solokit 0.0.2 → 0.0.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- data/README.markdown +29 -0
- data/chef/roles/base.json +13 -0
- data/chef/server.json +5 -0
- data/chef/solo.rb +6 -0
- data/cookbooks/site/users/definitions/add_keys.rb +45 -0
- data/cookbooks/site/users/recipes/default.rb +34 -0
- data/cookbooks/upstream/apt/files/default/apt-cacher +9 -0
- data/cookbooks/upstream/apt/files/default/apt-cacher.conf +144 -0
- data/cookbooks/upstream/apt/files/default/apt-proxy-v2.conf +50 -0
- data/cookbooks/upstream/apt/metadata.json +51 -0
- data/cookbooks/upstream/apt/metadata.rb +11 -0
- data/cookbooks/upstream/apt/recipes/cacher.rb +42 -0
- data/cookbooks/upstream/apt/recipes/default.rb +33 -0
- data/cookbooks/upstream/apt/recipes/proxy.rb +34 -0
- data/cookbooks/upstream/ruby-shadow/attributes/ruby-shadow.rb +1 -0
- data/cookbooks/upstream/ruby-shadow/files/default/shadow-1.4.1/HISTORY +34 -0
- data/cookbooks/upstream/ruby-shadow/files/default/shadow-1.4.1/MANIFEST +7 -0
- data/cookbooks/upstream/ruby-shadow/files/default/shadow-1.4.1/README +79 -0
- data/cookbooks/upstream/ruby-shadow/files/default/shadow-1.4.1/README.euc +80 -0
- data/cookbooks/upstream/ruby-shadow/files/default/shadow-1.4.1/depend +1 -0
- data/cookbooks/upstream/ruby-shadow/files/default/shadow-1.4.1/extconf.rb +26 -0
- data/cookbooks/upstream/ruby-shadow/files/default/shadow-1.4.1/shadow.c +281 -0
- data/cookbooks/upstream/ruby-shadow/recipes/default.rb +15 -0
- data/cookbooks/upstream/sudo/attributes/sudoers.rb +21 -0
- data/cookbooks/upstream/sudo/metadata.json +96 -0
- data/cookbooks/upstream/sudo/metadata.rb +31 -0
- data/cookbooks/upstream/sudo/recipes/default.rb +33 -0
- data/cookbooks/upstream/sudo/templates/default/sudoers.erb +22 -0
- data/cookbooks/upstream/users/attributes/default.rb +4 -0
- data/cookbooks/upstream/users/definitions/add_keys.rb +38 -0
- data/cookbooks/upstream/users/libraries/roles.rb +17 -0
- data/cookbooks/upstream/users/metadata.json +38 -0
- data/cookbooks/upstream/users/metadata.rb +4 -0
- data/cookbooks/upstream/users/recipes/default.rb +17 -0
- data/cookbooks/upstream/users/templates/default/authorized_keys.erb +5 -0
- data/lib/chef.rb +11 -10
- data/lib/solokit/version.rb +1 -1
- metadata +38 -4
- data/README +0 -1
@@ -0,0 +1,80 @@
|
|
1
|
+
Shadow Password module
|
2
|
+
|
3
|
+
Copyright (C) 1998-1999 Takaaki Tateishi <ttate@jaist.ac.jp>
|
4
|
+
Modified at: <1999/8/19 06:48:01 by ttate>
|
5
|
+
License: Free for any use with your own risk!
|
6
|
+
|
7
|
+
|
8
|
+
1. ����
|
9
|
+
|
10
|
+
linux�ˤ�����shadow password�ե����������
|
11
|
+
�Υ⥸�塼�롣
|
12
|
+
|
13
|
+
|
14
|
+
2. ���ȡ���
|
15
|
+
|
16
|
+
ruby extconf.rb
|
17
|
+
make
|
18
|
+
make install
|
19
|
+
|
20
|
+
* ����
|
21
|
+
shadow-1.3�Ǥ�ruby-1.3�⤷���Ϥ���ʹߤΥС������
|
22
|
+
��ɬ�פǤ���
|
23
|
+
|
24
|
+
3. Shadow::Passwd�⥸�塼��Υ�å�ã
|
25
|
+
|
26
|
+
getspent
|
27
|
+
getspnam(name)
|
28
|
+
setspent
|
29
|
+
endspent
|
30
|
+
fgetspent(file)
|
31
|
+
sgetspent(str)
|
32
|
+
putspent(entry,file)
|
33
|
+
lckpwdf,lock
|
34
|
+
ulckpwdf,unlock
|
35
|
+
lock?
|
36
|
+
|
37
|
+
4. Structure
|
38
|
+
|
39
|
+
Shadow::Passwd::Entry (Struct::PasswdEntry)
|
40
|
+
sp_namp - pointer to null-terminated user name.
|
41
|
+
sp_pwdp - pointer to null-terminated password.
|
42
|
+
sp_lstchg - days since Jan 1, 1970 password was last
|
43
|
+
changed.
|
44
|
+
sp_min - days before which password may not be changed.
|
45
|
+
sp_max - days after which password must be changed.
|
46
|
+
sp_warn - days before password is to expire that user is
|
47
|
+
warned of pending password expiration.
|
48
|
+
sp_inact - days after password expires that account is
|
49
|
+
considered inactive and disabled.
|
50
|
+
sp_expire - days since Jan 1, 1970 when account will be
|
51
|
+
|
52
|
+
|
53
|
+
5. ����
|
54
|
+
|
55
|
+
getspent, getspname, fgetspent, sgetspent��Shadow::Passwd::Entry
|
56
|
+
���ȥ饯������֤��ޤ���getspent �ϥե����뤫�鼡�Υѥ���
|
57
|
+
���ɥ���ȥ���֤���fgetspent ��Ϳ����줿IO���鼡�Υ����
|
58
|
+
����֤��ޤ���sgetspent��Ϳ����줿ʸ����Shadow::Passwd::Entry
|
59
|
+
���ȥ饯������֤��ޤ���getspnam�ϥ桼��̾��Ϳ�����/etc/shadow
|
60
|
+
���餽�Υ桼����Shadow::Passwd::Entry���ȥ饯������֤��ޤ���
|
61
|
+
�ե�����ν�ü��ã�����nil���ͤ��֤��ޤ���
|
62
|
+
|
63
|
+
setspent,endspent�Ϥ��줾�졢�ե�����ؤΥ��������ΤϤ����
|
64
|
+
�����˻Ȥ��ޤ���
|
65
|
+
|
66
|
+
lckpwdf(lock),ulckpwdf(unlock)��/etc/shadow�ؤ���¾Ū��������
|
67
|
+
��¸����뤿��ˤ���ޤ���
|
68
|
+
lock�˼��Ԥ����Shadow::FileLock�Ȥ����㳰��ȯ�������ޤ���
|
69
|
+
lock�ƥ졼���Ȥ��ƻȤ����Ȥˤ�äơ����ƥ졼���֥��å���ȴ����
|
70
|
+
�Ȥ��˼�ưŪ��unlock��Ԥʤ��ޤ���
|
71
|
+
|
72
|
+
|
73
|
+
6. ����
|
74
|
+
|
75
|
+
* man shadow
|
76
|
+
* /usr/include/shadow.h
|
77
|
+
|
78
|
+
|
79
|
+
|
80
|
+
ttate@jaist.ac.jp
|
@@ -0,0 +1 @@
|
|
1
|
+
shadow.o : shadow.c $(hdrdir)/ruby.h $(hdrdir)/rubyio.h
|
@@ -0,0 +1,26 @@
|
|
1
|
+
# -*- ruby -*-
|
2
|
+
# extconf.rb
|
3
|
+
#
|
4
|
+
# Modified at: <1999/8/19 06:38:55 by ttate>
|
5
|
+
#
|
6
|
+
|
7
|
+
require 'mkmf'
|
8
|
+
|
9
|
+
$CFLAGS = ""
|
10
|
+
$LDFLAGS = "-lshadow"
|
11
|
+
|
12
|
+
if( ! (ok = have_library("shadow","getspent")) )
|
13
|
+
$LDFLAGS = ""
|
14
|
+
ok = have_func("getspent")
|
15
|
+
end
|
16
|
+
|
17
|
+
ok &= have_func("sgetspent")
|
18
|
+
ok &= have_func("fgetspent")
|
19
|
+
ok &= have_func("setspent")
|
20
|
+
ok &= have_func("endspent")
|
21
|
+
ok &= have_func("lckpwdf")
|
22
|
+
ok &= have_func("ulckpwdf")
|
23
|
+
|
24
|
+
if ok
|
25
|
+
create_makefile("shadow")
|
26
|
+
end
|
@@ -0,0 +1,281 @@
|
|
1
|
+
/*
|
2
|
+
* shadow.c
|
3
|
+
*
|
4
|
+
* Ruby extention module for using Linux shadow password.
|
5
|
+
*
|
6
|
+
* Copyright (C) 1998-1999 by Takaaki.Tateishi(ttate@jaist.ac.jp)
|
7
|
+
* License: Free for any use with your own risk!
|
8
|
+
* Modified at: <1999/8/19 06:48:18 by ttate>
|
9
|
+
*/
|
10
|
+
|
11
|
+
#include <shadow.h>
|
12
|
+
#include "ruby.h"
|
13
|
+
#include "rubyio.h"
|
14
|
+
|
15
|
+
static VALUE rb_mShadow;
|
16
|
+
static VALUE rb_mPasswd;
|
17
|
+
static VALUE rb_sPasswdEntry;
|
18
|
+
static VALUE rb_mGroup;
|
19
|
+
static VALUE rb_sGroupEntry;
|
20
|
+
static VALUE rb_eFileLock;
|
21
|
+
|
22
|
+
|
23
|
+
static VALUE
|
24
|
+
rb_shadow_setspent(VALUE self)
|
25
|
+
{
|
26
|
+
setspent();
|
27
|
+
return Qnil;
|
28
|
+
};
|
29
|
+
|
30
|
+
|
31
|
+
static VALUE
|
32
|
+
rb_shadow_endspent(VALUE self)
|
33
|
+
{
|
34
|
+
endspent();
|
35
|
+
return Qnil;
|
36
|
+
};
|
37
|
+
|
38
|
+
|
39
|
+
static VALUE
|
40
|
+
rb_shadow_sgetspent(VALUE self, VALUE str)
|
41
|
+
{
|
42
|
+
struct spwd *entry;
|
43
|
+
VALUE result;
|
44
|
+
|
45
|
+
if( TYPE(str) != T_STRING )
|
46
|
+
rb_raise(rb_eException,"argument must be a string.");
|
47
|
+
|
48
|
+
entry = sgetspent(STR2CSTR(str));
|
49
|
+
|
50
|
+
if( entry == NULL )
|
51
|
+
return Qnil;
|
52
|
+
|
53
|
+
result = rb_struct_new(rb_sPasswdEntry,
|
54
|
+
rb_tainted_str_new2(entry->sp_namp),
|
55
|
+
rb_tainted_str_new2(entry->sp_pwdp),
|
56
|
+
INT2FIX(entry->sp_lstchg),
|
57
|
+
INT2FIX(entry->sp_min),
|
58
|
+
INT2FIX(entry->sp_max),
|
59
|
+
INT2FIX(entry->sp_warn),
|
60
|
+
INT2FIX(entry->sp_inact),
|
61
|
+
INT2FIX(entry->sp_expire),
|
62
|
+
INT2FIX(entry->sp_flag),
|
63
|
+
0);
|
64
|
+
free(entry);
|
65
|
+
return result;
|
66
|
+
};
|
67
|
+
|
68
|
+
static VALUE
|
69
|
+
rb_shadow_fgetspent(VALUE self, VALUE file)
|
70
|
+
{
|
71
|
+
struct spwd *entry;
|
72
|
+
VALUE result;
|
73
|
+
|
74
|
+
if( TYPE(file) != T_FILE )
|
75
|
+
rb_raise(rb_eTypeError,"argument must be a File.");
|
76
|
+
|
77
|
+
entry = fgetspent((RFILE(file)->fptr)->f);
|
78
|
+
|
79
|
+
if( entry == NULL )
|
80
|
+
return Qnil;
|
81
|
+
|
82
|
+
result = rb_struct_new(rb_sPasswdEntry,
|
83
|
+
rb_tainted_str_new2(entry->sp_namp),
|
84
|
+
rb_tainted_str_new2(entry->sp_pwdp),
|
85
|
+
INT2FIX(entry->sp_lstchg),
|
86
|
+
INT2FIX(entry->sp_min),
|
87
|
+
INT2FIX(entry->sp_max),
|
88
|
+
INT2FIX(entry->sp_warn),
|
89
|
+
INT2FIX(entry->sp_inact),
|
90
|
+
INT2FIX(entry->sp_expire),
|
91
|
+
INT2FIX(entry->sp_flag),
|
92
|
+
0);
|
93
|
+
return result;
|
94
|
+
};
|
95
|
+
|
96
|
+
static VALUE
|
97
|
+
rb_shadow_getspent(VALUE self)
|
98
|
+
{
|
99
|
+
struct spwd *entry;
|
100
|
+
VALUE result;
|
101
|
+
|
102
|
+
entry = getspent();
|
103
|
+
|
104
|
+
if( entry == NULL )
|
105
|
+
return Qnil;
|
106
|
+
|
107
|
+
result = rb_struct_new(rb_sPasswdEntry,
|
108
|
+
rb_tainted_str_new2(entry->sp_namp),
|
109
|
+
rb_tainted_str_new2(entry->sp_pwdp),
|
110
|
+
INT2FIX(entry->sp_lstchg),
|
111
|
+
INT2FIX(entry->sp_min),
|
112
|
+
INT2FIX(entry->sp_max),
|
113
|
+
INT2FIX(entry->sp_warn),
|
114
|
+
INT2FIX(entry->sp_inact),
|
115
|
+
INT2FIX(entry->sp_expire),
|
116
|
+
INT2FIX(entry->sp_flag),
|
117
|
+
0);
|
118
|
+
return result;
|
119
|
+
};
|
120
|
+
|
121
|
+
static VALUE
|
122
|
+
rb_shadow_getspnam(VALUE self, VALUE name)
|
123
|
+
{
|
124
|
+
struct spwd *entry;
|
125
|
+
VALUE result;
|
126
|
+
|
127
|
+
if( TYPE(name) != T_STRING )
|
128
|
+
rb_raise(rb_eException,"argument must be a string.");
|
129
|
+
|
130
|
+
entry = getspnam(STR2CSTR(name));
|
131
|
+
|
132
|
+
if( entry == NULL )
|
133
|
+
return Qnil;
|
134
|
+
|
135
|
+
result = rb_struct_new(rb_sPasswdEntry,
|
136
|
+
rb_tainted_str_new2(entry->sp_namp),
|
137
|
+
rb_tainted_str_new2(entry->sp_pwdp),
|
138
|
+
INT2FIX(entry->sp_lstchg),
|
139
|
+
INT2FIX(entry->sp_min),
|
140
|
+
INT2FIX(entry->sp_max),
|
141
|
+
INT2FIX(entry->sp_warn),
|
142
|
+
INT2FIX(entry->sp_inact),
|
143
|
+
INT2FIX(entry->sp_expire),
|
144
|
+
INT2FIX(entry->sp_flag),
|
145
|
+
0);
|
146
|
+
return result;
|
147
|
+
};
|
148
|
+
|
149
|
+
|
150
|
+
static VALUE
|
151
|
+
rb_shadow_putspent(VALUE self, VALUE entry, VALUE file)
|
152
|
+
{
|
153
|
+
struct spwd centry;
|
154
|
+
FILE* cfile;
|
155
|
+
VALUE val[9];
|
156
|
+
int i;
|
157
|
+
int result;
|
158
|
+
|
159
|
+
for(i=0; i<=8; i++)
|
160
|
+
val[i] = RSTRUCT(entry)->ptr[i];
|
161
|
+
cfile = RFILE(file)->fptr->f;
|
162
|
+
|
163
|
+
centry.sp_namp = STR2CSTR(val[0]);
|
164
|
+
centry.sp_pwdp = STR2CSTR(val[1]);
|
165
|
+
centry.sp_lstchg = FIX2INT(val[2]);
|
166
|
+
centry.sp_min = FIX2INT(val[3]);
|
167
|
+
centry.sp_max = FIX2INT(val[4]);
|
168
|
+
centry.sp_warn = FIX2INT(val[5]);
|
169
|
+
centry.sp_inact = FIX2INT(val[6]);
|
170
|
+
centry.sp_expire = FIX2INT(val[7]);
|
171
|
+
centry.sp_flag = FIX2INT(val[8]);
|
172
|
+
|
173
|
+
result = putspent(¢ry,cfile);
|
174
|
+
|
175
|
+
if( result == -1 )
|
176
|
+
rb_raise(rb_eStandardError,"can't change password");
|
177
|
+
|
178
|
+
return Qtrue;
|
179
|
+
};
|
180
|
+
|
181
|
+
|
182
|
+
static VALUE
|
183
|
+
rb_shadow_lckpwdf(VALUE self)
|
184
|
+
{
|
185
|
+
int result;
|
186
|
+
result = lckpwdf();
|
187
|
+
if( result == -1 )
|
188
|
+
rb_raise(rb_eFileLock,"password file was locked");
|
189
|
+
else
|
190
|
+
return Qtrue;
|
191
|
+
};
|
192
|
+
|
193
|
+
static int in_lock;
|
194
|
+
|
195
|
+
static VALUE
|
196
|
+
rb_shadow_lock(VALUE self)
|
197
|
+
{
|
198
|
+
int result;
|
199
|
+
|
200
|
+
if( rb_iterator_p() ){
|
201
|
+
result = lckpwdf();
|
202
|
+
if( result == -1 ){
|
203
|
+
rb_raise(rb_eFileLock,"password file was locked");
|
204
|
+
}
|
205
|
+
else{
|
206
|
+
in_lock++;
|
207
|
+
rb_yield(Qnil);
|
208
|
+
in_lock--;
|
209
|
+
ulckpwdf();
|
210
|
+
};
|
211
|
+
return Qtrue;
|
212
|
+
}
|
213
|
+
else{
|
214
|
+
return rb_shadow_lckpwdf(self);
|
215
|
+
};
|
216
|
+
};
|
217
|
+
|
218
|
+
|
219
|
+
static VALUE
|
220
|
+
rb_shadow_ulckpwdf(VALUE self)
|
221
|
+
{
|
222
|
+
if( in_lock ){
|
223
|
+
rb_raise(rb_eFileLock,"you call unlock method in lock iterator.");
|
224
|
+
};
|
225
|
+
ulckpwdf();
|
226
|
+
return Qtrue;
|
227
|
+
};
|
228
|
+
|
229
|
+
static VALUE
|
230
|
+
rb_shadow_unlock(VALUE self)
|
231
|
+
{
|
232
|
+
return rb_shadow_ulckpwdf(self);
|
233
|
+
};
|
234
|
+
|
235
|
+
static VALUE
|
236
|
+
rb_shadow_lock_p(VALUE self)
|
237
|
+
{
|
238
|
+
int result;
|
239
|
+
|
240
|
+
result = lckpwdf();
|
241
|
+
if( result == -1 ){
|
242
|
+
return Qtrue;
|
243
|
+
}
|
244
|
+
else{
|
245
|
+
ulckpwdf();
|
246
|
+
return Qfalse;
|
247
|
+
};
|
248
|
+
};
|
249
|
+
|
250
|
+
|
251
|
+
void
|
252
|
+
Init_shadow()
|
253
|
+
{
|
254
|
+
rb_sPasswdEntry = rb_struct_define("PasswdEntry",
|
255
|
+
"sp_namp","sp_pwdp","sp_lstchg",
|
256
|
+
"sp_min","sp_max","sp_warn",
|
257
|
+
"sp_inact","sp_expire","sp_flag",0);
|
258
|
+
rb_sGroupEntry = rb_struct_define("GroupEntry",
|
259
|
+
"sg_name","sg_passwd",
|
260
|
+
"sg_adm","sg_mem",0);
|
261
|
+
|
262
|
+
rb_mShadow = rb_define_module("Shadow");
|
263
|
+
rb_eFileLock = rb_define_class_under(rb_mShadow,"FileLock",rb_eException);
|
264
|
+
rb_mPasswd = rb_define_module_under(rb_mShadow,"Passwd");
|
265
|
+
rb_define_const(rb_mPasswd,"Entry",rb_sPasswdEntry);
|
266
|
+
rb_mGroup = rb_define_module_under(rb_mShadow,"Group");
|
267
|
+
rb_define_const(rb_mGroup,"Entry",rb_sGroupEntry);
|
268
|
+
|
269
|
+
rb_define_module_function(rb_mPasswd,"setspent",rb_shadow_setspent,0);
|
270
|
+
rb_define_module_function(rb_mPasswd,"endspent",rb_shadow_endspent,0);
|
271
|
+
rb_define_module_function(rb_mPasswd,"sgetspent",rb_shadow_sgetspent,1);
|
272
|
+
rb_define_module_function(rb_mPasswd,"fgetspent",rb_shadow_fgetspent,1);
|
273
|
+
rb_define_module_function(rb_mPasswd,"getspent",rb_shadow_getspent,0);
|
274
|
+
rb_define_module_function(rb_mPasswd,"getspnam",rb_shadow_getspnam,1);
|
275
|
+
rb_define_module_function(rb_mPasswd,"putspent",rb_shadow_putspent,2);
|
276
|
+
rb_define_module_function(rb_mPasswd,"lckpwdf",rb_shadow_lckpwdf,0);
|
277
|
+
rb_define_module_function(rb_mPasswd,"lock",rb_shadow_lock,0);
|
278
|
+
rb_define_module_function(rb_mPasswd,"ulckpwdf",rb_shadow_ulckpwdf,0);
|
279
|
+
rb_define_module_function(rb_mPasswd,"unlock",rb_shadow_unlock,0);
|
280
|
+
rb_define_module_function(rb_mPasswd,"lock?",rb_shadow_lock_p,0);
|
281
|
+
};
|
@@ -0,0 +1,15 @@
|
|
1
|
+
remote_directory "/usr/local/src/shadow-1.4.1" do
|
2
|
+
source 'shadow-1.4.1'
|
3
|
+
not_if { File.exists?(File.join(node[:ruby_shadow][:site_ruby], "#{node[:languages][:ruby][:platform]}/shadow.so")) }
|
4
|
+
end
|
5
|
+
|
6
|
+
bash "install ruby shadow library" do
|
7
|
+
user "root"
|
8
|
+
cwd "/usr/local/src"
|
9
|
+
code <<-EOH
|
10
|
+
cd shadow-1.4.1
|
11
|
+
ruby extconf.rb
|
12
|
+
make install
|
13
|
+
EOH
|
14
|
+
not_if { File.exists?(File.join(node[:ruby_shadow][:site_ruby], "/#{node[:languages][:ruby][:platform]}/shadow.so")) }
|
15
|
+
end
|
@@ -0,0 +1,21 @@
|
|
1
|
+
#
|
2
|
+
# Cookbook Name:: sudo
|
3
|
+
# Attribute File:: sudoers
|
4
|
+
#
|
5
|
+
# Copyright 2008-2009, Opscode, Inc.
|
6
|
+
#
|
7
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
8
|
+
# you may not use this file except in compliance with the License.
|
9
|
+
# You may obtain a copy of the License at
|
10
|
+
#
|
11
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
12
|
+
#
|
13
|
+
# Unless required by applicable law or agreed to in writing, software
|
14
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
15
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
16
|
+
# See the License for the specific language governing permissions and
|
17
|
+
# limitations under the License.
|
18
|
+
#
|
19
|
+
|
20
|
+
set_unless[:authorization][:sudo][:groups] = Array.new
|
21
|
+
set_unless[:authorization][:sudo][:users] = Array.new
|
@@ -0,0 +1,96 @@
|
|
1
|
+
{
|
2
|
+
"maintainer": "Opscode, Inc.",
|
3
|
+
"description": "Installs and configures sudo",
|
4
|
+
"recommendations": {
|
5
|
+
|
6
|
+
},
|
7
|
+
"maintainer_email": "cookbooks@opscode.com",
|
8
|
+
"recipes": {
|
9
|
+
"sudo": ""
|
10
|
+
},
|
11
|
+
"suggestions": {
|
12
|
+
|
13
|
+
},
|
14
|
+
"platforms": {
|
15
|
+
"freebsd": [
|
16
|
+
|
17
|
+
],
|
18
|
+
"ubuntu": [
|
19
|
+
|
20
|
+
],
|
21
|
+
"fedora": [
|
22
|
+
|
23
|
+
],
|
24
|
+
"centos": [
|
25
|
+
|
26
|
+
],
|
27
|
+
"debian": [
|
28
|
+
|
29
|
+
],
|
30
|
+
"redhat": [
|
31
|
+
|
32
|
+
]
|
33
|
+
},
|
34
|
+
"version": "0.7.0",
|
35
|
+
"name": "sudo",
|
36
|
+
"conflicting": {
|
37
|
+
|
38
|
+
},
|
39
|
+
"attributes": {
|
40
|
+
"authorization\/sudoers\/groups": {
|
41
|
+
"default": "",
|
42
|
+
"type": "array",
|
43
|
+
"multiple_values": false,
|
44
|
+
"description": "Groups who are allowed sudo ALL",
|
45
|
+
"display_name": "Sudo Groups",
|
46
|
+
"recipes": [
|
47
|
+
|
48
|
+
],
|
49
|
+
"required": false
|
50
|
+
},
|
51
|
+
"authorization\/sudoers\/users": {
|
52
|
+
"default": "",
|
53
|
+
"type": "array",
|
54
|
+
"multiple_values": false,
|
55
|
+
"description": "Users who are allowed sudo ALL",
|
56
|
+
"display_name": "Sudo Users",
|
57
|
+
"recipes": [
|
58
|
+
|
59
|
+
],
|
60
|
+
"required": false
|
61
|
+
},
|
62
|
+
"authorization\/sudoers": {
|
63
|
+
"type": "hash",
|
64
|
+
"multiple_values": false,
|
65
|
+
"description": "Hash of Authorization\/Sudoers attributes",
|
66
|
+
"display_name": "Authorization Sudoers",
|
67
|
+
"recipes": [
|
68
|
+
|
69
|
+
],
|
70
|
+
"required": false
|
71
|
+
},
|
72
|
+
"authorization": {
|
73
|
+
"type": "hash",
|
74
|
+
"multiple_values": false,
|
75
|
+
"description": "Hash of Authorization attributes",
|
76
|
+
"display_name": "Authorization",
|
77
|
+
"recipes": [
|
78
|
+
|
79
|
+
],
|
80
|
+
"required": false
|
81
|
+
}
|
82
|
+
},
|
83
|
+
"providing": {
|
84
|
+
"sudo": [
|
85
|
+
|
86
|
+
]
|
87
|
+
},
|
88
|
+
"license": "Apache 2.0",
|
89
|
+
"long_description": "",
|
90
|
+
"replacing": {
|
91
|
+
|
92
|
+
},
|
93
|
+
"dependencies": {
|
94
|
+
|
95
|
+
}
|
96
|
+
}
|
@@ -0,0 +1,31 @@
|
|
1
|
+
maintainer "Opscode, Inc."
|
2
|
+
maintainer_email "cookbooks@opscode.com"
|
3
|
+
license "Apache 2.0"
|
4
|
+
description "Installs and configures sudo"
|
5
|
+
version "0.7"
|
6
|
+
|
7
|
+
%w{redhat centos fedora ubuntu debian freebsd}.each do |os|
|
8
|
+
supports os
|
9
|
+
end
|
10
|
+
|
11
|
+
attribute "authorization",
|
12
|
+
:display_name => "Authorization",
|
13
|
+
:description => "Hash of Authorization attributes",
|
14
|
+
:type => "hash"
|
15
|
+
|
16
|
+
attribute "authorization/sudoers",
|
17
|
+
:display_name => "Authorization Sudoers",
|
18
|
+
:description => "Hash of Authorization/Sudoers attributes",
|
19
|
+
:type => "hash"
|
20
|
+
|
21
|
+
attribute "authorization/sudoers/users",
|
22
|
+
:display_name => "Sudo Users",
|
23
|
+
:description => "Users who are allowed sudo ALL",
|
24
|
+
:type => "array",
|
25
|
+
:default => ""
|
26
|
+
|
27
|
+
attribute "authorization/sudoers/groups",
|
28
|
+
:display_name => "Sudo Groups",
|
29
|
+
:description => "Groups who are allowed sudo ALL",
|
30
|
+
:type => "array",
|
31
|
+
:default => ""
|
@@ -0,0 +1,33 @@
|
|
1
|
+
#
|
2
|
+
# Cookbook Name:: sudo
|
3
|
+
# Recipe:: default
|
4
|
+
#
|
5
|
+
# Copyright 2008-2009, Opscode, Inc.
|
6
|
+
#
|
7
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
8
|
+
# you may not use this file except in compliance with the License.
|
9
|
+
# You may obtain a copy of the License at
|
10
|
+
#
|
11
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
12
|
+
#
|
13
|
+
# Unless required by applicable law or agreed to in writing, software
|
14
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
15
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
16
|
+
# See the License for the specific language governing permissions and
|
17
|
+
# limitations under the License.
|
18
|
+
#
|
19
|
+
|
20
|
+
package "sudo" do
|
21
|
+
action :upgrade
|
22
|
+
end
|
23
|
+
|
24
|
+
template "/etc/sudoers" do
|
25
|
+
source "sudoers.erb"
|
26
|
+
mode 0440
|
27
|
+
owner "root"
|
28
|
+
group "root"
|
29
|
+
variables(
|
30
|
+
:sudoers_groups => node[:authorization][:sudo][:groups],
|
31
|
+
:sudoers_users => node[:authorization][:sudo][:users]
|
32
|
+
)
|
33
|
+
end
|
@@ -0,0 +1,22 @@
|
|
1
|
+
#
|
2
|
+
# /etc/sudoers
|
3
|
+
#
|
4
|
+
# Generated by Chef for <%= @node[:fqdn] %>
|
5
|
+
#
|
6
|
+
|
7
|
+
Defaults !lecture,tty_tickets,!fqdn
|
8
|
+
|
9
|
+
# User privilege specification
|
10
|
+
root ALL=(ALL) ALL
|
11
|
+
|
12
|
+
<% @sudoers_users.each do |user| -%>
|
13
|
+
<%= user %> ALL=(ALL) ALL
|
14
|
+
<% end -%>
|
15
|
+
|
16
|
+
# Members of the sysadmin group may gain root privileges
|
17
|
+
%sysadmin ALL=(ALL) ALL
|
18
|
+
|
19
|
+
<% @sudoers_groups.each do |group| -%>
|
20
|
+
# Members of the group '<%= group %>' may gain root privileges
|
21
|
+
%<%= group %> ALL=(ALL) ALL
|
22
|
+
<% end -%>
|
@@ -0,0 +1,38 @@
|
|
1
|
+
define :add_keys, :conf => {} do
|
2
|
+
config = params[:conf]
|
3
|
+
name = params[:name]
|
4
|
+
keys = Mash.new
|
5
|
+
keys[name] = node[:ssh_keys][name]
|
6
|
+
|
7
|
+
if config[:ssh_key_groups]
|
8
|
+
config[:ssh_key_groups].each do |group|
|
9
|
+
node[:users].find_all { |u| u.last[:groups].include?(group) }.each do |user|
|
10
|
+
keys[user.first] = node[:ssh_keys][user.first]
|
11
|
+
end
|
12
|
+
end
|
13
|
+
end
|
14
|
+
|
15
|
+
if config[:extra_ssh_keys]
|
16
|
+
config[:extra_ssh_keys].each do |username|
|
17
|
+
keys[username] = node[:ssh_keys][username]
|
18
|
+
end
|
19
|
+
end
|
20
|
+
|
21
|
+
directory "/home/#{name}/.ssh" do
|
22
|
+
action :create
|
23
|
+
owner name
|
24
|
+
group config[:groups] ? config[:groups].first.to_s : name
|
25
|
+
mode 0755
|
26
|
+
not_if { File.exists? "/home/#{name}/.ssh" }
|
27
|
+
end
|
28
|
+
|
29
|
+
template "/home/#{name}/.ssh/authorized_keys" do
|
30
|
+
source "authorized_keys.erb"
|
31
|
+
action :create
|
32
|
+
owner name
|
33
|
+
group config[:groups] ? config[:groups].first.to_s : name
|
34
|
+
variables(:keys => keys)
|
35
|
+
mode 0600
|
36
|
+
not_if { defined?(node[:users][name][:preserve_keys]) ? node[:users][name][:preserve_keys] : false }
|
37
|
+
end
|
38
|
+
end
|
@@ -0,0 +1,17 @@
|
|
1
|
+
def user_is_in_role?(username)
|
2
|
+
return false if !@node[:role]
|
3
|
+
Chef::Log.info role[:groups].inspect
|
4
|
+
role[:groups].include? get_user(username)[:group]
|
5
|
+
end
|
6
|
+
|
7
|
+
def role
|
8
|
+
@node[:roles][@node[:role]]
|
9
|
+
end
|
10
|
+
|
11
|
+
# method name 'user' conflicts with chef, so we use 'get_user'
|
12
|
+
def get_user(username)
|
13
|
+
Chef::Log.info username
|
14
|
+
user = @node[:users][username]
|
15
|
+
Chef::Log.info user.inspect
|
16
|
+
user
|
17
|
+
end
|