1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
|
# manage strongswan services
class strongswan::base {
package{'strongswan':
ensure => installed,
} -> exec{
'ipsec_privatekey':
command => "certtool --generate-privkey --bits 2048 --outfile ${strongswan::config_dir}/private/${::fqdn}.pem",
creates => "${strongswan::config_dir}/private/${::fqdn}.pem";
} -> exec{'ipsec_monkeysphere_cert':
command => "monkeysphere-host import-key ${strongswan::config_dir}/private/${::fqdn}.pem ike://${::fqdn} && gpg --homedir /var/lib/monkeysphere/host -a --export =ike://${::fqdn} > ${strongswan::config_dir}/certs/${::fqdn}.asc",
creates => "${strongswan::config_dir}/certs/${::fqdn}.asc",
}
File {
require => Package['strongswan'],
notify => Service['ipsec'],
owner => 'root',
group => 0,
mode => '0400',
}
file{
'/etc/ipsec.secrets':
content => ": RSA ${::fqdn}.pem\n";
# this is needed because if the glob-include in the config
# doesn't find anything it fails.
"${strongswan::config_dir}/hosts":
ensure => directory,
purge => true,
force => true,
recurse => true;
"${strongswan::config_dir}/hosts/__dummy__.conf":
ensure => 'present';
'/etc/ipsec.conf':
content => template('strongswan/ipsec.conf.erb');
}
service{'ipsec':
ensure => running,
enable => true,
}
if $strongswan::auto_remote_host and ($::strongswan_cert != 'false') and ($::strongswan_cert != '') {
# export
@@strongswan::remote_host{$::fqdn:
right_cert_content => $::strongswan_cert,
right_ip_address => $default_left_ip_address,
tag => $::fqdn
}
#Strongswan::Remote_Host<<| tag == 'auto' and tag != $::fqdn |>>
Strongswan::Remote_Host<<| tag != $::fqdn |>>
}
}
|