}