1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
|
# File 'manifests/config.pp', line 1
class suricata::config {
if $::suricata::manage_user {
$usr_require = User[$::suricata::user]
user { $::suricata::user:
ensure => present,
system => true,
shell => $::suricata::user_shell,
gid => $::suricata::group,
comment => 'Suricata Open Source IDS / IPS / NSM engine',
require => Group[$::suricata::group],
}
group { $::suricata::group:
ensure => present,
system => true,
}
} else { $usr_require = undef }
file { [$::suricata::config_dir, "${::suricata::config_dir}/rules", "${::suricata::config_dir}/lua-output", $::suricata::log_dir]:
ensure => directory,
owner => $::suricata::user,
group => 'root',
mode => '0755',
require => $usr_require,
before => File["${::suricata::config_dir}/${::suricata::config_name}"],
}
file { "${::suricata::config_dir}/${::suricata::config_name}":
ensure => present,
owner => $::suricata::user,
group => 'root',
mode => '0600',
content => "# This file is managed by Puppet. DO NOT EDIT.\n\n${::suricata::_main_config.to_yaml}",
notify => Service[$::suricata::service_name],
require => $usr_require,
}
file { "${::suricata::config_dir}/classification.config":
ensure => file,
owner => $::suricata::user,
group => 'root',
mode => '0600',
content => epp('suricata/classification.config.epp'),
require => $usr_require,
}
file { "${::suricata::config_dir}/reference.config":
ensure => file,
owner => $::suricata::user,
group => 'root',
mode => '0600',
content => epp('suricata/reference.config.epp'),
require => $usr_require,
}
file { "${::suricata::config_dir}/threshold.config":
ensure => file,
owner => $::suricata::user,
group => 'root',
mode => '0600',
content => epp('suricata/threshold.config.epp'),
require => $usr_require,
}
}
|