From b4611250a6e76c1d7b923344ca5d59402122cd0e Mon Sep 17 00:00:00 2001 From: 7u83 <7u83@mail.ru> Date: Thu, 22 Feb 2018 18:29:51 +0000 Subject: [PATCH] Deleted compiled package --- pkg/7u83-ipsec-0.1.0.tar.gz | Bin 7601 -> 0 bytes pkg/7u83-ipsec-0.1.0/Gemfile | 18 --- pkg/7u83-ipsec-0.1.0/README.md | 89 ------------ pkg/7u83-ipsec-0.1.0/Rakefile | 32 ----- pkg/7u83-ipsec-0.1.0/checksums.json | 29 ---- pkg/7u83-ipsec-0.1.0/examples/init.pp | 12 -- pkg/7u83-ipsec-0.1.0/manifests/init.pp | 126 ----------------- pkg/7u83-ipsec-0.1.0/manifests/isakmpd.pp | 61 --------- .../manifests/isakmpd_params.pp | 33 ----- pkg/7u83-ipsec-0.1.0/manifests/params.pp | 42 ------ pkg/7u83-ipsec-0.1.0/manifests/racoon.pp | 128 ------------------ .../manifests/racoon_params.pp | 39 ------ pkg/7u83-ipsec-0.1.0/manifests/strongswan.pp | 73 ---------- .../manifests/strongswan_params.pp | 28 ---- pkg/7u83-ipsec-0.1.0/metadata.json | 21 --- .../spec/classes/init_spec.rb | 6 - pkg/7u83-ipsec-0.1.0/spec/spec_helper.rb | 1 - pkg/7u83-ipsec-0.1.0/templates/ipsec_top.erb | 5 - .../templates/ipsec_tunnel.erb | 12 -- .../templates/isakmpd_ipsec_conf_header.erb | 3 - .../templates/isakmpd_tunnel.erb | 16 --- .../templates/racoon.conf.erb | 28 ---- .../templates/racoon/ipsec.conf.transport.erb | 10 -- .../templates/racoon/ipsec.conf.tunnel.erb | 12 -- .../templates/racoon/racoon.conf.erb | 33 ----- .../templates/racoon/racoon.conf.header.erb | 29 ---- .../strongswan/ipsec.conf.header.erb | 1 - .../strongswan/ipsec.conf.tunnel.erb | 14 -- .../templates/strongswan/ipsec.secrets.erb | 2 - 29 files changed, 903 deletions(-) delete mode 100644 pkg/7u83-ipsec-0.1.0.tar.gz delete mode 100644 pkg/7u83-ipsec-0.1.0/Gemfile delete mode 100644 pkg/7u83-ipsec-0.1.0/README.md delete mode 100644 pkg/7u83-ipsec-0.1.0/Rakefile delete mode 100644 pkg/7u83-ipsec-0.1.0/checksums.json delete mode 100644 pkg/7u83-ipsec-0.1.0/examples/init.pp delete mode 100644 pkg/7u83-ipsec-0.1.0/manifests/init.pp delete mode 100644 pkg/7u83-ipsec-0.1.0/manifests/isakmpd.pp delete mode 100644 pkg/7u83-ipsec-0.1.0/manifests/isakmpd_params.pp delete mode 100644 pkg/7u83-ipsec-0.1.0/manifests/params.pp delete mode 100644 pkg/7u83-ipsec-0.1.0/manifests/racoon.pp delete mode 100644 pkg/7u83-ipsec-0.1.0/manifests/racoon_params.pp delete mode 100644 pkg/7u83-ipsec-0.1.0/manifests/strongswan.pp delete mode 100644 pkg/7u83-ipsec-0.1.0/manifests/strongswan_params.pp delete mode 100644 pkg/7u83-ipsec-0.1.0/metadata.json delete mode 100644 pkg/7u83-ipsec-0.1.0/spec/classes/init_spec.rb delete mode 100644 pkg/7u83-ipsec-0.1.0/spec/spec_helper.rb delete mode 100644 pkg/7u83-ipsec-0.1.0/templates/ipsec_top.erb delete mode 100644 pkg/7u83-ipsec-0.1.0/templates/ipsec_tunnel.erb delete mode 100644 pkg/7u83-ipsec-0.1.0/templates/isakmpd_ipsec_conf_header.erb delete mode 100644 pkg/7u83-ipsec-0.1.0/templates/isakmpd_tunnel.erb delete mode 100644 pkg/7u83-ipsec-0.1.0/templates/racoon.conf.erb delete mode 100644 pkg/7u83-ipsec-0.1.0/templates/racoon/ipsec.conf.transport.erb delete mode 100644 pkg/7u83-ipsec-0.1.0/templates/racoon/ipsec.conf.tunnel.erb delete mode 100644 pkg/7u83-ipsec-0.1.0/templates/racoon/racoon.conf.erb delete mode 100644 pkg/7u83-ipsec-0.1.0/templates/racoon/racoon.conf.header.erb delete mode 100644 pkg/7u83-ipsec-0.1.0/templates/strongswan/ipsec.conf.header.erb delete mode 100644 pkg/7u83-ipsec-0.1.0/templates/strongswan/ipsec.conf.tunnel.erb delete mode 100644 pkg/7u83-ipsec-0.1.0/templates/strongswan/ipsec.secrets.erb diff --git a/pkg/7u83-ipsec-0.1.0.tar.gz b/pkg/7u83-ipsec-0.1.0.tar.gz deleted file mode 100644 index e19ef7edefabb639362e329fe4ea897bd7c72b58..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 7601 zcmV;i9ZupOiwFQ)3y)d=1MNL)m)o|n`MUfSs5Y)_pOuy`k&+TSNfW0xr+N6=PI`J= z9~C4)iCv0hNov=79rw5282}_fN?Ps9a+(TpY!Q#aU}i8g7=WO=8e4-XE0{mfhsIF< z?kf`57H{>y(GmT6m#J{nopC%T~+eC?qd_{?p&8krIH{=Oume$3M1_@>dD?kG7_t7#c zslaAHetJp#beX}k7a(kgJoKl zryzk#5|yM#<8xLFL8^cr@aGaN6|r=H3)lvP#q6Ax&@PKgf5At=YY50g4Omye@NyC* ze!L2BU_ZS)ea=-mscaW?bCKp}1;>A=X@5&s#HR_FN9TxR4j5Krg^VbHUY0@@q6CI3 zQORgd=Q+(5650A$D;DW024P8x3%~>i{;w4)I76nS$HktLpu}d9CXa*k@fSVLd#G^< z2qK8@$O_bcR6@yjp*m8spg=;B(`3$PZc7@;!zh9I7snjw6XbIv&nMcFCLpTFSRpcx zP6Q@V!Er64B|~Yz3W8cg&VN4rxW*vsGnYJm{L}MSVBo&`{_$f?17xGJ4+_CMkJ42k zBtS*KOjrJb6(^X;D0G4_L4|mo+ar8p&s;w z#7bB5MVn|@OnsGVQ%!qJz9Ml1E(5X$d}|nNM*TA&J^U(IejfSw3nVxN??q1QvNKgK zqBtfr20!Hl)LI17-7k3?_Lljp5+wdHOw0`IJWRTX6)Gj<&{t)O((8jfToNf51-APu z%~1^&90eRc!cTJ`N=cHmj09zSIMd-@k3f|vO1cE zMiSJ|rLdF&0g^BlfQdvrC{FYoI|T!(3INaubwa-4Fomkoa2iy|aRVp-o)BNxid2SF9`DR+8z+d2SIlY9Q1n6L|5P2W` zs&pCsA8V8j{KNqS+`MQZ%s7}-RrCOR4S_^feCfPv0)LP zt>+OX(z3k-JC0-I6adu497VY**2V%hjDu>tluF~G&Jt6M&>Sg@)Vr#OlP!=cty%G^ zYOI>lB2{$Nij$rzSt&`>M==(qLF%utKe`D^&{P{SJ!z(I%|no++uXT%}nSgJSkj7_r7zMDem) zo>SEk`VFG)FJS5ea!%tF6BEBw!Sjkqza&doNTL>ymRPj?hJ|z$m!h@6B)JsxLGdx= z#BWV_PRVu8v+}GqIHaVqtr~LcFTmo2d{-2!%J^?qxzJ)M9A`;-Y_?!r?UGvC62-Fx zpEN=dR22%KPA^!IE@6^cm6utY#+6NMkjzHF8P_vA;l7nd`H-`tGI0q)<)bGL zg%iTt3t`jz%JuC4deo>A8iQnmDMNOvCQVLTKHW&jSj>4nHcwN70gO+Dphr)qq)ska`}ZQ%8_Ex}SA60JeV0H)fGkQb2ob(&45D6Fp_bC|FT z9^%x5>Hi+O8nza@!vcyQ_JgQEBRd=GpcV6?|7d#y(6y8=`=5|9U$N~Kqj>^rnHiY7 zMFEvx_mO_5j~|~t9%dPaZnLv_{rE=H(6W<0x7rk3F<690AuG5K#lSs-Jn4M!crITs z_B9+jnVwgTf)vQ`O_aax*Ug(QhUhk;pZ#l9_$!Zu6${c6j6(kfR~a?D!5~S~j2yqK zTDCi+l{Oti1u}R}25-sW73mN9fI(I1J^7VLysB|>=@G1Xu}TOE z>q$)?=?r4*zeHLOD~8~cV8-jIXfkcuOtC==#flRsx6>&~?rY3^GmMh+^o%K}>}&q7 z>3@I0{Ig=UEQUB~@1>6&`roo`tF!-W8J2U<|NBVqK<0XK&$l-vJ>An;XxVh+n$~3O zj2+AIOvkVd%QkJ(3VRrR>eZV>*o2Nedt^DGIrUSpPNK2yL1&@M+!1r^F-|rE=rIY#PUr^? zTN}J++{S)18k>$eaV;l+-rZmv+Wu%nO&h$n&~Zjx7)6=Gs=0vGl?31!x)Y8V9W$mI zBio!9b~pwSP9~wJha-PGfHoq)K&FpPlN#aJ)OBW0CLn+TomjdT=$<3tNaus=F>D5$ zhss_!b|x;fOy>I|_-|~&&yac}DLdQ($&dgSAMOr;nd4I6g`<$#0d@WH#HRqkWNaL; zi9NQ*oqF{0Z>f2|^@4V6N*EAcV<`Ng#*cSUIkhXJwk9sY3v44E^h- z;{}E_F>TMIV+W?%#59eG;h1a-fK`&PxPsvT<9!f7dqPczQV?gyw7kg#7;3_VGS^^8 zITob)041bJID#3^Od7b<0~vr>ghTd#nG?&P?lmB_c|hsNvcu4F85>y!=!Jl} zY%(%E&l^)9>}G&1oJ{H(6ORJhblvsoBnWjo1oc35#~K^H-UZRjO_gG8v~-s`Bf|qt zp&R3g2N=;YrDKCpn;Ag1>%nYu!Ej*0z^t|1(4xBS8ej=5&vaP`k~6j^J7L2AIRg)_ z!qIabG#;)QnEKeFzD^AaWSdYLIMg$H+WU`fqCaR_^ZzQVdyjqG{QRG(8}{M+-#*e- z{#UNkJ@m2j{GZ!B|6^J1!T;Y&I<8LbFj&5d!ywhhJQF(@tAYgtmdbKd<-5cmioI@H z^8KkgfT0~%yB!O9&iHOq4y*VqO?a%HFO{phqItl;(aNj6YVLGlgjw#x06g5l7;4Ax z>lJ#0e4D3SumpEO5hoGgmN5<7L%FOX84qy}5|^?vM!(D=aR>rnu{=+6u~B#)u?yT5 zO6R!A!p`}zA;bYAFDu-1Z$T?|H>ZW>7RSKEmMqqMUhk2^!=O&Q z>>Ig}uO4`4T0SQK5QjIK;(tK)v$x>XC$zIAE)U%CTJ<3`)a|@HLMy}fxWUS#L)6#9 z`H=Kp;;EAG5>G4=Zu9V%Lk6n_MwcWhGkz`$vBGl`pz!mYUJiR4yI*J?;U>a{Vf|0F zJ1z~Ouw=@)gY&9wb-t@P_b1Nz$&HUL9jbOnhAtiWISB+*RjR3gMy5JzB2M*0^1uow zP!u9GJXFOGhe$dNC52w8$5Ft_`7n3$_wZ^l;3eF76}$h=)VCWJO`b zn$sssJT!?=@kDS%lto&U3G`D8d*mT*n4ci5d7OFxsiBypDV|_DPa`}p1(rC3-+3d0 zia1f^50*&B#T+`rN1UwBq>HQYkLQ0WeP3)xB*1s1&*i#56}j(u&97GFB30#@=b|np zpX1+OE@>1G^VL(H|8<&O=6JY46_|Djffdh~s7;|)BU&IXhSoEG(|0!e1_Ubas)6|#JH6_=94*$a+eA9tfZ&z-{g|&bL=s`XqJx-|U z^wW1u?e{$>uNc|Gim>JffHf(fl8USx7W~oVoR!c-^noD#BXB1~Ae7^_Nr!dPFIM!l8&5_erN?>y3mqMFDIb}tsJO+!*5931V z*s*n;b3Rzi@GwdSxrTkBX^%9ZRoBaF3&^K38~&+jw3&dCeiZ?bjxU&aS?D#^f5Qn{ zMkPk{fua?0I7t;s9o3ZLB`V#HkZwFz67Wb85OVl0o>iQQ3?wCVQ&Zw;Ll!I$#C(;p8wI^j{k3)mVNO5_mPf|HPz1mT_m_p$Yz%V%nZ0);HpPuw~5@OLyIl^kL+wd zL%)vv;R*O@!k8Z))kW3W=vmgOz;!AwLM_>@iskR|FLsUUqB5#6@wx@~=A>hSO7e(f z$Mu^;6?NWG1MX=Dp72bLH1sOc#0L)^wQjRFCcKL!I=|SsuRCC?HQ}a+2GePn(>Y)I zypu{^-Bshd8w3*1{sVv(Y{V_iC0>2u1Rzv=Q4h1KO^=7dW4(IouK(yn;)U;z@L_-} zf5t9nKJMxRF$0N(a_I5 z!nadk6<6E7DN)U8OD<)0#iwm7QEaHnhwA{nCO?`Dt^T9RsD8Bhzgzz|d+)dHW0(H7 z+;045G;$B`|L-MjQU8iA-?&=rEEXG853>~DtiU{6Rsz(kYbbiUhhA)v%tc`{iO|%X zveH*}fct1qu#!YgzA@KbWh(lM11Y>n?)myuY2g}!*orUbqZj_;No3&|lVj+H= zk=-8e_JaD;>cr03ytAIJN?JIqA1P?n1qCY(WwxtB_ON_gwyG**Qajx+Zc#ia(=;yD zyHwx^f@~zts>lU_)H)IZlyNN5w2k3B&(wTj!9S+X{Vk;{^#7gpewB9Ue^a-+`rp=_ z!~G9?N!qbsbH@zaQ2n=+j}Rw5&o^rzoW8|Mt`(Ga*ziS`6_W#Yb{eQ6khyDM( zq+{}evzdJN{3Tvb(eeU>1ZNqd*t03{9v5CD zJM4+gnWIYWT@6Uq>HzD@J2UzsTqWKtY=T-nRqyxSoRH&hL8HI!E4h6h>Dm+#>o(>c z^G$de3tPj#+D=x{Z>jd)Rv;Tfb+|xm1t9Mwa;HW&)$#H0W<%Hvn&S)iXe+iv(^QkX zCB&(AaMKv)l}F<-#>r8;I$XOxo{tr9`z>2wJ6(~Cs(&{GUN@4MdO>?tOm zmvkc3CtInokqEN;Z4~Grxr++DW2t7KLGgDv;ko0{4IYbn*NYvux758jy$GXX!S~JA z_TgJw>3yJ0X6dfU3)Xht@rHyxhR(M|rkwq~D>yRhzP{mK%hxS8{_i4lSy0Q|#}c0%?^OLZ zr0K98x!<(Y|G)e8&o$zIPIvzY)&vLte;;Xszkk!cpF?13-@!k1C#5frK>Q}Cyb+TI z%vFR|8FdH&9zuYJw4Zc^{cqjhaF;%I*?-$s-v2U3X#aKNu>ZH0w08cl;rg~CfMTg5 z!c)p=tF_xYAWJB!nW%ko?XzC>+4&>&jCXakyM31XQ@M;f*>o~-4JUCpQ8^CS)M$m| zS_cBRo(F8lP1H9Dj+BVsS|?2t8JO(EC7%oQUaRf41|T;D_L|_KWR$uPmjOh63&Lz; z7^y1U5J#$twgi%H8!~F4vpZm<$fz1Lx+==|Q386qF3FHFzV&00O~d;-DS5kC!iG70 z{dmHz>pWx}<_g4+yEj5^O^$AYo^mtDZ{T3&p3=4K{~cohyUu@_x>MVKi`#$48XfHa zUeb2+f2Sj$HI$9#JKJl__4AOzYmmTHD~RRCM9C<`=VkETd;UT)zifV0;LYo+3|}vk zEu<}$jtE}seZlY|WV|z6T1$LcR@Q5wQM)?Lp-#m>wwF;50dHoEtJxQF=feiFa` z6Ey-}hSms!xJIoygMs&?p>T*?%3pr3>dPw+#W$WXlOH4z*XWC=lBf}bYDo&-%~!Dg zTCjmx0Ti#XVu^SLFZQ3zFTnuKF*jMoG0%_q#{y=nJXUi9<)b%{|C+xx{Z76-T@S6f z-g;1!K^%F#>iz0!lr!biVc4SjMqrQEdw;SMuJB`T3K#x(hv9l>?3XDe|7)qJ@s*m`=3V6=)nJdq$~N~y8rg}eeAOTrn&b1 zpK*Bqdq1iE(1QB?T&@0^m)rmqSKRYp%G(mwHE7%e_0vJ(Q#kllrRD}6*^1vV^sc(S z2Vu}CnQ;k|p_u+7QeE}G&#Uhb>62~qzkPZ2UHjNI|Dka0{I_xN|M!x1eg8#VPS*Om z_F;nlj?&uvudmL&zdmkr|EGJn|9LNIJOA6q(eKj7PW?aXe*epM5Bh&U>6rY$KLX9K zcosH5JJ!N@RV+T!iY$=74m$sLns(3sdcXG8ee9b5BWwNquXWh}+e_kit8*5^j~`*> zHYJ}wctXAu`|l6<1*V$z`2+H0!uQ6jZ<)c3OMRE&gQo+Y(YzY);OVLKU_V>KWMi+J&}(B7 zC0h|u`yF&qYY+iy!8#U+_p!OVJ6$#Zuev|%CVlL*|K0C@nxGR7_do3=;rv%TfajG5 z@Uihar2V98%>O%k0K4YD?RM|~9J$Wn`@efhceel086#jPNtmZgveC|#>1Lb!ca2vf zT|-JT#&WV|aG`#6A@-8uH&|BXf-IKQA1s3r-cL^`D+cDsA>zC$zQ=3mrmeIC`|O`x zzag~b7a;dIF8J%g)1G48e-C#dUorp1?)^RVar5|(WseT~e|t$g`M>pj;OqCXOaEKl z_diYW2oL*zdr4gXS8UyC0@SrtOI5FHX`w6mIrJ?nyQ;U-jZ3!;(AGML*cH-_*qa5|gva!WyKLa23dsGV=L%)MiUoF46$+zM2&a znzLYb#x9#y@2g+OWX=+X-!GeGX&m|Z1-Z}g6^1KRV{ zIaAVu^$@>rsz($ctxJY@qb8>T)XJN7NG)MyVNu^eB=lgF(ZEr&rY)LRKumeH5wDKF zo5u2KO8U6kp22FnPsF;p0C5RZ0_r+vMR9HIyjFjQVZkeuno$bZv3}%Yvt2k_l;(9i z64R+K3BhaPCtwlLcC~HiNB|2K@a??1cF=&=6V zO9E|wOcWMx+6*8UQ5@rU7t?c=Uw|-|EFrXn+4i=qKE9l<5_A;tL(1ZtET3r^Ef*by zDnn_Vi&Gvv?ZFz2SNB;Cjd6-G(o=6!!GZ#-9ZTCplQg+prYn3w@%SpER2M2%>6moV zMm<1TF*8TbXY18Fh6*&>hDz77Fl)_f9b3gAl{)X6pPS6kG1#HwO1D<@QAXP+KT`pE z&9QG)f0c4q>h4g0$A{0z{Z`UW{eKt7U#6Y3F$z{QG00bVz$lH=h5u*aO^o{>xcA z|7p92{lC4WtK!zc@1(OESUH9<3(F_n9Wd<(vx}7n5T0y^>1s!LG+)Se>b61+mX~({ zC_&!3VsyryfMW}OEgs?;RIYX72^ZO>@;~q>Zu*2@8YLpS-sKZDUDwnP^M4;{!vUMlmfw^-fBBcr8OYz=G&rO~ TI;2DTuS@?AUM_vy0KxzOjjIDk diff --git a/pkg/7u83-ipsec-0.1.0/Gemfile b/pkg/7u83-ipsec-0.1.0/Gemfile deleted file mode 100644 index 4333d23..0000000 --- a/pkg/7u83-ipsec-0.1.0/Gemfile +++ /dev/null @@ -1,18 +0,0 @@ -source ENV['GEM_SOURCE'] || 'https://rubygems.org' - -puppetversion = ENV.key?('PUPPET_VERSION') ? ENV['PUPPET_VERSION'] : ['>= 3.3'] -gem 'metadata-json-lint' -gem 'puppet', puppetversion -gem 'puppetlabs_spec_helper', '>= 1.2.0' -gem 'puppet-lint', '>= 1.0.0' -gem 'facter', '>= 1.7.0' -gem 'rspec-puppet' - -# rspec must be v2 for ruby 1.8.7 -if RUBY_VERSION >= '1.8.7' && RUBY_VERSION < '1.9' - gem 'rspec', '~> 2.0' - gem 'rake', '~> 10.0' -else - # rubocop requires ruby >= 1.9 - gem 'rubocop' -end diff --git a/pkg/7u83-ipsec-0.1.0/README.md b/pkg/7u83-ipsec-0.1.0/README.md deleted file mode 100644 index 7c319ac..0000000 --- a/pkg/7u83-ipsec-0.1.0/README.md +++ /dev/null @@ -1,89 +0,0 @@ -# ipsec - -#### Table of Contents - -1. [Description](#description) -1. [Setup - The basics of getting started with ipsec](#setup) - * [What ipsec affects](#what-ipsec-affects) - * [Setup requirements](#setup-requirements) - * [Beginning with ipsec](#beginning-with-ipsec) -1. [Usage - Configuration options and additional functionality](#usage) -1. [Reference - An under-the-hood peek at what the module is doing and how](#reference) -1. [Limitations - OS compatibility, etc.](#limitations) -1. [Development - Guide for contributing to the module](#development) - -## Description - -Start with a one- or two-sentence summary of what the module does and/or what -problem it solves. This is your 30-second elevator pitch for your module. -Consider including OS/Puppet version it works with. - -You can give more descriptive information in a second paragraph. This paragraph -should answer the questions: "What does this module *do*?" and "Why would I use -it?" If your module has a range of functionality (installation, configuration, -management, etc.), this is the time to mention it. - -## Setup - -### What ipsec affects **OPTIONAL** - -If it's obvious what your module touches, you can skip this section. For -example, folks can probably figure out that your mysql_instance module affects -their MySQL instances. - -If there's more that they should know about, though, this is the place to mention: - -* A list of files, packages, services, or operations that the module will alter, - impact, or execute. -* Dependencies that your module automatically installs. -* Warnings or other important notices. - -### Setup Requirements **OPTIONAL** - -If your module requires anything extra before setting up (pluginsync enabled, -etc.), mention it here. - -If your most recent release breaks compatibility or requires particular steps -for upgrading, you might want to include an additional "Upgrading" section -here. - -### Beginning with ipsec - -The very basic steps needed for a user to get the module up and running. This -can include setup steps, if necessary, or it can be an example of the most -basic use of the module. - -## Usage - -This section is where you describe how to customize, configure, and do the -fancy stuff with your module here. It's especially helpful if you include usage -examples and code samples for doing things with your module. - -## Reference - -Users need a complete list of your module's classes, types, defined types providers, facts, and functions, along with the parameters for each. You can provide this list either via Puppet Strings code comments or as a complete list in this Reference section. - -* If you are using Puppet Strings code comments, this Reference section should include Strings information so that your users know how to access your documentation. - -* If you are not using Puppet Strings, include a list of all of your classes, defined types, and so on, along with their parameters. Each element in this listing should include: - - * The data type, if applicable. - * A description of what the element does. - * Valid values, if the data type doesn't make it obvious. - * Default value, if any. - -## Limitations - -This is where you list OS compatibility, version compatibility, etc. If there -are Known Issues, you might want to include them under their own heading here. - -## Development - -Since your module is awesome, other users will want to play with it. Let them -know what the ground rules for contributing are. - -## Release Notes/Contributors/Etc. **Optional** - -If you aren't using changelog, put your release notes here (though you should -consider using changelog). You can also add any additional sections you feel -are necessary or important to include here. Please use the `## ` header. diff --git a/pkg/7u83-ipsec-0.1.0/Rakefile b/pkg/7u83-ipsec-0.1.0/Rakefile deleted file mode 100644 index df59df7..0000000 --- a/pkg/7u83-ipsec-0.1.0/Rakefile +++ /dev/null @@ -1,32 +0,0 @@ -require 'puppetlabs_spec_helper/rake_tasks' -require 'puppet-lint/tasks/puppet-lint' -require 'metadata-json-lint/rake_task' - -if RUBY_VERSION >= '1.9' - require 'rubocop/rake_task' - RuboCop::RakeTask.new -end - -PuppetLint.configuration.send('disable_80chars') -PuppetLint.configuration.relative = true -PuppetLint.configuration.ignore_paths = ['spec/**/*.pp', 'pkg/**/*.pp'] - -desc 'Validate manifests, templates, and ruby files' -task :validate do - Dir['manifests/**/*.pp'].each do |manifest| - sh "puppet parser validate --noop #{manifest}" - end - Dir['spec/**/*.rb', 'lib/**/*.rb'].each do |ruby_file| - sh "ruby -c #{ruby_file}" unless ruby_file =~ %r{spec/fixtures} - end - Dir['templates/**/*.erb'].each do |template| - sh "erb -P -x -T '-' #{template} | ruby -c" - end -end - -desc 'Run lint, validate, and spec tests.' -task :test do - [:lint, :validate, :spec].each do |test| - Rake::Task[test].invoke - end -end diff --git a/pkg/7u83-ipsec-0.1.0/checksums.json b/pkg/7u83-ipsec-0.1.0/checksums.json deleted file mode 100644 index 8d338e6..0000000 --- a/pkg/7u83-ipsec-0.1.0/checksums.json +++ /dev/null @@ -1,29 +0,0 @@ -{ - "Gemfile": "0b0ef34a57239868636b26141342423f", - "README.md": "a5b4536f36ecfaf9b006108e3eef7c19", - "Rakefile": "158b889261acd98356f6e0f2a031b6b9", - "examples/init.pp": "43f2a9901e66401685dfe3d4db835c34", - "manifests/init.pp": "93c3f7d6596d15b3fdfa1c49e4863437", - "manifests/isakmpd.pp": "424a6dae7d294cdb79c71f3f1fe8660d", - "manifests/isakmpd_params.pp": "a75273d0f3577c540a48dc71be0423d9", - "manifests/params.pp": "c4981d62b9ea633cd59a034eb9c846d0", - "manifests/racoon.pp": "0b40af7e75e6481324193c9d86fcd6e7", - "manifests/racoon_params.pp": "5582629736d3cd7d8f4c55a24603f665", - "manifests/strongswan.pp": "b106f5ea8ee01542914f83f199fb0f5c", - "manifests/strongswan_params.pp": "96de0822a1f8200e499453da930bd0b6", - "metadata.json": "65900ebf8697e32ecc5c5c8232efab54", - "spec/classes/init_spec.rb": "4bf5fa4da7c89cacc52ee8de94848bc5", - "spec/spec_helper.rb": "0db89c9a486df193c0e40095422e19dc", - "templates/ipsec_top.erb": "e84bf026bd13924bba8606192219162e", - "templates/ipsec_tunnel.erb": "6419c0f349a26aa7d2623b99cd724012", - "templates/isakmpd_ipsec_conf_header.erb": "e13d611da756f7dced378eb6afb12b7f", - "templates/isakmpd_tunnel.erb": "d7155f03563e5d9ff437846d8373cc1f", - "templates/racoon/ipsec.conf.transport.erb": "b65510f46b902b6806b26055bcb474c2", - "templates/racoon/ipsec.conf.tunnel.erb": "6419c0f349a26aa7d2623b99cd724012", - "templates/racoon/racoon.conf.erb": "9f5be0e2ad7abe40c55d9ffb606931a7", - "templates/racoon/racoon.conf.header.erb": "aa534ff37ee53159ade7e952bbb8a155", - "templates/racoon.conf.erb": "2a719ba6af007ca9df04fd86a06381c0", - "templates/strongswan/ipsec.conf.header.erb": "07a651b7d80189be95a8aa81ea4e1cd7", - "templates/strongswan/ipsec.conf.tunnel.erb": "169545c847f3a04711e63b27ef63e849", - "templates/strongswan/ipsec.secrets.erb": "0b76db8372d2083ac0a1abb89aad6ab2" -} \ No newline at end of file diff --git a/pkg/7u83-ipsec-0.1.0/examples/init.pp b/pkg/7u83-ipsec-0.1.0/examples/init.pp deleted file mode 100644 index c2a2360..0000000 --- a/pkg/7u83-ipsec-0.1.0/examples/init.pp +++ /dev/null @@ -1,12 +0,0 @@ -# The baseline for module testing used by Puppet Inc. is that each manifest -# should have a corresponding test manifest that declares that class or defined -# type. -# -# Tests are then run by using puppet apply --noop (to check for compilation -# errors and view a log of events) or by fully applying the test in a virtual -# environment (to compare the resulting system state to the desired state). -# -# Learn more about module testing here: -# https://docs.puppet.com/guides/tests_smoke.html -# -include ::ipsec diff --git a/pkg/7u83-ipsec-0.1.0/manifests/init.pp b/pkg/7u83-ipsec-0.1.0/manifests/init.pp deleted file mode 100644 index 2376602..0000000 --- a/pkg/7u83-ipsec-0.1.0/manifests/init.pp +++ /dev/null @@ -1,126 +0,0 @@ -# Class: ipsec -# =========================== -# -# Full description of class ipsec here. -# -# Parameters -# ---------- -# -# Document parameters here. -# -# * `sample parameter` -# Explanation of what this parameter affects and what it defaults to. -# e.g. "Specify one or more upstream ntp servers as an array." -# -# Variables -# ---------- -# -# Here you should define a list of variables that this module would require. -# -# * `sample variable` -# Explanation of how this variable affects the function of this class and if -# it has a default. e.g. "The parameter enc_ntp_servers must be set by the -# External Node Classifier as a comma separated list of hostnames." (Note, -# global variables should be avoided in favor of class parameters as -# of Puppet 2.6.) -# -# Examples -# -------- -# -# @example -# class { 'ipsec': -# } -# -# Authors -# ------- -# -# 7u83 <7u83@mail.ru> -# -# Copyright -# --------- -# -# Copyright 2018 7u83@mail.ru -# -class ipsec( - $version = 'latest', - $ikedaemon = undef -){ - - if $ikedaemon == undef { - case $::osfamily { - 'FreeBSD':{ - $ike_daemon = 'racoon' - } - 'OpenBSD':{ - $ike_daemon = 'isakmpd' - } - default: { - $ike_daemon = 'racoon' - } - } - } - else { - $ike_daemon = $ikedaemon - } - - $res = "ipsec::${ike_daemon}" - - class { "$res": - version => $version - } - -} - - -define ipsec::tunnel ( - $local_ip, - $remote_ip, - $nets, - $proto = "any", - $psk, - $hash = 'sha256', - $encryption = 'aes256', - $lifetime = '86400', - $dh_group = 14, - -) -{ - include ::ipsec - $ikedaemon = $::ipsec::ike_daemon - $res = "ipsec::${ikedaemon}::tunnel" - - Resource[$res] { "$title": - local_ip => $local_ip, - remote_ip => $remote_ip, - nets => $nets, - proto => $proto, - psk => $psk, - lifetime => $lifetime, - hash => $hash, - encryption => $encryption, - dh_group => 14, - } - -} - -define ipsec::transport ( - $local_ip, - $remote_ip, - $proto = "any", - $psk -) -{ - include ::ipsec - $ikedaemon = $::ipsec::ike_daemon - $res = "ipsec::${ikedaemon}::transport" - - Resource[$res] { "$title": - local_ip => $local_ip, - remote_ip => $remote_ip, - proto => $proto, - psk => $psk - } - -} - - diff --git a/pkg/7u83-ipsec-0.1.0/manifests/isakmpd.pp b/pkg/7u83-ipsec-0.1.0/manifests/isakmpd.pp deleted file mode 100644 index dd88331..0000000 --- a/pkg/7u83-ipsec-0.1.0/manifests/isakmpd.pp +++ /dev/null @@ -1,61 +0,0 @@ -## - -class ipsec::isakmpd ( - $version = 'latest' - -) inherits ipsec::isakmpd_params { - - if $pkg_name != false { -# if $pkg_provider_p != false { -# $provider = $pkg_provider_p -# } -# else { -# $provider = $pkg_provider -# } - - package { 'isakmpd': - name => $pkg_name, - provider => $pkg_provider - } - } - - - concat { "$ipsec_conf": - mode => '0600' - - } - - concat::fragment { "ipsec_conf_header": - target => "$ipsec_conf", - order => '00', - content => template('ipsec/isakmpd_ipsec_conf_header.erb'), - - } - - exec { "$setkey_cmd": - subscribe => Concat[ "$ipsec_conf" ], - refreshonly => true - } - - - -} - - -define ipsec::isakmpd::tunnel ( - $local_ip, - $remote_ip, - $nets, - $proto = "any", - $psk - -){ - notify { "$title: $::ipsec::isakmpd_params::ipsec_conf": } - - concat::fragment { "$title": - target => "$::ipsec::isakmpd_params::ipsec_conf", - content => template('ipsec/isakmpd_tunnel.erb') - } - -} - diff --git a/pkg/7u83-ipsec-0.1.0/manifests/isakmpd_params.pp b/pkg/7u83-ipsec-0.1.0/manifests/isakmpd_params.pp deleted file mode 100644 index 5de299d..0000000 --- a/pkg/7u83-ipsec-0.1.0/manifests/isakmpd_params.pp +++ /dev/null @@ -1,33 +0,0 @@ -# - -class ipsec::isakmpd_params { - case $::osfamily { - 'FreeBSD':{ - $pkg_name = "security/isakmpd" - $pkg_provider = "portsng" - $ipsec_conf = '/etc/ipsec.conf' - - $isakmpd_service = 'isakmpd' - $setkey_cmd = '/sbin/ipsecctl -f /etc/ipsec.conf' - } - 'OpenBSD':{ - $isakmpd_service = 'isakmpd' - $pkg_name = false - $pkg_provider = undef - $ipsec_conf = '/etc/ipsec.conf' - $setkey_cmd = '/sbin/ipsecctl -f /etc/ipsec.conf' - } - default: { - $racoon_pkg = 'racoon' - $racoon_conf = '/etc/racoon/racoon.conf' - $racoon_pskfile = '/etc/racoon/psk.txt' - $racoon_service = 'racoon' - $ipsec_conf = '/etc/racoon-tools.conf' - $racoon_service = 'setkey' - $setkey_cmd = '/usr/sbin/setkey' - $racoon_usr = 'root' - $racoon_grp = 'root' - } - } -} - diff --git a/pkg/7u83-ipsec-0.1.0/manifests/params.pp b/pkg/7u83-ipsec-0.1.0/manifests/params.pp deleted file mode 100644 index 8a3c100..0000000 --- a/pkg/7u83-ipsec-0.1.0/manifests/params.pp +++ /dev/null @@ -1,42 +0,0 @@ - -#params - -class ipsec::params { - case $::osfamily { - 'FreeBSD':{ - $racoon_pkg = 'ipsec-tools' - $racoon_conf = '/usr/local/etc/racoon/racoon.conf' - $racoon_pskfile = '/usr/local/etc/racoon/psk.txt' - $racoon_service = 'racoon' - $ipsec_conf = '/etc/ipsec.conf' - $ipsec_service = 'ipsec' - $setkey_cmd = '/sbin/setkey' - $racoon_usr = 'root' - $racoon_grp = 'wheel' - } - 'OpenBSD':{ - $ikedaemon = 'isakmpd' - $racoon_pkg = 'ipsec-tools' - $racoon_conf = '/usr/local/etc/racoon/racoon.conf' - $racoon_pskfile = '/usr/local/etc/racoon/psk.txt' - $racoon_service = 'racoon' - $ipsec_conf = '/etc/ipsec.conf' - $ipsec_service = 'ipsec' - $setkey_cmd = '/sbin/setkey' - $racoon_usr = 'root' - $racoon_grp = 'wheel' - } - default: { - $racoon_pkg = 'racoon' - $racoon_conf = '/etc/racoon/racoon.conf' - $racoon_pskfile = '/etc/racoon/psk.txt' - $racoon_service = 'racoon' - $ipsec_conf = '/etc/ipsec-tools.conf' - $ipsec_service = 'setkey' - $setkey_cmd = '/usr/sbin/setkey' - $racoon_usr = 'root' - $racoon_grp = 'root' - } - } -} - diff --git a/pkg/7u83-ipsec-0.1.0/manifests/racoon.pp b/pkg/7u83-ipsec-0.1.0/manifests/racoon.pp deleted file mode 100644 index 29fd4d7..0000000 --- a/pkg/7u83-ipsec-0.1.0/manifests/racoon.pp +++ /dev/null @@ -1,128 +0,0 @@ -# Racoon IPSec - -class ipsec::racoon ( - $version = 'latest' - -)inherits ipsec::racoon_params{ - - - package {'racoon': - name => "$racoon_pkg", - ensure => "$version", - } - - service {'racoon': - name => "$racoon_service", - ensure => 'running', - require => Concat["$racoon_conf"], #File['racoon_conf'], - subscribe => Concat["$racoon_conf"], - enable => true, - } - - service {'ipsec': - name => "$ipsec_service", - enable => true, - } - - exec { "$setkey_cmd -f $ipsec_conf": - subscribe => Concat[ "$ipsec_conf" ], - refreshonly => true - } - - - concat { "$racoon_conf": - ensure => present - } - - concat::fragment { "$racoon_conf header": - target => "$racoon_conf", - order => '00', - content => template('ipsec/racoon/racoon.conf.header.erb'), - } - - - - concat { "$ipsec_conf": - ensure => present - - } - - concat::fragment { "ipsec_conf_header": - target => "$ipsec_conf", - order => '00', - content => template('ipsec/ipsec_top.erb'), - } - - concat { "$racoon_pskfile": - owner => "$racoon_usr", - group => "$racoon_grp", - mode => '0600', - ensure => present - - } - concat::fragment { "pskfile_header": - target => "$racoon_pskfile", - order => '00', - content => "#racoon psks\n", - } - -} - - - -define ipsec::racoon::tunnel ( - $local_ip, - $remote_ip, - $encryption = 'blowfish', - $hash = 'sha256', - $dh_group = 'modp3072', - $lifetime = '86400 sec', - - $nets, - $proto = "any", - - $psk - -) -{ - concat::fragment { "$title": - target => "$::ipsec::racoon_params::ipsec_conf", - content => template('ipsec/ipsec_tunnel.erb') - } - - concat::fragment { "psk_$title": - target => "$::ipsec::racoon_params::racoon_pskfile", - content => "$remote_ip $psk\n" - } - - concat::fragment { "racoon_conf_$title": - target => "$::ipsec::racoon_params::racoon_conf", - content => template('ipsec/racoon/racoon.conf.erb') - } - - -} - -define ipsec::racoon::transport ( - $local_ip, - $remote_ip, - $proto = "any", - $encryption = 'blowfish', - $hash = 'sha256', - $dh_group = 'mopd3072', - $psk - -) -{ - concat::fragment { "$title": - target => "$::ipsec::racoon_params::ipsec_conf", - content => template('ipsec/racoon/ipsec.conf.transport.erb') - } - - concat::fragment { "psk_$title": - target => "$::ipsec::racoon_params::racoon_pskfile", - content => "$remote_ip $psk\n" - } - -} - diff --git a/pkg/7u83-ipsec-0.1.0/manifests/racoon_params.pp b/pkg/7u83-ipsec-0.1.0/manifests/racoon_params.pp deleted file mode 100644 index 2ce6d1d..0000000 --- a/pkg/7u83-ipsec-0.1.0/manifests/racoon_params.pp +++ /dev/null @@ -1,39 +0,0 @@ -class ipsec::racoon_params { - case $::osfamily { - 'FreeBSD':{ - $racoon_pkg = 'ipsec-tools' - $racoon_conf = '/usr/local/etc/racoon/racoon.conf' - $racoon_pskfile = '/usr/local/etc/racoon/psk.txt' - $racoon_service = 'racoon' - $ipsec_conf = '/etc/ipsec.conf' - $ipsec_service = 'ipsec' - $setkey_cmd = '/sbin/setkey' - $racoon_usr = 'root' - $racoon_grp = 'wheel' - } - 'OpenBSD':{ - $ikedaemon = 'isakmpd' - $racoon_pkg = 'racoon-tools' -# $racoon_conf = '/usr/local/etc/racoon/racoon.conf' - $racoon_pskfile = '/usr/local/etc/racoon/psk.txt' - $racoon_service = 'racoon' -# $racoon_conf = '/etc/racoon.conf' - $ipsec_service = 'racoon' - $setkey_cmd = '/sbin/setkey' - $racoon_usr = 'root' - $racoon_grp = 'wheel' - } - default: { - $racoon_pkg = 'racoon' - $racoon_conf = '/etc/racoon/racoon.conf' - $racoon_pskfile = '/etc/racoon/psk.txt' - $racoon_service = 'racoon' - $ipsec_conf = '/etc/ipsec-tools.conf' - $ipsec_service = 'setkey' - $setkey_cmd = '/usr/sbin/setkey' - $racoon_usr = 'root' - $racoon_grp = 'root' - } - } -} - diff --git a/pkg/7u83-ipsec-0.1.0/manifests/strongswan.pp b/pkg/7u83-ipsec-0.1.0/manifests/strongswan.pp deleted file mode 100644 index fc77c50..0000000 --- a/pkg/7u83-ipsec-0.1.0/manifests/strongswan.pp +++ /dev/null @@ -1,73 +0,0 @@ -## - -class ipsec::strongswan ( - $version = 'latest', - $enable = $::ipsec::strongswan_params::service_enable, - $local_ip, - $remote_ip, - $nets, - $proto, - $psk, - $lifetime, - $hash, - $encryption, - $h_group, - -) inherits ipsec::strongswan_params { - - package { 'strongswan': - name => $pkg_name, - provider => $pkg_provider, - ensure => $version - } - - service { 'strongswan': - ensure => running, - require => Package['strongswan'], - subscribe => Concat[ "$ipsec_conf" ], - enable => $enable - } - - concat { "$secrets_file": - owner => "$secrets_usr", - group => "$secrets_grp", - mode => '0600' - } - concat::fragment { "pskfile_header": - target => "$secrets_file", - order => '00', - content => "#strongswan psks\n", - } - - concat { "$ipsec_conf": - } - - concat::fragment { "ipsec_conf_header": - target => "$ipsec_conf", - order => '00', - content => template('ipsec/strongswan/ipsec.conf.header.erb'), - } -} - - -define ipsec::strongswan::tunnel ( - $local_ip, - $remote_ip, - $nets, - $proto = "any", - $psk - -){ - - concat::fragment { "$title": - target => "$::ipsec::strongswan_params::ipsec_conf", - content => template('ipsec/strongswan/ipsec.conf.tunnel.erb') - } - - concat::fragment { "$title psk": - target => "$::ipsec::strongswan_params::secrets_file", - content => template('ipsec/strongswan/ipsec.secrets.erb') - } - -} - diff --git a/pkg/7u83-ipsec-0.1.0/manifests/strongswan_params.pp b/pkg/7u83-ipsec-0.1.0/manifests/strongswan_params.pp deleted file mode 100644 index c823466..0000000 --- a/pkg/7u83-ipsec-0.1.0/manifests/strongswan_params.pp +++ /dev/null @@ -1,28 +0,0 @@ -# - -class ipsec::strongswan_params { - case $::osfamily { - 'FreeBSD':{ - $pkg_name = "strongswan" - $ipsec_conf = '/usr/local/etc/ipsec.conf' - $service_name = 'strongswan' - # strongswan's startup script confuses pupets - # service enable, so we cannot enable the service - $service_enable = undef - $secrets_usr = 'root' - $secrets_grp = 'wheel' - $secrets_file = '/usr/local/etc/ipsec.secrets' - - } - default: { - $pkg_name = "strongswan" - $ipsec_conf = '/etc/ipsec.conf' - $service_name = 'strongswan' - $service_enable = true - $secrets_usr = 'root' - $secrets_grp = 'root' - $secrets_file = '/etc/ipsec.secrets' - } - } -} - diff --git a/pkg/7u83-ipsec-0.1.0/metadata.json b/pkg/7u83-ipsec-0.1.0/metadata.json deleted file mode 100644 index fdcca38..0000000 --- a/pkg/7u83-ipsec-0.1.0/metadata.json +++ /dev/null @@ -1,21 +0,0 @@ -{ - "name": "7u83-ipsec", - "version": "0.1.0", - "author": "7u83", - "summary": "IPSec with racoon", - "license": "Apache-2.0", - "source": "", - "project_page": null, - "issues_url": null, - "dependencies": [ - { - "name": "puppetlabs-stdlib", - "version_requirement": ">= 1.0.0" - }, - { - "name": "puppetlabs-concat", - "version_requirement": ">= 1.0.0" - } - ], - "data_provider": null -} diff --git a/pkg/7u83-ipsec-0.1.0/spec/classes/init_spec.rb b/pkg/7u83-ipsec-0.1.0/spec/classes/init_spec.rb deleted file mode 100644 index ea5195c..0000000 --- a/pkg/7u83-ipsec-0.1.0/spec/classes/init_spec.rb +++ /dev/null @@ -1,6 +0,0 @@ -require 'spec_helper' -describe 'ipsec' do - context 'with default values for all parameters' do - it { should contain_class('ipsec') } - end -end diff --git a/pkg/7u83-ipsec-0.1.0/spec/spec_helper.rb b/pkg/7u83-ipsec-0.1.0/spec/spec_helper.rb deleted file mode 100644 index 2c6f566..0000000 --- a/pkg/7u83-ipsec-0.1.0/spec/spec_helper.rb +++ /dev/null @@ -1 +0,0 @@ -require 'puppetlabs_spec_helper/module_spec_helper' diff --git a/pkg/7u83-ipsec-0.1.0/templates/ipsec_top.erb b/pkg/7u83-ipsec-0.1.0/templates/ipsec_top.erb deleted file mode 100644 index eeb2dd9..0000000 --- a/pkg/7u83-ipsec-0.1.0/templates/ipsec_top.erb +++ /dev/null @@ -1,5 +0,0 @@ -# Managed by puppet -# -flush; -spdflush; - diff --git a/pkg/7u83-ipsec-0.1.0/templates/ipsec_tunnel.erb b/pkg/7u83-ipsec-0.1.0/templates/ipsec_tunnel.erb deleted file mode 100644 index fc3d0c3..0000000 --- a/pkg/7u83-ipsec-0.1.0/templates/ipsec_tunnel.erb +++ /dev/null @@ -1,12 +0,0 @@ -# -# Tunnel -# Name: <%= @title %> -# -# - -<% @nets.each do |net| -%> -spdadd <%= net['local'] %> <%= net['remote'] %> <%= net['proto'] %> -P out ipsec - esp/tunnel/<%= @local_ip %>-<%= @remote_ip %>/require; -spdadd <%= net['remote'] %> <%= net['local'] %> <%= net['proto'] %> -P in ipsec - esp/tunnel/<%= @remote_ip %>-<%= @local_ip %>/require; -<% end %> diff --git a/pkg/7u83-ipsec-0.1.0/templates/isakmpd_ipsec_conf_header.erb b/pkg/7u83-ipsec-0.1.0/templates/isakmpd_ipsec_conf_header.erb deleted file mode 100644 index 5176fb7..0000000 --- a/pkg/7u83-ipsec-0.1.0/templates/isakmpd_ipsec_conf_header.erb +++ /dev/null @@ -1,3 +0,0 @@ -# -# Managed by Puppet -# diff --git a/pkg/7u83-ipsec-0.1.0/templates/isakmpd_tunnel.erb b/pkg/7u83-ipsec-0.1.0/templates/isakmpd_tunnel.erb deleted file mode 100644 index 06d42c7..0000000 --- a/pkg/7u83-ipsec-0.1.0/templates/isakmpd_tunnel.erb +++ /dev/null @@ -1,16 +0,0 @@ -# -# Tunnel -# Name: <%= @title %> -# -# - -<% @nets.each do |net| -%> -ike esp from <%= net['local'] %> to <%= net['remote'] %> \ -local <%= @local_ip %> peer <%= @remote_ip %> \ - main auth hmac-md5 enc aes-256 group modp1024 \ - quick auth hmac-md5 enc aes-256 group modp1024 \ - psk "<%= @psk %>" -<% end %> - - - diff --git a/pkg/7u83-ipsec-0.1.0/templates/racoon.conf.erb b/pkg/7u83-ipsec-0.1.0/templates/racoon.conf.erb deleted file mode 100644 index 2897df0..0000000 --- a/pkg/7u83-ipsec-0.1.0/templates/racoon.conf.erb +++ /dev/null @@ -1,28 +0,0 @@ -# -# racoon.conf Managed by Puppet -# - -log notify; -path pre_shared_key "<%= @racoon_pskfile %>"; - -path certificate "/etc/racoon/certs"; - -remote anonymous { - exchange_mode main; - proposal { - encryption_algorithm aes_256; - hash_algorithm md5; - authentication_method pre_shared_key; - dh_group modp1024; - } - generate_policy on; -} - -sainfo anonymous{ - pfs_group 2; - encryption_algorithm aes_256; - authentication_algorithm hmac_md5; - compression_algorithm deflate; -} - - diff --git a/pkg/7u83-ipsec-0.1.0/templates/racoon/ipsec.conf.transport.erb b/pkg/7u83-ipsec-0.1.0/templates/racoon/ipsec.conf.transport.erb deleted file mode 100644 index 50c0970..0000000 --- a/pkg/7u83-ipsec-0.1.0/templates/racoon/ipsec.conf.transport.erb +++ /dev/null @@ -1,10 +0,0 @@ -# -# Transport -# Name: <%= @title %> -# - -spdadd <%= @local_ip %> <%= @remote_ip %> <%= @proto %> -P out ipsec - esp/transport//require; -spdadd <%= @remote_ip %> <%= @local_ip %> <%= @proto %> -P out ipsec - esp/transport//require; - diff --git a/pkg/7u83-ipsec-0.1.0/templates/racoon/ipsec.conf.tunnel.erb b/pkg/7u83-ipsec-0.1.0/templates/racoon/ipsec.conf.tunnel.erb deleted file mode 100644 index fc3d0c3..0000000 --- a/pkg/7u83-ipsec-0.1.0/templates/racoon/ipsec.conf.tunnel.erb +++ /dev/null @@ -1,12 +0,0 @@ -# -# Tunnel -# Name: <%= @title %> -# -# - -<% @nets.each do |net| -%> -spdadd <%= net['local'] %> <%= net['remote'] %> <%= net['proto'] %> -P out ipsec - esp/tunnel/<%= @local_ip %>-<%= @remote_ip %>/require; -spdadd <%= net['remote'] %> <%= net['local'] %> <%= net['proto'] %> -P in ipsec - esp/tunnel/<%= @remote_ip %>-<%= @local_ip %>/require; -<% end %> diff --git a/pkg/7u83-ipsec-0.1.0/templates/racoon/racoon.conf.erb b/pkg/7u83-ipsec-0.1.0/templates/racoon/racoon.conf.erb deleted file mode 100644 index 580a939..0000000 --- a/pkg/7u83-ipsec-0.1.0/templates/racoon/racoon.conf.erb +++ /dev/null @@ -1,33 +0,0 @@ -# -# remote $title -# - -remote <%= @remote_ip %> { - exchange_mode main; - proposal { - encryption_algorithm <%= @encryption %>; - hash_algorithm <%= @hash %>; - dh_group <%= @dh_group %>; - lifetime time <%= @lifetime %>; - authentication_method pre_shared_key; - } - # generate_policy on; -} - -<% @nets.each do |net| -%> - <%- @salifetime = net['lifetime'] ? net['lifetime'] : "3600 sec" %> - <%- @saencryption = net['encryption'] ? net['encryption'] : @encryption %> - <%- @pfs_group = net['pfs_group'] ? net['pfs_group'] : @dh_group %> - <%- @p2hash = net['hash'] ? net['hash'] : 'hmac_md5' %> - - -sainfo address <%= net['local'] %> <%= net['proto'] %> address <%= net['remote'] %> <%= net['proto'] %> -{ - pfs_group <%= @pfs_group %>; - encryption_algorithm <%= @saencryption %>; - authentication_algorithm <%= @p2hash %>; - compression_algorithm deflate; - lifetime time <%= @salifetime %>; -} -<% end -%> - diff --git a/pkg/7u83-ipsec-0.1.0/templates/racoon/racoon.conf.header.erb b/pkg/7u83-ipsec-0.1.0/templates/racoon/racoon.conf.header.erb deleted file mode 100644 index 1b6f400..0000000 --- a/pkg/7u83-ipsec-0.1.0/templates/racoon/racoon.conf.header.erb +++ /dev/null @@ -1,29 +0,0 @@ -# -# racoon.conf Managed by Puppet -# will be overwritten at next puppet run -# - -log notify; -path pre_shared_key "<%= @racoon_pskfile %>"; - -path certificate "/etc/racoon/certs"; - -#remote anonymous { -# exchange_mode main; -# proposal { -# encryption_algorithm aes_256; -# hash_algorithm md5; -# authentication_method pre_shared_key; -# dh_group modp1024; -# } -# generate_policy on; -#} - -#sainfo anonymous{ -# pfs_group 2; -# encryption_algorithm aes_256; -# authentication_algorithm hmac_md5; -# compression_algorithm deflate; -#} - - diff --git a/pkg/7u83-ipsec-0.1.0/templates/strongswan/ipsec.conf.header.erb b/pkg/7u83-ipsec-0.1.0/templates/strongswan/ipsec.conf.header.erb deleted file mode 100644 index 654ce6a..0000000 --- a/pkg/7u83-ipsec-0.1.0/templates/strongswan/ipsec.conf.header.erb +++ /dev/null @@ -1 +0,0 @@ -#managed by puppet diff --git a/pkg/7u83-ipsec-0.1.0/templates/strongswan/ipsec.conf.tunnel.erb b/pkg/7u83-ipsec-0.1.0/templates/strongswan/ipsec.conf.tunnel.erb deleted file mode 100644 index 8ac832a..0000000 --- a/pkg/7u83-ipsec-0.1.0/templates/strongswan/ipsec.conf.tunnel.erb +++ /dev/null @@ -1,14 +0,0 @@ - -<% @nets.each do |net| -%> -conn <%= @title %> - left=<%= @local_ip %> - leftsubnet=<%= net['local'] %> - right=<%= @remote_ip %> - rightsubnet=<%= net['remote'] %> - ike=aes256-md5-modp1024 - esp=aes256-md5-modp1024! - auto=start - authby=secret - keyexchange=ikev1 -<% end %> - diff --git a/pkg/7u83-ipsec-0.1.0/templates/strongswan/ipsec.secrets.erb b/pkg/7u83-ipsec-0.1.0/templates/strongswan/ipsec.secrets.erb deleted file mode 100644 index 303e6e7..0000000 --- a/pkg/7u83-ipsec-0.1.0/templates/strongswan/ipsec.secrets.erb +++ /dev/null @@ -1,2 +0,0 @@ -<%= @local_ip %> <% @remote_ip %> : PSK "<%= @psk %>" -