New native ssh_authorized_key type
This commit is contained in:
Родитель
2b185af978
Коммит
db8a46c605
|
@ -0,0 +1,50 @@
|
|||
require 'puppet/provider/parsedfile'
|
||||
|
||||
Puppet::Type.type(:ssh_authorized_key).provide(:parsed,
|
||||
:parent => Puppet::Provider::ParsedFile,
|
||||
:filetype => :flat,
|
||||
# Ugly but the parameter is required
|
||||
:default_target => '/proc/NONEXISTANT'
|
||||
) do
|
||||
desc "Parse and generate authorized_keys files for SSH."
|
||||
|
||||
text_line :comment, :match => /^#/
|
||||
text_line :blank, :match => /^\s+/
|
||||
|
||||
record_line :parsed,
|
||||
:fields => %w{options type key name},
|
||||
:optional => %w{options},
|
||||
:rts => /^\s+/,
|
||||
:match => /^(?:([^ ]+) )?(ssh-dss|ssh-rsa) ([^ ]+)(?: (.+))?$/,
|
||||
:post_parse => proc { |record|
|
||||
if record[:options].nil?
|
||||
record[:options] = [:absent]
|
||||
else
|
||||
record[:options] = record[:options].split(',')
|
||||
end
|
||||
},
|
||||
:pre_gen => proc { |record|
|
||||
if record[:options].include?(:absent)
|
||||
record[:options] = ""
|
||||
else
|
||||
record[:options] = record[:options].join(',')
|
||||
end
|
||||
}
|
||||
|
||||
def prefetch
|
||||
if not @resource.should(:target)
|
||||
#
|
||||
# Set default target when user is given
|
||||
if val = @resource.should(:user)
|
||||
target = File.expand_path("~%s/.ssh/authorized_keys" % val)
|
||||
Puppet::debug("Setting target to %s" % target)
|
||||
@resource[:target] = target
|
||||
else
|
||||
raise Puppet::Error, "Missing attribute 'user' or 'target'"
|
||||
end
|
||||
end
|
||||
|
||||
super
|
||||
end
|
||||
end
|
||||
|
|
@ -0,0 +1,47 @@
|
|||
module Puppet
|
||||
newtype(:ssh_authorized_key) do
|
||||
@doc = "Manages ssh authorized keys."
|
||||
|
||||
ensurable
|
||||
|
||||
newparam(:name) do
|
||||
desc "The ssh key comment."
|
||||
|
||||
isnamevar
|
||||
end
|
||||
|
||||
newproperty(:type) do
|
||||
desc "The encryption type used. Probably ssh-dss or ssh-rsa for
|
||||
ssh version 2. Not used for ssh version 1."
|
||||
|
||||
newvalue("ssh-dss")
|
||||
newvalue("ssh-rsa")
|
||||
newvalue("none")
|
||||
|
||||
aliasvalue(:dsa, "ssh-dss")
|
||||
aliasvalue(:rsa, "ssh-rsa")
|
||||
|
||||
defaultto "none"
|
||||
end
|
||||
|
||||
newproperty(:key) do
|
||||
desc "The key itself; generally a long string of hex digits."
|
||||
end
|
||||
|
||||
newproperty(:user) do
|
||||
desc "The user account in which the ssh key should be installed."
|
||||
end
|
||||
|
||||
newproperty(:target) do
|
||||
desc "The file in which to store the ssh key."
|
||||
end
|
||||
|
||||
newproperty(:options, :array_matching => :all) do
|
||||
desc "Key options, see sshd(8) for possible values. Multiple values
|
||||
should be specified as an array."
|
||||
|
||||
defaultto do :absent end
|
||||
end
|
||||
end
|
||||
end
|
||||
|
|
@ -0,0 +1,74 @@
|
|||
#!/usr/bin/env ruby
|
||||
|
||||
require File.dirname(__FILE__) + '/../../../../spec_helper'
|
||||
|
||||
require 'puppettest'
|
||||
require 'puppettest/support/utils'
|
||||
require 'puppettest/fileparsing'
|
||||
|
||||
provider_class = Puppet::Type.type(:ssh_authorized_key).provider(:parsed)
|
||||
|
||||
describe provider_class do
|
||||
include PuppetTest
|
||||
include PuppetTest::FileParsing
|
||||
|
||||
before :each do
|
||||
@sshauthkey_class = Puppet.type(:ssh_authorized_key)
|
||||
@provider = @sshauthkey_class.provider(:parsed)
|
||||
end
|
||||
|
||||
after :each do
|
||||
@provider.initvars
|
||||
end
|
||||
|
||||
def mkkey(args)
|
||||
fakeresource = fakeresource(:ssh_authorized_key, args[:name])
|
||||
|
||||
key = @provider.new(fakeresource)
|
||||
args.each do |p,v|
|
||||
key.send(p.to_s + "=", v)
|
||||
end
|
||||
|
||||
return key
|
||||
end
|
||||
|
||||
def genkey(key)
|
||||
@provider.filetype = :ram
|
||||
file = @provider.default_target
|
||||
|
||||
key.flush
|
||||
text = @provider.target_object(file).read
|
||||
return text
|
||||
end
|
||||
|
||||
it "should be able to parse each example" do
|
||||
fakedata("data/providers/ssh_authorized_key/parsed").each { |file|
|
||||
puts "Parsing %s" % file
|
||||
fakedataparse(file)
|
||||
}
|
||||
end
|
||||
|
||||
it "should be able to generate a basic authorized_keys file" do
|
||||
key = mkkey({
|
||||
:name => "Just Testing",
|
||||
:key => "AAAAfsfddsjldjgksdflgkjsfdlgkj",
|
||||
:type => "ssh-dss",
|
||||
:ensure => :present,
|
||||
:options => [:absent]
|
||||
})
|
||||
|
||||
genkey(key).should == "ssh-dss AAAAfsfddsjldjgksdflgkjsfdlgkj Just Testing\n"
|
||||
end
|
||||
|
||||
it "should be able to generate a authorized_keys file with options" do
|
||||
key = mkkey({
|
||||
:name => "root@localhost",
|
||||
:key => "AAAAfsfddsjldjgksdflgkjsfdlgkj",
|
||||
:type => "ssh-rsa",
|
||||
:ensure => :present,
|
||||
:options => ['from="192.168.1.1"', "no-pty", "no-X11-forwarding"]
|
||||
})
|
||||
|
||||
genkey(key).should == "from=\"192.168.1.1\",no-pty,no-X11-forwarding ssh-rsa AAAAfsfddsjldjgksdflgkjsfdlgkj root@localhost\n"
|
||||
end
|
||||
end
|
|
@ -0,0 +1,80 @@
|
|||
#!/usr/bin/env ruby
|
||||
|
||||
require File.dirname(__FILE__) + '/../../../spec_helper'
|
||||
|
||||
ssh_authorized_key = Puppet::Type.type(:ssh_authorized_key)
|
||||
|
||||
describe ssh_authorized_key do
|
||||
before do
|
||||
@class = Puppet::Type.type(:ssh_authorized_key)
|
||||
|
||||
@provider_class = stub 'provider_class', :name => "fake", :suitable? => true, :supports_parameter? => true
|
||||
@class.stubs(:defaultprovider).returns(@provider_class)
|
||||
@class.stubs(:provider).returns(@provider_class)
|
||||
|
||||
@provider = stub 'provider', :class => @provider_class, :file_path => "/tmp/whatever", :clear => nil
|
||||
@provider_class.stubs(:new).returns(@provider)
|
||||
end
|
||||
|
||||
it "should have a name parameter" do
|
||||
@class.attrtype(:name).should == :param
|
||||
end
|
||||
|
||||
it "should have :name be its namevar" do
|
||||
@class.namevar.should == :name
|
||||
end
|
||||
|
||||
it "should have a :provider parameter" do
|
||||
@class.attrtype(:provider).should == :param
|
||||
end
|
||||
|
||||
it "should have an ensure property" do
|
||||
@class.attrtype(:ensure).should == :property
|
||||
end
|
||||
|
||||
it "should support :present as a value for :ensure" do
|
||||
proc { @class.create(:name => "whev", :ensure => :present) }.should_not raise_error
|
||||
end
|
||||
|
||||
it "should support :absent as a value for :ensure" do
|
||||
proc { @class.create(:name => "whev", :ensure => :absent) }.should_not raise_error
|
||||
end
|
||||
|
||||
it "should have an type property" do
|
||||
@class.attrtype(:type).should == :property
|
||||
end
|
||||
it "should support ssh-dss as an type value" do
|
||||
proc { @class.create(:name => "whev", :type => "ssh-dss") }.should_not raise_error
|
||||
end
|
||||
it "should support ssh-rsa as an type value" do
|
||||
proc { @class.create(:name => "whev", :type => "ssh-rsa") }.should_not raise_error
|
||||
end
|
||||
it "should support :dsa as an type value" do
|
||||
proc { @class.create(:name => "whev", :type => :dsa) }.should_not raise_error
|
||||
end
|
||||
it "should support :rsa as an type value" do
|
||||
proc { @class.create(:name => "whev", :type => :rsa) }.should_not raise_error
|
||||
end
|
||||
|
||||
it "should not support values other than ssh-dss, ssh-rsa, dsa, rsa in the ssh_authorized_key_type" do
|
||||
proc { @class.create(:name => "whev", :type => :something) }.should raise_error(Puppet::Error)
|
||||
end
|
||||
|
||||
it "should have an key property" do
|
||||
@class.attrtype(:key).should == :property
|
||||
end
|
||||
|
||||
it "should have an user property" do
|
||||
@class.attrtype(:user).should == :property
|
||||
end
|
||||
|
||||
it "should have an options property" do
|
||||
@class.attrtype(:options).should == :property
|
||||
end
|
||||
|
||||
it "should have a target property" do
|
||||
@class.attrtype(:target).should == :property
|
||||
end
|
||||
|
||||
after { @class.clear }
|
||||
end
|
|
@ -0,0 +1,5 @@
|
|||
ssh-dss AAAAB3NzaC1kc3MAAACBAJkupmdsJSDXfUy5EU5NTRBDr9Woo3w0YnB8KmnJW9ghU8C7SkWPB1fIHVe+esFfd3qWBseb83PoFX63geZJAg6bjV4/Rdn1zEoa9EO2QyUdYUen4+rpsh3vVKZ6HFNsn3+W5+kPYgE1F/N4INqkbjY3sqCkP/W1BL9+sbVVbuJFAAAAFQCfjWDk5XhvGUkPjNWWVqltBYzHtwAAAIEAg/XL7ky7x9Ad5banzPFAfmM+DGFe0A/JEbLDjKmr5KBM5x4RFohtEvZ8ECuVGUOqBWdgAjyYwsG4oRVjLnKrf/rgmbNRzSFgEWkcAye3BVwk7Dt6hh4knEl+mNfOLq+FH0011UhecOiqTcESMzQDtgQ1vJh2VchElBLjl3x/ZugAAACAAh5jGQC338t5ObP8trSlOefkx0sXmmEzUbo3Mt8mGUuGJPx8m+X0L8Xd+l5rQxytqE3SmV/RD+6REqBuPqHM8RQuqAzfjdOeg/Ajdggx1CRMTVhltZsgQoxO30cz9Qo0SdPoL+Jp1fLuaLZq7m/RmsWYvoLT3jebBlpvvQE8YlI= francois.deppierraz@nimag.net
|
||||
ssh-dss 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 Francois Deppierraz <francois@ctrlaltdel.ch>
|
||||
from="192.168.1.1",command="/bin/false",no-pty,no-port-forwarding ssh-dss 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 Francois Deppierraz
|
||||
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA2Vi+TdC3iOGYcIo5vGTvC9P9rjHl9RxCuZmSfn+YDFQ35RXf0waijtjp9I7GYh6R4hBjA5z0u/Pzi95LET5NfRM0Gdc0DJyvBI7K+ALBxIT383Iz6Yz4iKxe1TEJgHGM2he4+7BHkjc3kdIZqIpZjucCk4VsXSxujO4MKKvtaKK2l+kahlLQHHw/vZkDpIgL52iGVsjW9l8RLJaKHZ4mDHJN/Q/Rzn2W4EvcdHUzwhvGMwZlm8clDwITBrSsawYtnivJrQSYcmTRqJuS8wprNDrLIhTGjrwFg5WpruUuMt6fLuCqwe6TeEL+nh3DQ4g554c5aRp3oU6LGBKTvNZGWQ== francois@korn
|
||||
ssh-dss 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 francois@korn
|
|
@ -0,0 +1,2 @@
|
|||
ssh-dss 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 francois.deppierraz@camptocamp.com
|
||||
from="192.168.1.2",command="/usr/local/bin/backup.sh",no-agent-forwarding,no-port-forwarding,no-X11-forwarding ssh-rsa AAAAB3NzaC1kc3MAAACBAJkupmdsJSDXfUy5EU5NTRBDr9Woo3w0YnB8KmnJW9ghU8C7SkWPB1fIHVesG4oRVjLnKrf/rgmbNRzSFgEWkcAye3BVwk7Dt6hh4ksG4oRVjLnKrf/rgmbNRzSFgEWkcAye3BVwk7Dt6hh4ksG4oRVjLnKrf/rgmbNRzSFgEWkcAye3BVwk7Dt6hh4kxytqE3SmV/RD+6REqBuPqHM8RQuqAzfjdOeg/Ajdggx1CRMTVhltZsgQoxO30cz9Qo0SdPoL+Jp1fLuaL Backup system
|
Загрузка…
Ссылка в новой задаче