From 5d85125bf7739a38c788256ccfba7877b46d2132 Mon Sep 17 00:00:00 2001 From: Monty Taylor Date: Thu, 14 Jul 2011 13:13:12 -0400 Subject: [PATCH] Added the current puppet stuff --- README.md | 7 + make_puppet_lp.py | 149 ++++ manifests/openstack_admins_users.pp | 822 +++++++++++++++++++ manifests/openstack_ci_admins_users.pp | 1026 ++++++++++++++++++++++++ manifests/server.pp | 29 + manifests/slave.pp | 51 ++ manifests/static_users.pp | 104 +++ modules/drizzle_user/manifests/init.pp | 32 + modules/sudoers/files/sudoers | 24 + modules/sudoers/files/sudoers.Darwin | 25 + modules/sudoers/files/sudoers.Ubuntu | 25 + modules/sudoers/manifests/init.pp | 28 + 12 files changed, 2322 insertions(+) create mode 100644 README.md create mode 100644 make_puppet_lp.py create mode 100644 manifests/openstack_admins_users.pp create mode 100644 manifests/openstack_ci_admins_users.pp create mode 100644 manifests/server.pp create mode 100644 manifests/slave.pp create mode 100644 manifests/static_users.pp create mode 100644 modules/drizzle_user/manifests/init.pp create mode 100644 modules/sudoers/files/sudoers create mode 100644 modules/sudoers/files/sudoers.Darwin create mode 100644 modules/sudoers/files/sudoers.Ubuntu create mode 100644 modules/sudoers/manifests/init.pp diff --git a/README.md b/README.md new file mode 100644 index 0000000000..a908c6e16d --- /dev/null +++ b/README.md @@ -0,0 +1,7 @@ +These are a set of puppet manifests and modules that are currently being +used to manage some of the efforts of the OpenStack CI project. They are +quite bare and crappy at the moment, but should grow soon. + +Additionally, there is a script, make_puppet_lp.py which is used to generate +a few lists of users from launchpad teams, to make management and population +of user accounts on different types of servers easier. diff --git a/make_puppet_lp.py b/make_puppet_lp.py new file mode 100644 index 0000000000..3286987e8b --- /dev/null +++ b/make_puppet_lp.py @@ -0,0 +1,149 @@ +import sys, subprocess +from launchpadlib.launchpad import Launchpad +from launchpadlib.uris import LPNET_SERVICE_ROOT + +cachedir="~/.launchpadlib/cache" +launchpad = Launchpad.login_with('Sync Users', LPNET_SERVICE_ROOT, cachedir) + + +def get_type(in_type): + if in_type == "RSA": + return "ssh-rsa" + else: + return "ssh-dsa" + +for team_todo in ('openstack-ci-admins','openstack-admins'): + team_underscores = team_todo.replace('-','_') + + team = launchpad.people[team_todo] + details = [detail for detail in team.members_details] + + users=[] + + with open("manifests/%s_users.pp" % team_underscores, "w") as user_pp: + user_pp.write(""" +class %s_users { + include sudoers + """ % team_underscores) + for detail in details: + sudo = True + member = detail.member + status = detail.status + if (status == "Approved" or status == "Administrator") and member.is_valid: + full_name = member.display_name.replace("'","\\'") + login_name = member.name + ssh_keys = "\\n".join(["%s %s %s" % (get_type(key.keytype), key.keytext, key.comment) for key in member.sshkeys]) + ssh_keys = ssh_keys.replace("\n","\\n") + + for nick in member.irc_nicknames: + if nick.network == 'build.drizzle.org': + login_name = nick.nickname + user_pp.write(""" + group { '%(login_name)s': + ensure => 'present' + } + + user { '%(login_name)s': + ensure => 'present', + comment => '%(full_name)s', + home => $operatingsystem ? { + Darwin => '/Users/%(login_name)s', + solaris => '/export/home/%(login_name)s', + default => '/home/%(login_name)s', + }, + shell => '/bin/bash', + gid => '%(login_name)s', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { '%(login_name)shome': + name => $operatingsystem ? { + Darwin => '/Users/%(login_name)s', + solaris => '/export/home/%(login_name)s', + default => '/home/%(login_name)s', + }, + owner => '%(login_name)s', + group => '%(login_name)s', + mode => 644, + ensure => 'directory', + } + + + file { '%(login_name)ssshdir': + name => $operatingsystem ? { + Darwin => '/Users/%(login_name)s/.ssh', + solaris => '/export/home/%(login_name)s/.ssh', + default => '/home/%(login_name)s/.ssh', + }, + owner => '%(login_name)s', + group => '%(login_name)s', + mode => 600, + ensure => 'directory', + require => File['%(login_name)shome'], + } + + file { '%(login_name)skeys': + name => $operatingsystem ? { + Darwin => '/Users/%(login_name)s/.ssh/authorized_keys', + solaris => '/export/home/%(login_name)s/.ssh/authorized_keys', + default => '/home/%(login_name)s/.ssh/authorized_keys', + }, + owner => '%(login_name)s', + group => '%(login_name)s', + mode => 640, + content => "%(ssh_keys)s", + ensure => 'present', + require => File['%(login_name)ssshdir'], + } + + file { '%(login_name)sbashrc': + name => $operatingsystem ? { + Darwin => '/Users/%(login_name)s/.bashrc', + solaris => '/export/home/%(login_name)s/.bashrc', + default => '/home/%(login_name)s/.bashrc', + }, + owner => '%(login_name)s', + group => '%(login_name)s', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { '%(login_name)sbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/%(login_name)s/.bash_logout', + solaris => '/export/home/%(login_name)s/.bash_logout', + default => '/home/%(login_name)s/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => '%(login_name)s', + group => '%(login_name)s', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { '%(login_name)sprofile': + name => $operatingsystem ? { + Darwin => '/Users/%(login_name)s/.profile', + solaris => '/export/home/%(login_name)s/.profile', + default => '/home/%(login_name)s/.profile', + }, + source => "/etc/skel/.profile", + owner => '%(login_name)s', + group => '%(login_name)s', + mode => 640, + replace => 'false', + ensure => 'present', + } + + +""" % dict(login_name=login_name, full_name=full_name, ssh_keys=ssh_keys)) + + + print "User=%s created" % login_name + user_pp.write(""" +} + """) diff --git a/manifests/openstack_admins_users.pp b/manifests/openstack_admins_users.pp new file mode 100644 index 0000000000..edadda4728 --- /dev/null +++ b/manifests/openstack_admins_users.pp @@ -0,0 +1,822 @@ + +class openstack_admins_users { + include sudoers + + group { 'corvus': + ensure => 'present' + } + + user { 'corvus': + ensure => 'present', + comment => 'James E. Blair', + home => $operatingsystem ? { + Darwin => '/Users/corvus', + solaris => '/export/home/corvus', + default => '/home/corvus', + }, + shell => '/bin/bash', + gid => 'corvus', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'corvushome': + name => $operatingsystem ? { + Darwin => '/Users/corvus', + solaris => '/export/home/corvus', + default => '/home/corvus', + }, + owner => 'corvus', + group => 'corvus', + mode => 644, + ensure => 'directory', + } + + + file { 'corvussshdir': + name => $operatingsystem ? { + Darwin => '/Users/corvus/.ssh', + solaris => '/export/home/corvus/.ssh', + default => '/home/corvus/.ssh', + }, + owner => 'corvus', + group => 'corvus', + mode => 600, + ensure => 'directory', + require => File['corvushome'], + } + + file { 'corvuskeys': + name => $operatingsystem ? { + Darwin => '/Users/corvus/.ssh/authorized_keys', + solaris => '/export/home/corvus/.ssh/authorized_keys', + default => '/home/corvus/.ssh/authorized_keys', + }, + owner => 'corvus', + group => 'corvus', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAvKYcWK1T7e3PKSFiqb03EYktnoxVASpPoq2rJw2JvhsP0JfS+lKrPzpUQv7L4JCuQMsPNtZ8LnwVEft39k58Kh8XMebSfaqPYAZS5zCNvQUQIhP9myOevBZf4CDeG+gmssqRFcWEwIllfDuIzKBQGVbomR+Y5QuW0HczIbkoOYI6iyf2jB6xg+bmzR2HViofNrSa62CYmHS6dO04Z95J27w6jGWpEOTBjEQvnb9sdBc4EzaBVmxCpa2EilB1u0th7/DvuH0yP4T+X8G8UjW1gZCTOVw06fqlBCST4KjdWw1F/AuOCT7048klbf4H+mCTaEcPzzu3Fkv8ckMWtS/Z9Q== jeblair@operational-necessity \n", + ensure => 'present', + require => File['corvussshdir'], + } + + file { 'corvusbashrc': + name => $operatingsystem ? { + Darwin => '/Users/corvus/.bashrc', + solaris => '/export/home/corvus/.bashrc', + default => '/home/corvus/.bashrc', + }, + owner => 'corvus', + group => 'corvus', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'corvusbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/corvus/.bash_logout', + solaris => '/export/home/corvus/.bash_logout', + default => '/home/corvus/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'corvus', + group => 'corvus', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'corvusprofile': + name => $operatingsystem ? { + Darwin => '/Users/corvus/.profile', + solaris => '/export/home/corvus/.profile', + default => '/home/corvus/.profile', + }, + source => "/etc/skel/.profile", + owner => 'corvus', + group => 'corvus', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'jaypipes': + ensure => 'present' + } + + user { 'jaypipes': + ensure => 'present', + comment => 'Jay Pipes', + home => $operatingsystem ? { + Darwin => '/Users/jaypipes', + solaris => '/export/home/jaypipes', + default => '/home/jaypipes', + }, + shell => '/bin/bash', + gid => 'jaypipes', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'jaypipeshome': + name => $operatingsystem ? { + Darwin => '/Users/jaypipes', + solaris => '/export/home/jaypipes', + default => '/home/jaypipes', + }, + owner => 'jaypipes', + group => 'jaypipes', + mode => 644, + ensure => 'directory', + } + + + file { 'jaypipessshdir': + name => $operatingsystem ? { + Darwin => '/Users/jaypipes/.ssh', + solaris => '/export/home/jaypipes/.ssh', + default => '/home/jaypipes/.ssh', + }, + owner => 'jaypipes', + group => 'jaypipes', + mode => 600, + ensure => 'directory', + require => File['jaypipeshome'], + } + + file { 'jaypipeskeys': + name => $operatingsystem ? { + Darwin => '/Users/jaypipes/.ssh/authorized_keys', + solaris => '/export/home/jaypipes/.ssh/authorized_keys', + default => '/home/jaypipes/.ssh/authorized_keys', + }, + owner => 'jaypipes', + group => 'jaypipes', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA5d2DekN5POb+e04tVtC/pok7r0Lg/+90sbvhgLTDKSGM7uPI83ulH4sZrMKVU5NTK4GBh9G+RNK6UaKodNiBGKiHZ4QdaMqbkP3TIXd3uDEBUefEAzSqpCGydbjpmtxFZWtA5hcKXTSpMRbbx/vek3lYIRsQaU0Ezc7V0cczSmJBGA6VH22TIW/5wkVvZQozK2jdkIAnJhdL7CN5kKyGs94CfXN9ofNr1ssVb/tPJqSotx7FDcrwT9VmEWTn/nCuoWf42sVu0RIHVMSpr5sxFa+G33omeRLOSCCD+zYZoMCEHZTFNCXZhPWGebWhgGHsu0+bN6heRmoJ8lw01gHxWQ== jpipes@serialcoder\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAt2tCgmlHEj5huGLJTPM2pV+aj6ZObneGq92m30LsKOn2SMrC9y4PpqjlRDweduBDKK2cPSnHt3HL1jM5npLh5IGHN2FxAWo3spgwpWPhdkT1VbdyiTZPw4++y/qZhWdNvEWBpNcf3Zn2Qi0x7F1+5fCri/vwVA9RBG35wozaP0mkxaJuAS/LLR7ZJIF99Fqfdk6+Fp5mobXt0ggEqs/78MhCuE2AYaNZ/VWCoanL4w6+UJwZV1Ftd9Ksx6f+8NpaOC9WlNSxJmp2EDJsLBy8mpJh1OsAjC3hu1VvQYmYhSo47ADSfAw9h7aaLUcL6hb7w2n4f+9Ej2+L6+NzEm0Izw== jpipes@serialcoder", + ensure => 'present', + require => File['jaypipessshdir'], + } + + file { 'jaypipesbashrc': + name => $operatingsystem ? { + Darwin => '/Users/jaypipes/.bashrc', + solaris => '/export/home/jaypipes/.bashrc', + default => '/home/jaypipes/.bashrc', + }, + owner => 'jaypipes', + group => 'jaypipes', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'jaypipesbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/jaypipes/.bash_logout', + solaris => '/export/home/jaypipes/.bash_logout', + default => '/home/jaypipes/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'jaypipes', + group => 'jaypipes', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'jaypipesprofile': + name => $operatingsystem ? { + Darwin => '/Users/jaypipes/.profile', + solaris => '/export/home/jaypipes/.profile', + default => '/home/jaypipes/.profile', + }, + source => "/etc/skel/.profile", + owner => 'jaypipes', + group => 'jaypipes', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'john-purrier': + ensure => 'present' + } + + user { 'john-purrier': + ensure => 'present', + comment => 'John Purrier', + home => $operatingsystem ? { + Darwin => '/Users/john-purrier', + solaris => '/export/home/john-purrier', + default => '/home/john-purrier', + }, + shell => '/bin/bash', + gid => 'john-purrier', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'john-purrierhome': + name => $operatingsystem ? { + Darwin => '/Users/john-purrier', + solaris => '/export/home/john-purrier', + default => '/home/john-purrier', + }, + owner => 'john-purrier', + group => 'john-purrier', + mode => 644, + ensure => 'directory', + } + + + file { 'john-purriersshdir': + name => $operatingsystem ? { + Darwin => '/Users/john-purrier/.ssh', + solaris => '/export/home/john-purrier/.ssh', + default => '/home/john-purrier/.ssh', + }, + owner => 'john-purrier', + group => 'john-purrier', + mode => 600, + ensure => 'directory', + require => File['john-purrierhome'], + } + + file { 'john-purrierkeys': + name => $operatingsystem ? { + Darwin => '/Users/john-purrier/.ssh/authorized_keys', + solaris => '/export/home/john-purrier/.ssh/authorized_keys', + default => '/home/john-purrier/.ssh/authorized_keys', + }, + owner => 'john-purrier', + group => 'john-purrier', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAIEAruUSC26oZvATKLklfJDpp8g/os1YYIypnQUw856znEgRc2mo2l9ASkwE9+zlPZWYpBT6kVtVfN85WyMJM5oq38T9VdPmMQ3ecgrqR7JdFPmmdAkAMzn2RlGPBZr9A//UxZnATFKxF/ZKwDEmIB2zfJ8dr6NSEDGaWC+IWdHNYSU= john@openstack.org", + ensure => 'present', + require => File['john-purriersshdir'], + } + + file { 'john-purrierbashrc': + name => $operatingsystem ? { + Darwin => '/Users/john-purrier/.bashrc', + solaris => '/export/home/john-purrier/.bashrc', + default => '/home/john-purrier/.bashrc', + }, + owner => 'john-purrier', + group => 'john-purrier', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'john-purrierbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/john-purrier/.bash_logout', + solaris => '/export/home/john-purrier/.bash_logout', + default => '/home/john-purrier/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'john-purrier', + group => 'john-purrier', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'john-purrierprofile': + name => $operatingsystem ? { + Darwin => '/Users/john-purrier/.profile', + solaris => '/export/home/john-purrier/.profile', + default => '/home/john-purrier/.profile', + }, + source => "/etc/skel/.profile", + owner => 'john-purrier', + group => 'john-purrier', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'mordred': + ensure => 'present' + } + + user { 'mordred': + ensure => 'present', + comment => 'Monty Taylor', + home => $operatingsystem ? { + Darwin => '/Users/mordred', + solaris => '/export/home/mordred', + default => '/home/mordred', + }, + shell => '/bin/bash', + gid => 'mordred', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'mordredhome': + name => $operatingsystem ? { + Darwin => '/Users/mordred', + solaris => '/export/home/mordred', + default => '/home/mordred', + }, + owner => 'mordred', + group => 'mordred', + mode => 644, + ensure => 'directory', + } + + + file { 'mordredsshdir': + name => $operatingsystem ? { + Darwin => '/Users/mordred/.ssh', + solaris => '/export/home/mordred/.ssh', + default => '/home/mordred/.ssh', + }, + owner => 'mordred', + group => 'mordred', + mode => 600, + ensure => 'directory', + require => File['mordredhome'], + } + + file { 'mordredkeys': + name => $operatingsystem ? { + Darwin => '/Users/mordred/.ssh/authorized_keys', + solaris => '/export/home/mordred/.ssh/authorized_keys', + default => '/home/mordred/.ssh/authorized_keys', + }, + owner => 'mordred', + group => 'mordred', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAr+HlnLCCMnAqP6bvAQmb6aMfNjwp425OuG9nlN6uXXEymP5G/WT/Ok2RWb+O1hsaRGsvwHrkCdhCvT0XrDIWRCK3vaQ/v0LogeRbX5HIdOrH6r5N++DV9SqVTFZ6+54CfOE/pyku6pkBdoM8WJ9EIQBQC82EE6mgtpS/UNdiymsoB+2I8yNwUROm/AROCjqN60PI/2j234qYYaUXoD/FM3ZE/cfUoTTi0NAbt5OM5pCHPfaWhWCYtQ4l2CnEXXhKU9TcoQVoTu54IBAmblgD2LeJnOsKQtVcd5rgGzl/OtkL1ZvWCq23LHMeOC2WANgWIyxp4x66m51uErbgnTwOkQ== monty@sanction\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAwgRJ+iQMzive6pq8f/F4N0CN0+SptI5l+yj10Rx3i80Zh4a3ERratuIsEmuyyeBU/l+dmR074Jic/42rYnQJBEKT5bvGLhiftcSUu630NZgAFnP5e4TbpHlYJzXDxOOctAHyd8TH5iQftWeNi5NIYAwfYpO6a4/GE1InMcyqW+icyDxyt3rwDN0qzLHcVFdCgWPsbEuJuqweH/qsen78LNWPro+ynk6dnsSKhe8dWkhYjPhAEjbsL13VezksHNbk2aa/yvppCCgdLdvniaQDKr+F0/X5Xp1teL8L7Rr9Ei+I3l6Ge4I3KY0s8TM+6TpAp4GGvdKakOBeoSAP5wYjrw== root@camelot \n\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyxfIpVCvZyM8BIy7r7WOSIG6Scxq4afean1Pc/bej5ZWHXCu1QnhGbI7rW3sWciEhi375ILejfODl2TkBpfdJe/DL205lLkTxAa+FUqcZ5Ymwe+jBgCH5XayzyhRPFFLn07IfA/BDAjGPqFLvq6dCEHVNJIui6oEW7OUf6a3376YF55r9bw/8Ct00F9N7zrISeSSeZXbNR+dEqcsBEKBqvZGcLtM4jzDzNXw1ITPPMGaoEIIszLpkkJcy8u/13GIrbAwNrB2wjl6Mzj+N9nTsB4rFtxRXp31ZbytCH5G9CL/mFard7yi8NLVEJPZJvAifNVhooxGN06uAiTFE8EsuQ== mtaylor@qualinost \n\nssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAIB6bmpw3QjDUMDhYGiSA1tlolTrGQGcSXgfGindWnDymGE5uglpgsGbYeRqL+4lrULCDYvMJ9IGSVJOQ40VcnRcGHO+ykyUp3VNTnfwpU0Ee3xapmKL0o7sPqXx8Vlr0X2b7RaQbUYT48jyI9D1h5RW8At2X4N4A4d1HibfURTzgQ== rsa-key-20100819\nssh-dsa AAAAB3NzaC1kc3MAAACBAKwcqWzaNSScs5Hu7cLUs/xdvw09zbphWzSdB0UNs9rQG3ctkWjbaK+WKsXOpd/gxyWPY4fti1uhK5xFyaaLMOIrf+EhFnnKtJ+Z3pCE/uwRROE/Y74bWHXRZRZ5hB150sFmEYet09ZHPD/lVjtBF9zJcvlWh5CIh7xUviHqp3b/AAAAFQDypk12Poey0L35PgngF6g042NAbwAAAIACd/P1epZQXmtIWXkkFWhp4rQTSqz6YV/FpWCHM8bk7qr+4owhHrFkwS1cSPQyyTnCfNM5lorqJ2chjk1AeGr8OMo9GoUxLNSe0CtcCHjT6b2mfkWnqkSi//KwUq3oNUhkl9xZJls7kT0w6F+CncpPEMYseOb8h5UpZ2xVmAgZmwAAAIBYoLiugqeo39qUZQ0a7vQ3ydlmJ/EJzv1rjWRJ79or01wfkpb+jgBeiTHPeuCw2WTEBpKYkU4U8x5tUHb+kdN6TrABcvbn/kfgsoMZeb1rPaiDDM+93prkSI7hS2FKYDv6TIBsT4StmY/BZHfhTwjQUcW+yYJv7vlM9LeIlA4IEw== monty@speedy\nssh-dsa AAAAB3NzaC1kc3MAAACBAN2I6q4yjydSwEnhf45GPBDvj/MUjPBlTj3Buf+xunUtfdXSIpTDvasTVibEKhNrNkr0zkIe8hE5uOM3pHeSLRx9Tj8Txjn5RN3xsKhkqhS/j/GCPiDWRQnpfHPWHK7NxEMwbMv7Rato8YubVmSq9UodXSWytcSXZCTtQVZJvDMjAAAAFQCA+aVTTD9XcC7A575rcu0j75f2HwAAAIA8tdrsQoNV1AMde6r0iE8T8wkw9T9cA9bwK8sbIR3S81FG805bMdVanBfDBwfOTM/rbuGQoH4F8oqURor7njwARh5BLTFrpqSqSw6vTm30TJnRDUS7qrDG0xrzqk+RF5AXHHJ4MJKbjpUc2C3MHOo+rybjE1rJh9OWr9xG3oRroAAAAIAyN2Btf9fCJh2MhqPrtVCfSUzcE7qz/7XludszUwrWElsTfqXtSfRqiQybXSImVPz9DE+ZufOHGLMGolEi+ALRgLp4L7JDBld+Gga64HnAbg/jmDKN97CyFrRbmVbln/oFQFmDhLchGnERhRKQWOWwXKdOrDgGvDwHORsCffUVLw== mtaylor@qualinost \n\nssh-dsa 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 mtaylor@qualinost \n", + ensure => 'present', + require => File['mordredsshdir'], + } + + file { 'mordredbashrc': + name => $operatingsystem ? { + Darwin => '/Users/mordred/.bashrc', + solaris => '/export/home/mordred/.bashrc', + default => '/home/mordred/.bashrc', + }, + owner => 'mordred', + group => 'mordred', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'mordredbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/mordred/.bash_logout', + solaris => '/export/home/mordred/.bash_logout', + default => '/home/mordred/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'mordred', + group => 'mordred', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'mordredprofile': + name => $operatingsystem ? { + Darwin => '/Users/mordred/.profile', + solaris => '/export/home/mordred/.profile', + default => '/home/mordred/.profile', + }, + source => "/etc/skel/.profile", + owner => 'mordred', + group => 'mordred', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'dendrobates': + ensure => 'present' + } + + user { 'dendrobates': + ensure => 'present', + comment => 'Rick Clark', + home => $operatingsystem ? { + Darwin => '/Users/dendrobates', + solaris => '/export/home/dendrobates', + default => '/home/dendrobates', + }, + shell => '/bin/bash', + gid => 'dendrobates', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'dendrobateshome': + name => $operatingsystem ? { + Darwin => '/Users/dendrobates', + solaris => '/export/home/dendrobates', + default => '/home/dendrobates', + }, + owner => 'dendrobates', + group => 'dendrobates', + mode => 644, + ensure => 'directory', + } + + + file { 'dendrobatessshdir': + name => $operatingsystem ? { + Darwin => '/Users/dendrobates/.ssh', + solaris => '/export/home/dendrobates/.ssh', + default => '/home/dendrobates/.ssh', + }, + owner => 'dendrobates', + group => 'dendrobates', + mode => 600, + ensure => 'directory', + require => File['dendrobateshome'], + } + + file { 'dendrobateskeys': + name => $operatingsystem ? { + Darwin => '/Users/dendrobates/.ssh/authorized_keys', + solaris => '/export/home/dendrobates/.ssh/authorized_keys', + default => '/home/dendrobates/.ssh/authorized_keys', + }, + owner => 'dendrobates', + group => 'dendrobates', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyPD6HkWT4pz20Ygfo72MxiMsCc4JmlVq/LO0GQRw1ZBG4f0rkjegYBDFLLzOR60RPfqpvb3OApJBHcx3HJG9IxtPc5yZN615sBwPOLK6SWO9kFMhBVq4w3uQFIvpONyR7KbRlWJFVn1W02pRkGGp//bN15h6Ry24kfzEgcjOMbq9vb57/dumj9tL6pZyBSWLgOjWj70KEo/n8Z9AFn7lZOZgq4fmqMuDD79ahsjnwGpKjh2v/SIALV2AjYWJOwY/0ou7l7ghVvfOB4ZOgSYDxhz2/ORqL4yUzncyChcLH1Xg5nscvc+yaOatMaXtVlkPAEPDUSzfho8DyAqt1tjRKw== rclark@blackcat \n", + ensure => 'present', + require => File['dendrobatessshdir'], + } + + file { 'dendrobatesbashrc': + name => $operatingsystem ? { + Darwin => '/Users/dendrobates/.bashrc', + solaris => '/export/home/dendrobates/.bashrc', + default => '/home/dendrobates/.bashrc', + }, + owner => 'dendrobates', + group => 'dendrobates', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'dendrobatesbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/dendrobates/.bash_logout', + solaris => '/export/home/dendrobates/.bash_logout', + default => '/home/dendrobates/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'dendrobates', + group => 'dendrobates', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'dendrobatesprofile': + name => $operatingsystem ? { + Darwin => '/Users/dendrobates/.profile', + solaris => '/export/home/dendrobates/.profile', + default => '/home/dendrobates/.profile', + }, + source => "/etc/skel/.profile", + owner => 'dendrobates', + group => 'dendrobates', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'soren': + ensure => 'present' + } + + user { 'soren': + ensure => 'present', + comment => 'Soren Hansen', + home => $operatingsystem ? { + Darwin => '/Users/soren', + solaris => '/export/home/soren', + default => '/home/soren', + }, + shell => '/bin/bash', + gid => 'soren', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'sorenhome': + name => $operatingsystem ? { + Darwin => '/Users/soren', + solaris => '/export/home/soren', + default => '/home/soren', + }, + owner => 'soren', + group => 'soren', + mode => 644, + ensure => 'directory', + } + + + file { 'sorensshdir': + name => $operatingsystem ? { + Darwin => '/Users/soren/.ssh', + solaris => '/export/home/soren/.ssh', + default => '/home/soren/.ssh', + }, + owner => 'soren', + group => 'soren', + mode => 600, + ensure => 'directory', + require => File['sorenhome'], + } + + file { 'sorenkeys': + name => $operatingsystem ? { + Darwin => '/Users/soren/.ssh/authorized_keys', + solaris => '/export/home/soren/.ssh/authorized_keys', + default => '/home/soren/.ssh/authorized_keys', + }, + owner => 'soren', + group => 'soren', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA7bpJJzvwa4KKzxk9fyegkCUKKOA1gttDJdB+E2mllxcDkScYRYoFnwiq0kl1BwkNFRXj10pguhI/7O3escSvF3Di2Lw4haHR8my6yaz7jFlBbBw8+6j5RbIRnTORS5G4mH4LtAxToGomfJd9gxWpVMiqLa4V7Hg8K6CYRSSUOWzqs7Y/Hv13ASr8ZbaweB1ygVE8kbKuW2ILcqRrKYKaQDeh+aPqLsXDNhT2k2WLsTIqMTSKy70sHqyCjD2joRVBuTiqt1uaQqYCJWT8vuDvXsF0Lmi4tMjRF7GOuOKd0QsT5y8C8dLHWDfeBNQJv46dZE6UUHOfhucTM4w73zpXaw== soren@butch\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA8YfXbgi0uNZEpOxLvzPdGgo5dAAjqVUGf+kU1bvxcZf3y7a2veDXOOnez4VGl6OC1bgeENW/5O2hKi0wUG3XMWp8uLVSupI6A8o+cBCu7MYzChMdgullBEh7Bz4cbvoMmQiWOZPPsZLTTrl7E6SJJ5jTTn8IsSkCp21m2Sr4b5SWj+Nw43NVtGYFtBBG/OoixlxcNutiSn7YjOH6CAVOhKpTNddwqECKBfxCdS2kYrMzJw8/QhA9FwJHoFt3PevuC4I/9ARlyZCsbOY+ENc2NtFXNVnF5m6tE/eDZFTt652pNPlldWAaVBzKDZ4CUi4HS3WDxGcVqhtaNawIV6sR8w== soren@intel \n\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyAtAccJ8ndh6wzq3vY1izHTdPh3kAKtjBK6P390ClIRBA3CfjKS6KaKSeGs1xZ4WZhOk9oz4d/+Ep7iOXLpUnYYjHm5bLD8o6jKAhKohoABzCyj3ONPNxvxvsvdahSPLONC6H1PlbhvTbn9UwEtZ//migJTATdLQEjXHaNhNJ8UZz9XtCf1Qv4YiYmyRId6h5N+OPNU4OmqlCZyanBXKN5jK1Kubq6SseY++74Y54ZPXVccGmJDTOfNBfM1nR0+f2Mq2iHR0a3PuJcGXFx/P4mIA0Knyh98W6esB9fG7/JVID2bGpJ6c91+AkL9fmwOpfWrk7rr13+iGiH2RTcmd0w== soren@lenny \n\nssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCGTnV3tEMvry4UruD6I23TW3L616ML8p15kdj4TYlcBUZvUDzPoT+QjinNw7Pm1C4dJk3xJJtvxshKSXF08QF88kWgtF6jSpp1ZwmDXKNnPRLAIT5pewubFHd5iwMFf371P2/kxIm37iAo45puTO0CL39dAKkw6L/F7M3ycFUgsIkik6oN9bX1X3Yu3e/Lv2hJ1LGN7K2nnQmLd9aFulpruM7iPtFt8qJ82ofJq2LGH931QsP1QonvJxonajo9wrEAfXTFENDwcoOD0Py+KXOddqb/1SJxbLwclDmHMX5bKA5K+R6GzzpDUEsDZYa1xhJpmOmlaBTxFGoQg/wtHUNf cardno:000500000063", + ensure => 'present', + require => File['sorensshdir'], + } + + file { 'sorenbashrc': + name => $operatingsystem ? { + Darwin => '/Users/soren/.bashrc', + solaris => '/export/home/soren/.bashrc', + default => '/home/soren/.bashrc', + }, + owner => 'soren', + group => 'soren', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'sorenbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/soren/.bash_logout', + solaris => '/export/home/soren/.bash_logout', + default => '/home/soren/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'soren', + group => 'soren', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'sorenprofile': + name => $operatingsystem ? { + Darwin => '/Users/soren/.profile', + solaris => '/export/home/soren/.profile', + default => '/home/soren/.profile', + }, + source => "/etc/skel/.profile", + owner => 'soren', + group => 'soren', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'ttx': + ensure => 'present' + } + + user { 'ttx': + ensure => 'present', + comment => 'Thierry Carrez', + home => $operatingsystem ? { + Darwin => '/Users/ttx', + solaris => '/export/home/ttx', + default => '/home/ttx', + }, + shell => '/bin/bash', + gid => 'ttx', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'ttxhome': + name => $operatingsystem ? { + Darwin => '/Users/ttx', + solaris => '/export/home/ttx', + default => '/home/ttx', + }, + owner => 'ttx', + group => 'ttx', + mode => 644, + ensure => 'directory', + } + + + file { 'ttxsshdir': + name => $operatingsystem ? { + Darwin => '/Users/ttx/.ssh', + solaris => '/export/home/ttx/.ssh', + default => '/home/ttx/.ssh', + }, + owner => 'ttx', + group => 'ttx', + mode => 600, + ensure => 'directory', + require => File['ttxhome'], + } + + file { 'ttxkeys': + name => $operatingsystem ? { + Darwin => '/Users/ttx/.ssh/authorized_keys', + solaris => '/export/home/ttx/.ssh/authorized_keys', + default => '/home/ttx/.ssh/authorized_keys', + }, + owner => 'ttx', + group => 'ttx', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAz4Mu4IhAg3/AY4fCnAomOAJIkJS4YnTlTXiIikUIqS/R \n116Do8CxKJjwM8MPc0i/n7zpYKTgAEJ4qbgaWG/sGokUw8ZsJ+6WfcSLGszU/6qd7+s3BEqUyStTsPrV \nmK7gnBroub+WaLk0/BKfMR+Mx3MJY/wPisuqdHK8kViQR09/qSFuuPgSZsYw2GuLM1Ul4h3vC4BaAbQV \ne+1AKq7/Yz+ARK1IDr7ZqdK7T1f/G01Vi1J03Q0YCeB7JFvUFtwPm561yNOWXxQuJMQ9Z1CDunRpLiil \nRN8WrM97ETF9i+XKCavb54UxzDz1SEwyhSouTdSFRc1A3jZMloZrvr2hLQ== ttx@cassini\nssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIF2INBeJdT3nT3+3yac+DGRQVN7wPv/GTb/OPDocQhfGMeQP7JwSURiv1nrXGbbjzuip7l7vRJs4u4NqXkUi0GFj1aLBpUm2Z1NFFDn4cuZ5KCYX6rjVrDYIpj4OlOyzt9YGONvvH/dB2GHw8kYbN50OalFWQCS0TVzj9SQbO47B/TPdtLnh116yEP5AXZZUGgl+q533/x8+nxAxJKA9iAk3mSswl67gXc4pRo84pjwpx+R/52ha6RfmLkoNAEOqtr5MGx5gyW+WXsoLJBl2bjcfzYoQI7gPWRIn+rtCnDFi762TS54zstXxR1ww+ppmqHk04l2oprNoI0wr00Fsl ttx@stardust \n", + ensure => 'present', + require => File['ttxsshdir'], + } + + file { 'ttxbashrc': + name => $operatingsystem ? { + Darwin => '/Users/ttx/.bashrc', + solaris => '/export/home/ttx/.bashrc', + default => '/home/ttx/.bashrc', + }, + owner => 'ttx', + group => 'ttx', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'ttxbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/ttx/.bash_logout', + solaris => '/export/home/ttx/.bash_logout', + default => '/home/ttx/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'ttx', + group => 'ttx', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'ttxprofile': + name => $operatingsystem ? { + Darwin => '/Users/ttx/.profile', + solaris => '/export/home/ttx/.profile', + default => '/home/ttx/.profile', + }, + source => "/etc/skel/.profile", + owner => 'ttx', + group => 'ttx', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'wreese': + ensure => 'present' + } + + user { 'wreese': + ensure => 'present', + comment => 'Will Reese', + home => $operatingsystem ? { + Darwin => '/Users/wreese', + solaris => '/export/home/wreese', + default => '/home/wreese', + }, + shell => '/bin/bash', + gid => 'wreese', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'wreesehome': + name => $operatingsystem ? { + Darwin => '/Users/wreese', + solaris => '/export/home/wreese', + default => '/home/wreese', + }, + owner => 'wreese', + group => 'wreese', + mode => 644, + ensure => 'directory', + } + + + file { 'wreesesshdir': + name => $operatingsystem ? { + Darwin => '/Users/wreese/.ssh', + solaris => '/export/home/wreese/.ssh', + default => '/home/wreese/.ssh', + }, + owner => 'wreese', + group => 'wreese', + mode => 600, + ensure => 'directory', + require => File['wreesehome'], + } + + file { 'wreesekeys': + name => $operatingsystem ? { + Darwin => '/Users/wreese/.ssh/authorized_keys', + solaris => '/export/home/wreese/.ssh/authorized_keys', + default => '/home/wreese/.ssh/authorized_keys', + }, + owner => 'wreese', + group => 'wreese', + mode => 640, + content => "", + ensure => 'present', + require => File['wreesesshdir'], + } + + file { 'wreesebashrc': + name => $operatingsystem ? { + Darwin => '/Users/wreese/.bashrc', + solaris => '/export/home/wreese/.bashrc', + default => '/home/wreese/.bashrc', + }, + owner => 'wreese', + group => 'wreese', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'wreesebash_logout': + name => $operatingsystem ? { + Darwin => '/Users/wreese/.bash_logout', + solaris => '/export/home/wreese/.bash_logout', + default => '/home/wreese/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'wreese', + group => 'wreese', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'wreeseprofile': + name => $operatingsystem ? { + Darwin => '/Users/wreese/.profile', + solaris => '/export/home/wreese/.profile', + default => '/home/wreese/.profile', + }, + source => "/etc/skel/.profile", + owner => 'wreese', + group => 'wreese', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + +} + \ No newline at end of file diff --git a/manifests/openstack_ci_admins_users.pp b/manifests/openstack_ci_admins_users.pp new file mode 100644 index 0000000000..6951d26d95 --- /dev/null +++ b/manifests/openstack_ci_admins_users.pp @@ -0,0 +1,1026 @@ + +class openstack_ci_admins_users { + include sudoers + + group { 'annegentle': + ensure => 'present' + } + + user { 'annegentle': + ensure => 'present', + comment => 'Anne Gentle', + home => $operatingsystem ? { + Darwin => '/Users/annegentle', + solaris => '/export/home/annegentle', + default => '/home/annegentle', + }, + shell => '/bin/bash', + gid => 'annegentle', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'annegentlehome': + name => $operatingsystem ? { + Darwin => '/Users/annegentle', + solaris => '/export/home/annegentle', + default => '/home/annegentle', + }, + owner => 'annegentle', + group => 'annegentle', + mode => 644, + ensure => 'directory', + } + + + file { 'annegentlesshdir': + name => $operatingsystem ? { + Darwin => '/Users/annegentle/.ssh', + solaris => '/export/home/annegentle/.ssh', + default => '/home/annegentle/.ssh', + }, + owner => 'annegentle', + group => 'annegentle', + mode => 600, + ensure => 'directory', + require => File['annegentlehome'], + } + + file { 'annegentlekeys': + name => $operatingsystem ? { + Darwin => '/Users/annegentle/.ssh/authorized_keys', + solaris => '/export/home/annegentle/.ssh/authorized_keys', + default => '/home/annegentle/.ssh/authorized_keys', + }, + owner => 'annegentle', + group => 'annegentle', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA3A74P+vhfqTKUP3s6qtOYtJJnBtNyrR59M0Vh+/iZIqI4uWMrmAYhn8dRyagWKYHG7d7zb3kPa9ckJBjSFdJfhLqwgcjGRewh6G6rqTuuiQTw73AJSHu9zenlrUha27oMyklX/ApZpUMBECzH4FgqhfUuRI4wulAgvnM6jm/eA+zGpmlRQMuguY9P8+AOirhk/koQhVDlR10aTzUCg6NLNmzi+72jSxBqEt8IzlE/f3emGJ09hCNQyz+PxGJUesoZ3UQhhda8Fuosi9j/ANbknSh68b5UNKuldPl9TjmxFPBX36chIMFJW1Ln/gwdjY+GIaGfXI0BPRVugdLdIgbjw== stacker@gentle \n\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA507CBhTaT8grzfX0BZ7Xe2CrVVUAe8Vh3YttEYD0Rkm3S78WJtkGAsYYk+SHft0KuXZWRAPWUcARRDDVa9PsIVFBiMgTEjN5UeLcPpMNctxvBfjeHOrZBhBFmrHodAmcv3rRRRnLJqNjg6w5OHM8usaaHOxHMhUErxfm3p/MsVKhIXRuZFXi1XswsRjrVxFvwc+U9m7YLRuSOjl4m6BMmLrvJVzBR6UYWWF6fCyJZc3AnDVeynqqDYl8KW+Xy4PferNHhMFm4fbCKdVPKUNGfRmvR1ZptCVbCceaPLg6rrLDPpybtzKDB37jI8zvr+NcE8B4mbE224XJ/JVpOmMOIw== anne.gentle@M1EVAGY\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA78jhKB4vlEKYueZ4v9WiceCf8BWRr7p9Oo7X/6vGad+Al0P0JTu1tuf9ErjaDR5mxtCWi6Am2MI7ddQef7yQyKCDxTct9QPfrZmzLeRSFEzw3OlnoM4oIdv7FKF5WzGRjNdYYiT4YvuuYMA0RvczRjHawlVVCdPnUiQD54RJOKmw3K9pW8i9GgcMre1w1ewO+wMeV3vR+NEyL1Qk0xmXfl49uSbaFOHyiu3g56ELqs1rqTG+xTpvzjHNFkOlN0O9lLwjIWiDkK7/rr8pP/3ivneXoPh+0kFGXPdH/bYCoAwveYFUyGc9SMTzNc9jo+1j+NuXjXNmPtEikDfvk2xe3w== annegentle@annegentle-ubuntu \n\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAoKqhG8vjinpt1T5VP42rtaj/WFyESYQuBAbQPfQbRrSSt3NeHeU1y/iRIvO3kpuRYcxJeqk6+GBH4Py55WjtiJKdRDNXKhIVqTVBMr26+7Gn/9Hxg26uU48wQiU5orAfLY+6MM1Eol2yJDATx7IlWQvOhCPcGQabWccyXNSP+1bCnGLTzO7hqI6Nnr1QuXiZJdDrJ9ATAhdqvGTzBsZGiM+Qps2C96dmURPOE4Iu9CF3dwu6RDi8UDzJfxdxU7hvq/r+EF4RWnSG2e5lRaifrrkieSISy5JzMJ4uxMN7I2hISk9/slQjq34yU9/DXZ3FvKRfV+iQ+o3g4WN2lQQQZw== training@SwiftTest\nssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQClzt3qeTsyYAtsiCS+WmLvCzBww88gqSIHPUnxUbvYjkoSp8YpCRsFBtN6Z2Fwpete8PymjCmp4wUhh5XariIAWUVmju6mtZ7qsU2e/h5qm+He861Yat5R5YD024SyijQTRDoOrkQMtnX2bphHXKjKtPgGGe5AZbV3m7GcBQQXdH+7ViT5IDvCFnl94YYQVkRl5fHPAtAYleHjLDaD15fqbJsXzjoDdV5A9mL+D80+pNa31At/pw9Foc1VDpM8/zJu0n11oI/B68MOnVw/dudrPEA7tEiXKHKlVbNcuzK3fWj2pmgICIqsIX3Idq3dlN9OO+pDF+BaXgWNzLKaZmWt docbuilder@DocBuilds \n", + ensure => 'present', + require => File['annegentlesshdir'], + } + + file { 'annegentlebashrc': + name => $operatingsystem ? { + Darwin => '/Users/annegentle/.bashrc', + solaris => '/export/home/annegentle/.bashrc', + default => '/home/annegentle/.bashrc', + }, + owner => 'annegentle', + group => 'annegentle', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'annegentlebash_logout': + name => $operatingsystem ? { + Darwin => '/Users/annegentle/.bash_logout', + solaris => '/export/home/annegentle/.bash_logout', + default => '/home/annegentle/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'annegentle', + group => 'annegentle', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'annegentleprofile': + name => $operatingsystem ? { + Darwin => '/Users/annegentle/.profile', + solaris => '/export/home/annegentle/.profile', + default => '/home/annegentle/.profile', + }, + source => "/etc/skel/.profile", + owner => 'annegentle', + group => 'annegentle', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'dan-prince': + ensure => 'present' + } + + user { 'dan-prince': + ensure => 'present', + comment => 'Dan Prince', + home => $operatingsystem ? { + Darwin => '/Users/dan-prince', + solaris => '/export/home/dan-prince', + default => '/home/dan-prince', + }, + shell => '/bin/bash', + gid => 'dan-prince', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'dan-princehome': + name => $operatingsystem ? { + Darwin => '/Users/dan-prince', + solaris => '/export/home/dan-prince', + default => '/home/dan-prince', + }, + owner => 'dan-prince', + group => 'dan-prince', + mode => 644, + ensure => 'directory', + } + + + file { 'dan-princesshdir': + name => $operatingsystem ? { + Darwin => '/Users/dan-prince/.ssh', + solaris => '/export/home/dan-prince/.ssh', + default => '/home/dan-prince/.ssh', + }, + owner => 'dan-prince', + group => 'dan-prince', + mode => 600, + ensure => 'directory', + require => File['dan-princehome'], + } + + file { 'dan-princekeys': + name => $operatingsystem ? { + Darwin => '/Users/dan-prince/.ssh/authorized_keys', + solaris => '/export/home/dan-prince/.ssh/authorized_keys', + default => '/home/dan-prince/.ssh/authorized_keys', + }, + owner => 'dan-prince', + group => 'dan-prince', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA+yNMzUrQXa0EOfv+WJtfmLO1WdoOaD47G9qwllSUc4GPRkYzkTNdxcEPrR3XBR94ctOeWOHZ/w7ymhvwK5LLsoNBK+WgRz/mg8oHcii2GoL0fNojdwUMyFMIJxJT+iwjF/omyhyrW/aLAztAKRO7BdOkNlXMAAcMxKzQtFqdZm09ghoImu3BPYUTyDKHMp+t0P1d7mkHdd719oDfMf+5miHxQeJZJCWAsGwroN7k8a46rvezDHEygBsDAF2ZpS2iGMABos/vTp1oyHkCgCqc3rM0OoKqcKB5iQ9Qaqi5ung08BXP/PHfVynXzdGMjTh4w+6jiMw7Dx2GrQIJsDolKQ== dan.prince@dovetail \n", + ensure => 'present', + require => File['dan-princesshdir'], + } + + file { 'dan-princebashrc': + name => $operatingsystem ? { + Darwin => '/Users/dan-prince/.bashrc', + solaris => '/export/home/dan-prince/.bashrc', + default => '/home/dan-prince/.bashrc', + }, + owner => 'dan-prince', + group => 'dan-prince', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'dan-princebash_logout': + name => $operatingsystem ? { + Darwin => '/Users/dan-prince/.bash_logout', + solaris => '/export/home/dan-prince/.bash_logout', + default => '/home/dan-prince/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'dan-prince', + group => 'dan-prince', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'dan-princeprofile': + name => $operatingsystem ? { + Darwin => '/Users/dan-prince/.profile', + solaris => '/export/home/dan-prince/.profile', + default => '/home/dan-prince/.profile', + }, + source => "/etc/skel/.profile", + owner => 'dan-prince', + group => 'dan-prince', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'eday': + ensure => 'present' + } + + user { 'eday': + ensure => 'present', + comment => 'Eric Day', + home => $operatingsystem ? { + Darwin => '/Users/eday', + solaris => '/export/home/eday', + default => '/home/eday', + }, + shell => '/bin/bash', + gid => 'eday', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'edayhome': + name => $operatingsystem ? { + Darwin => '/Users/eday', + solaris => '/export/home/eday', + default => '/home/eday', + }, + owner => 'eday', + group => 'eday', + mode => 644, + ensure => 'directory', + } + + + file { 'edaysshdir': + name => $operatingsystem ? { + Darwin => '/Users/eday/.ssh', + solaris => '/export/home/eday/.ssh', + default => '/home/eday/.ssh', + }, + owner => 'eday', + group => 'eday', + mode => 600, + ensure => 'directory', + require => File['edayhome'], + } + + file { 'edaykeys': + name => $operatingsystem ? { + Darwin => '/Users/eday/.ssh/authorized_keys', + solaris => '/export/home/eday/.ssh/authorized_keys', + default => '/home/eday/.ssh/authorized_keys', + }, + owner => 'eday', + group => 'eday', + mode => 640, + content => "ssh-rsa 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 eday@oddments.org", + ensure => 'present', + require => File['edaysshdir'], + } + + file { 'edaybashrc': + name => $operatingsystem ? { + Darwin => '/Users/eday/.bashrc', + solaris => '/export/home/eday/.bashrc', + default => '/home/eday/.bashrc', + }, + owner => 'eday', + group => 'eday', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'edaybash_logout': + name => $operatingsystem ? { + Darwin => '/Users/eday/.bash_logout', + solaris => '/export/home/eday/.bash_logout', + default => '/home/eday/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'eday', + group => 'eday', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'edayprofile': + name => $operatingsystem ? { + Darwin => '/Users/eday/.profile', + solaris => '/export/home/eday/.profile', + default => '/home/eday/.profile', + }, + source => "/etc/skel/.profile", + owner => 'eday', + group => 'eday', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'corvus': + ensure => 'present' + } + + user { 'corvus': + ensure => 'present', + comment => 'James E. Blair', + home => $operatingsystem ? { + Darwin => '/Users/corvus', + solaris => '/export/home/corvus', + default => '/home/corvus', + }, + shell => '/bin/bash', + gid => 'corvus', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'corvushome': + name => $operatingsystem ? { + Darwin => '/Users/corvus', + solaris => '/export/home/corvus', + default => '/home/corvus', + }, + owner => 'corvus', + group => 'corvus', + mode => 644, + ensure => 'directory', + } + + + file { 'corvussshdir': + name => $operatingsystem ? { + Darwin => '/Users/corvus/.ssh', + solaris => '/export/home/corvus/.ssh', + default => '/home/corvus/.ssh', + }, + owner => 'corvus', + group => 'corvus', + mode => 600, + ensure => 'directory', + require => File['corvushome'], + } + + file { 'corvuskeys': + name => $operatingsystem ? { + Darwin => '/Users/corvus/.ssh/authorized_keys', + solaris => '/export/home/corvus/.ssh/authorized_keys', + default => '/home/corvus/.ssh/authorized_keys', + }, + owner => 'corvus', + group => 'corvus', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAvKYcWK1T7e3PKSFiqb03EYktnoxVASpPoq2rJw2JvhsP0JfS+lKrPzpUQv7L4JCuQMsPNtZ8LnwVEft39k58Kh8XMebSfaqPYAZS5zCNvQUQIhP9myOevBZf4CDeG+gmssqRFcWEwIllfDuIzKBQGVbomR+Y5QuW0HczIbkoOYI6iyf2jB6xg+bmzR2HViofNrSa62CYmHS6dO04Z95J27w6jGWpEOTBjEQvnb9sdBc4EzaBVmxCpa2EilB1u0th7/DvuH0yP4T+X8G8UjW1gZCTOVw06fqlBCST4KjdWw1F/AuOCT7048klbf4H+mCTaEcPzzu3Fkv8ckMWtS/Z9Q== jeblair@operational-necessity \n", + ensure => 'present', + require => File['corvussshdir'], + } + + file { 'corvusbashrc': + name => $operatingsystem ? { + Darwin => '/Users/corvus/.bashrc', + solaris => '/export/home/corvus/.bashrc', + default => '/home/corvus/.bashrc', + }, + owner => 'corvus', + group => 'corvus', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'corvusbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/corvus/.bash_logout', + solaris => '/export/home/corvus/.bash_logout', + default => '/home/corvus/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'corvus', + group => 'corvus', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'corvusprofile': + name => $operatingsystem ? { + Darwin => '/Users/corvus/.profile', + solaris => '/export/home/corvus/.profile', + default => '/home/corvus/.profile', + }, + source => "/etc/skel/.profile", + owner => 'corvus', + group => 'corvus', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'jaypipes': + ensure => 'present' + } + + user { 'jaypipes': + ensure => 'present', + comment => 'Jay Pipes', + home => $operatingsystem ? { + Darwin => '/Users/jaypipes', + solaris => '/export/home/jaypipes', + default => '/home/jaypipes', + }, + shell => '/bin/bash', + gid => 'jaypipes', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'jaypipeshome': + name => $operatingsystem ? { + Darwin => '/Users/jaypipes', + solaris => '/export/home/jaypipes', + default => '/home/jaypipes', + }, + owner => 'jaypipes', + group => 'jaypipes', + mode => 644, + ensure => 'directory', + } + + + file { 'jaypipessshdir': + name => $operatingsystem ? { + Darwin => '/Users/jaypipes/.ssh', + solaris => '/export/home/jaypipes/.ssh', + default => '/home/jaypipes/.ssh', + }, + owner => 'jaypipes', + group => 'jaypipes', + mode => 600, + ensure => 'directory', + require => File['jaypipeshome'], + } + + file { 'jaypipeskeys': + name => $operatingsystem ? { + Darwin => '/Users/jaypipes/.ssh/authorized_keys', + solaris => '/export/home/jaypipes/.ssh/authorized_keys', + default => '/home/jaypipes/.ssh/authorized_keys', + }, + owner => 'jaypipes', + group => 'jaypipes', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA5d2DekN5POb+e04tVtC/pok7r0Lg/+90sbvhgLTDKSGM7uPI83ulH4sZrMKVU5NTK4GBh9G+RNK6UaKodNiBGKiHZ4QdaMqbkP3TIXd3uDEBUefEAzSqpCGydbjpmtxFZWtA5hcKXTSpMRbbx/vek3lYIRsQaU0Ezc7V0cczSmJBGA6VH22TIW/5wkVvZQozK2jdkIAnJhdL7CN5kKyGs94CfXN9ofNr1ssVb/tPJqSotx7FDcrwT9VmEWTn/nCuoWf42sVu0RIHVMSpr5sxFa+G33omeRLOSCCD+zYZoMCEHZTFNCXZhPWGebWhgGHsu0+bN6heRmoJ8lw01gHxWQ== jpipes@serialcoder\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAt2tCgmlHEj5huGLJTPM2pV+aj6ZObneGq92m30LsKOn2SMrC9y4PpqjlRDweduBDKK2cPSnHt3HL1jM5npLh5IGHN2FxAWo3spgwpWPhdkT1VbdyiTZPw4++y/qZhWdNvEWBpNcf3Zn2Qi0x7F1+5fCri/vwVA9RBG35wozaP0mkxaJuAS/LLR7ZJIF99Fqfdk6+Fp5mobXt0ggEqs/78MhCuE2AYaNZ/VWCoanL4w6+UJwZV1Ftd9Ksx6f+8NpaOC9WlNSxJmp2EDJsLBy8mpJh1OsAjC3hu1VvQYmYhSo47ADSfAw9h7aaLUcL6hb7w2n4f+9Ej2+L6+NzEm0Izw== jpipes@serialcoder", + ensure => 'present', + require => File['jaypipessshdir'], + } + + file { 'jaypipesbashrc': + name => $operatingsystem ? { + Darwin => '/Users/jaypipes/.bashrc', + solaris => '/export/home/jaypipes/.bashrc', + default => '/home/jaypipes/.bashrc', + }, + owner => 'jaypipes', + group => 'jaypipes', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'jaypipesbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/jaypipes/.bash_logout', + solaris => '/export/home/jaypipes/.bash_logout', + default => '/home/jaypipes/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'jaypipes', + group => 'jaypipes', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'jaypipesprofile': + name => $operatingsystem ? { + Darwin => '/Users/jaypipes/.profile', + solaris => '/export/home/jaypipes/.profile', + default => '/home/jaypipes/.profile', + }, + source => "/etc/skel/.profile", + owner => 'jaypipes', + group => 'jaypipes', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'heckj': + ensure => 'present' + } + + user { 'heckj': + ensure => 'present', + comment => 'Joseph Heck', + home => $operatingsystem ? { + Darwin => '/Users/heckj', + solaris => '/export/home/heckj', + default => '/home/heckj', + }, + shell => '/bin/bash', + gid => 'heckj', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'heckjhome': + name => $operatingsystem ? { + Darwin => '/Users/heckj', + solaris => '/export/home/heckj', + default => '/home/heckj', + }, + owner => 'heckj', + group => 'heckj', + mode => 644, + ensure => 'directory', + } + + + file { 'heckjsshdir': + name => $operatingsystem ? { + Darwin => '/Users/heckj/.ssh', + solaris => '/export/home/heckj/.ssh', + default => '/home/heckj/.ssh', + }, + owner => 'heckj', + group => 'heckj', + mode => 600, + ensure => 'directory', + require => File['heckjhome'], + } + + file { 'heckjkeys': + name => $operatingsystem ? { + Darwin => '/Users/heckj/.ssh/authorized_keys', + solaris => '/export/home/heckj/.ssh/authorized_keys', + default => '/home/heckj/.ssh/authorized_keys', + }, + owner => 'heckj', + group => 'heckj', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAIEA3GLOPOhg6NZX6AS5RaDaxNUPVyvSOPty3X2ZWfF1p9YzO9hF6r97g/Du3DawFO9wluCZxOJujsz8mMZT77ZeiTPYMhKZj2v9fC63PnZ++6d2k3h6SNK/oezc9t9nzor9hX7nr5N7xYOWmke6SOmET+Ju0EOv47ckjcVKZeA1S6c= joe@mu.org \n\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAxp9biRxxduCjWz0ytNj1+bGCTB6GRecWFUp4Bk1iC6X2oiNE600vfAJw+qZljvTzZ4ijwe4bYP26FdHvH1dKc3Oc9UiExYg9BuGue62LdVQGFtpNWvgPxzoRsU+Eko3X6MbtnzQeCW+Fv2vqzKZqt9ItO4UAXwH3hQ54V6rZKbPBOI66IJahWlIYCuLBbaoZOTonXoigVACrqkmfPdOTgo63wqi0yON5OUX9FoUD8vXRe8gbs0uOE2Zc/RHnaAueagSnMHiJcYUarzdukjmmNbHtXjgg/VmC3HCrWWKZYMLPy8Xtxb32METTfutXnKBTicl5Fgy5UKiXcEu3PVY1rQ== heckj@ubuntu \n\nssh-dsa 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 heckj@cwch.local \n", + ensure => 'present', + require => File['heckjsshdir'], + } + + file { 'heckjbashrc': + name => $operatingsystem ? { + Darwin => '/Users/heckj/.bashrc', + solaris => '/export/home/heckj/.bashrc', + default => '/home/heckj/.bashrc', + }, + owner => 'heckj', + group => 'heckj', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'heckjbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/heckj/.bash_logout', + solaris => '/export/home/heckj/.bash_logout', + default => '/home/heckj/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'heckj', + group => 'heckj', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'heckjprofile': + name => $operatingsystem ? { + Darwin => '/Users/heckj/.profile', + solaris => '/export/home/heckj/.profile', + default => '/home/heckj/.profile', + }, + source => "/etc/skel/.profile", + owner => 'heckj', + group => 'heckj', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'mordred': + ensure => 'present' + } + + user { 'mordred': + ensure => 'present', + comment => 'Monty Taylor', + home => $operatingsystem ? { + Darwin => '/Users/mordred', + solaris => '/export/home/mordred', + default => '/home/mordred', + }, + shell => '/bin/bash', + gid => 'mordred', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'mordredhome': + name => $operatingsystem ? { + Darwin => '/Users/mordred', + solaris => '/export/home/mordred', + default => '/home/mordred', + }, + owner => 'mordred', + group => 'mordred', + mode => 644, + ensure => 'directory', + } + + + file { 'mordredsshdir': + name => $operatingsystem ? { + Darwin => '/Users/mordred/.ssh', + solaris => '/export/home/mordred/.ssh', + default => '/home/mordred/.ssh', + }, + owner => 'mordred', + group => 'mordred', + mode => 600, + ensure => 'directory', + require => File['mordredhome'], + } + + file { 'mordredkeys': + name => $operatingsystem ? { + Darwin => '/Users/mordred/.ssh/authorized_keys', + solaris => '/export/home/mordred/.ssh/authorized_keys', + default => '/home/mordred/.ssh/authorized_keys', + }, + owner => 'mordred', + group => 'mordred', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAr+HlnLCCMnAqP6bvAQmb6aMfNjwp425OuG9nlN6uXXEymP5G/WT/Ok2RWb+O1hsaRGsvwHrkCdhCvT0XrDIWRCK3vaQ/v0LogeRbX5HIdOrH6r5N++DV9SqVTFZ6+54CfOE/pyku6pkBdoM8WJ9EIQBQC82EE6mgtpS/UNdiymsoB+2I8yNwUROm/AROCjqN60PI/2j234qYYaUXoD/FM3ZE/cfUoTTi0NAbt5OM5pCHPfaWhWCYtQ4l2CnEXXhKU9TcoQVoTu54IBAmblgD2LeJnOsKQtVcd5rgGzl/OtkL1ZvWCq23LHMeOC2WANgWIyxp4x66m51uErbgnTwOkQ== monty@sanction\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAwgRJ+iQMzive6pq8f/F4N0CN0+SptI5l+yj10Rx3i80Zh4a3ERratuIsEmuyyeBU/l+dmR074Jic/42rYnQJBEKT5bvGLhiftcSUu630NZgAFnP5e4TbpHlYJzXDxOOctAHyd8TH5iQftWeNi5NIYAwfYpO6a4/GE1InMcyqW+icyDxyt3rwDN0qzLHcVFdCgWPsbEuJuqweH/qsen78LNWPro+ynk6dnsSKhe8dWkhYjPhAEjbsL13VezksHNbk2aa/yvppCCgdLdvniaQDKr+F0/X5Xp1teL8L7Rr9Ei+I3l6Ge4I3KY0s8TM+6TpAp4GGvdKakOBeoSAP5wYjrw== root@camelot \n\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyxfIpVCvZyM8BIy7r7WOSIG6Scxq4afean1Pc/bej5ZWHXCu1QnhGbI7rW3sWciEhi375ILejfODl2TkBpfdJe/DL205lLkTxAa+FUqcZ5Ymwe+jBgCH5XayzyhRPFFLn07IfA/BDAjGPqFLvq6dCEHVNJIui6oEW7OUf6a3376YF55r9bw/8Ct00F9N7zrISeSSeZXbNR+dEqcsBEKBqvZGcLtM4jzDzNXw1ITPPMGaoEIIszLpkkJcy8u/13GIrbAwNrB2wjl6Mzj+N9nTsB4rFtxRXp31ZbytCH5G9CL/mFard7yi8NLVEJPZJvAifNVhooxGN06uAiTFE8EsuQ== mtaylor@qualinost \n\nssh-rsa AAAAB3NzaC1yc2EAAAABJQAAAIB6bmpw3QjDUMDhYGiSA1tlolTrGQGcSXgfGindWnDymGE5uglpgsGbYeRqL+4lrULCDYvMJ9IGSVJOQ40VcnRcGHO+ykyUp3VNTnfwpU0Ee3xapmKL0o7sPqXx8Vlr0X2b7RaQbUYT48jyI9D1h5RW8At2X4N4A4d1HibfURTzgQ== rsa-key-20100819\nssh-dsa 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 monty@speedy\nssh-dsa AAAAB3NzaC1kc3MAAACBAN2I6q4yjydSwEnhf45GPBDvj/MUjPBlTj3Buf+xunUtfdXSIpTDvasTVibEKhNrNkr0zkIe8hE5uOM3pHeSLRx9Tj8Txjn5RN3xsKhkqhS/j/GCPiDWRQnpfHPWHK7NxEMwbMv7Rato8YubVmSq9UodXSWytcSXZCTtQVZJvDMjAAAAFQCA+aVTTD9XcC7A575rcu0j75f2HwAAAIA8tdrsQoNV1AMde6r0iE8T8wkw9T9cA9bwK8sbIR3S81FG805bMdVanBfDBwfOTM/rbuGQoH4F8oqURor7njwARh5BLTFrpqSqSw6vTm30TJnRDUS7qrDG0xrzqk+RF5AXHHJ4MJKbjpUc2C3MHOo+rybjE1rJh9OWr9xG3oRroAAAAIAyN2Btf9fCJh2MhqPrtVCfSUzcE7qz/7XludszUwrWElsTfqXtSfRqiQybXSImVPz9DE+ZufOHGLMGolEi+ALRgLp4L7JDBld+Gga64HnAbg/jmDKN97CyFrRbmVbln/oFQFmDhLchGnERhRKQWOWwXKdOrDgGvDwHORsCffUVLw== mtaylor@qualinost \n\nssh-dsa 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 mtaylor@qualinost \n", + ensure => 'present', + require => File['mordredsshdir'], + } + + file { 'mordredbashrc': + name => $operatingsystem ? { + Darwin => '/Users/mordred/.bashrc', + solaris => '/export/home/mordred/.bashrc', + default => '/home/mordred/.bashrc', + }, + owner => 'mordred', + group => 'mordred', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'mordredbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/mordred/.bash_logout', + solaris => '/export/home/mordred/.bash_logout', + default => '/home/mordred/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'mordred', + group => 'mordred', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'mordredprofile': + name => $operatingsystem ? { + Darwin => '/Users/mordred/.profile', + solaris => '/export/home/mordred/.profile', + default => '/home/mordred/.profile', + }, + source => "/etc/skel/.profile", + owner => 'mordred', + group => 'mordred', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'santosh-jodh-8': + ensure => 'present' + } + + user { 'santosh-jodh-8': + ensure => 'present', + comment => 'Santosh Jodh', + home => $operatingsystem ? { + Darwin => '/Users/santosh-jodh-8', + solaris => '/export/home/santosh-jodh-8', + default => '/home/santosh-jodh-8', + }, + shell => '/bin/bash', + gid => 'santosh-jodh-8', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'santosh-jodh-8home': + name => $operatingsystem ? { + Darwin => '/Users/santosh-jodh-8', + solaris => '/export/home/santosh-jodh-8', + default => '/home/santosh-jodh-8', + }, + owner => 'santosh-jodh-8', + group => 'santosh-jodh-8', + mode => 644, + ensure => 'directory', + } + + + file { 'santosh-jodh-8sshdir': + name => $operatingsystem ? { + Darwin => '/Users/santosh-jodh-8/.ssh', + solaris => '/export/home/santosh-jodh-8/.ssh', + default => '/home/santosh-jodh-8/.ssh', + }, + owner => 'santosh-jodh-8', + group => 'santosh-jodh-8', + mode => 600, + ensure => 'directory', + require => File['santosh-jodh-8home'], + } + + file { 'santosh-jodh-8keys': + name => $operatingsystem ? { + Darwin => '/Users/santosh-jodh-8/.ssh/authorized_keys', + solaris => '/export/home/santosh-jodh-8/.ssh/authorized_keys', + default => '/home/santosh-jodh-8/.ssh/authorized_keys', + }, + owner => 'santosh-jodh-8', + group => 'santosh-jodh-8', + mode => 640, + content => "", + ensure => 'present', + require => File['santosh-jodh-8sshdir'], + } + + file { 'santosh-jodh-8bashrc': + name => $operatingsystem ? { + Darwin => '/Users/santosh-jodh-8/.bashrc', + solaris => '/export/home/santosh-jodh-8/.bashrc', + default => '/home/santosh-jodh-8/.bashrc', + }, + owner => 'santosh-jodh-8', + group => 'santosh-jodh-8', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'santosh-jodh-8bash_logout': + name => $operatingsystem ? { + Darwin => '/Users/santosh-jodh-8/.bash_logout', + solaris => '/export/home/santosh-jodh-8/.bash_logout', + default => '/home/santosh-jodh-8/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'santosh-jodh-8', + group => 'santosh-jodh-8', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'santosh-jodh-8profile': + name => $operatingsystem ? { + Darwin => '/Users/santosh-jodh-8/.profile', + solaris => '/export/home/santosh-jodh-8/.profile', + default => '/home/santosh-jodh-8/.profile', + }, + source => "/etc/skel/.profile", + owner => 'santosh-jodh-8', + group => 'santosh-jodh-8', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'soren': + ensure => 'present' + } + + user { 'soren': + ensure => 'present', + comment => 'Soren Hansen', + home => $operatingsystem ? { + Darwin => '/Users/soren', + solaris => '/export/home/soren', + default => '/home/soren', + }, + shell => '/bin/bash', + gid => 'soren', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'sorenhome': + name => $operatingsystem ? { + Darwin => '/Users/soren', + solaris => '/export/home/soren', + default => '/home/soren', + }, + owner => 'soren', + group => 'soren', + mode => 644, + ensure => 'directory', + } + + + file { 'sorensshdir': + name => $operatingsystem ? { + Darwin => '/Users/soren/.ssh', + solaris => '/export/home/soren/.ssh', + default => '/home/soren/.ssh', + }, + owner => 'soren', + group => 'soren', + mode => 600, + ensure => 'directory', + require => File['sorenhome'], + } + + file { 'sorenkeys': + name => $operatingsystem ? { + Darwin => '/Users/soren/.ssh/authorized_keys', + solaris => '/export/home/soren/.ssh/authorized_keys', + default => '/home/soren/.ssh/authorized_keys', + }, + owner => 'soren', + group => 'soren', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA7bpJJzvwa4KKzxk9fyegkCUKKOA1gttDJdB+E2mllxcDkScYRYoFnwiq0kl1BwkNFRXj10pguhI/7O3escSvF3Di2Lw4haHR8my6yaz7jFlBbBw8+6j5RbIRnTORS5G4mH4LtAxToGomfJd9gxWpVMiqLa4V7Hg8K6CYRSSUOWzqs7Y/Hv13ASr8ZbaweB1ygVE8kbKuW2ILcqRrKYKaQDeh+aPqLsXDNhT2k2WLsTIqMTSKy70sHqyCjD2joRVBuTiqt1uaQqYCJWT8vuDvXsF0Lmi4tMjRF7GOuOKd0QsT5y8C8dLHWDfeBNQJv46dZE6UUHOfhucTM4w73zpXaw== soren@butch\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEA8YfXbgi0uNZEpOxLvzPdGgo5dAAjqVUGf+kU1bvxcZf3y7a2veDXOOnez4VGl6OC1bgeENW/5O2hKi0wUG3XMWp8uLVSupI6A8o+cBCu7MYzChMdgullBEh7Bz4cbvoMmQiWOZPPsZLTTrl7E6SJJ5jTTn8IsSkCp21m2Sr4b5SWj+Nw43NVtGYFtBBG/OoixlxcNutiSn7YjOH6CAVOhKpTNddwqECKBfxCdS2kYrMzJw8/QhA9FwJHoFt3PevuC4I/9ARlyZCsbOY+ENc2NtFXNVnF5m6tE/eDZFTt652pNPlldWAaVBzKDZ4CUi4HS3WDxGcVqhtaNawIV6sR8w== soren@intel \n\nssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAyAtAccJ8ndh6wzq3vY1izHTdPh3kAKtjBK6P390ClIRBA3CfjKS6KaKSeGs1xZ4WZhOk9oz4d/+Ep7iOXLpUnYYjHm5bLD8o6jKAhKohoABzCyj3ONPNxvxvsvdahSPLONC6H1PlbhvTbn9UwEtZ//migJTATdLQEjXHaNhNJ8UZz9XtCf1Qv4YiYmyRId6h5N+OPNU4OmqlCZyanBXKN5jK1Kubq6SseY++74Y54ZPXVccGmJDTOfNBfM1nR0+f2Mq2iHR0a3PuJcGXFx/P4mIA0Knyh98W6esB9fG7/JVID2bGpJ6c91+AkL9fmwOpfWrk7rr13+iGiH2RTcmd0w== soren@lenny \n\nssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCGTnV3tEMvry4UruD6I23TW3L616ML8p15kdj4TYlcBUZvUDzPoT+QjinNw7Pm1C4dJk3xJJtvxshKSXF08QF88kWgtF6jSpp1ZwmDXKNnPRLAIT5pewubFHd5iwMFf371P2/kxIm37iAo45puTO0CL39dAKkw6L/F7M3ycFUgsIkik6oN9bX1X3Yu3e/Lv2hJ1LGN7K2nnQmLd9aFulpruM7iPtFt8qJ82ofJq2LGH931QsP1QonvJxonajo9wrEAfXTFENDwcoOD0Py+KXOddqb/1SJxbLwclDmHMX5bKA5K+R6GzzpDUEsDZYa1xhJpmOmlaBTxFGoQg/wtHUNf cardno:000500000063", + ensure => 'present', + require => File['sorensshdir'], + } + + file { 'sorenbashrc': + name => $operatingsystem ? { + Darwin => '/Users/soren/.bashrc', + solaris => '/export/home/soren/.bashrc', + default => '/home/soren/.bashrc', + }, + owner => 'soren', + group => 'soren', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'sorenbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/soren/.bash_logout', + solaris => '/export/home/soren/.bash_logout', + default => '/home/soren/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'soren', + group => 'soren', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'sorenprofile': + name => $operatingsystem ? { + Darwin => '/Users/soren/.profile', + solaris => '/export/home/soren/.profile', + default => '/home/soren/.profile', + }, + source => "/etc/skel/.profile", + owner => 'soren', + group => 'soren', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + + group { 'ttx': + ensure => 'present' + } + + user { 'ttx': + ensure => 'present', + comment => 'Thierry Carrez', + home => $operatingsystem ? { + Darwin => '/Users/ttx', + solaris => '/export/home/ttx', + default => '/home/ttx', + }, + shell => '/bin/bash', + gid => 'ttx', + groups => ['wheel','sudo','admin'], + membership => 'minimum', + } + + file { 'ttxhome': + name => $operatingsystem ? { + Darwin => '/Users/ttx', + solaris => '/export/home/ttx', + default => '/home/ttx', + }, + owner => 'ttx', + group => 'ttx', + mode => 644, + ensure => 'directory', + } + + + file { 'ttxsshdir': + name => $operatingsystem ? { + Darwin => '/Users/ttx/.ssh', + solaris => '/export/home/ttx/.ssh', + default => '/home/ttx/.ssh', + }, + owner => 'ttx', + group => 'ttx', + mode => 600, + ensure => 'directory', + require => File['ttxhome'], + } + + file { 'ttxkeys': + name => $operatingsystem ? { + Darwin => '/Users/ttx/.ssh/authorized_keys', + solaris => '/export/home/ttx/.ssh/authorized_keys', + default => '/home/ttx/.ssh/authorized_keys', + }, + owner => 'ttx', + group => 'ttx', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAz4Mu4IhAg3/AY4fCnAomOAJIkJS4YnTlTXiIikUIqS/R \n116Do8CxKJjwM8MPc0i/n7zpYKTgAEJ4qbgaWG/sGokUw8ZsJ+6WfcSLGszU/6qd7+s3BEqUyStTsPrV \nmK7gnBroub+WaLk0/BKfMR+Mx3MJY/wPisuqdHK8kViQR09/qSFuuPgSZsYw2GuLM1Ul4h3vC4BaAbQV \ne+1AKq7/Yz+ARK1IDr7ZqdK7T1f/G01Vi1J03Q0YCeB7JFvUFtwPm561yNOWXxQuJMQ9Z1CDunRpLiil \nRN8WrM97ETF9i+XKCavb54UxzDz1SEwyhSouTdSFRc1A3jZMloZrvr2hLQ== ttx@cassini\nssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDIF2INBeJdT3nT3+3yac+DGRQVN7wPv/GTb/OPDocQhfGMeQP7JwSURiv1nrXGbbjzuip7l7vRJs4u4NqXkUi0GFj1aLBpUm2Z1NFFDn4cuZ5KCYX6rjVrDYIpj4OlOyzt9YGONvvH/dB2GHw8kYbN50OalFWQCS0TVzj9SQbO47B/TPdtLnh116yEP5AXZZUGgl+q533/x8+nxAxJKA9iAk3mSswl67gXc4pRo84pjwpx+R/52ha6RfmLkoNAEOqtr5MGx5gyW+WXsoLJBl2bjcfzYoQI7gPWRIn+rtCnDFi762TS54zstXxR1ww+ppmqHk04l2oprNoI0wr00Fsl ttx@stardust \n", + ensure => 'present', + require => File['ttxsshdir'], + } + + file { 'ttxbashrc': + name => $operatingsystem ? { + Darwin => '/Users/ttx/.bashrc', + solaris => '/export/home/ttx/.bashrc', + default => '/home/ttx/.bashrc', + }, + owner => 'ttx', + group => 'ttx', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'ttxbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/ttx/.bash_logout', + solaris => '/export/home/ttx/.bash_logout', + default => '/home/ttx/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'ttx', + group => 'ttx', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'ttxprofile': + name => $operatingsystem ? { + Darwin => '/Users/ttx/.profile', + solaris => '/export/home/ttx/.profile', + default => '/home/ttx/.profile', + }, + source => "/etc/skel/.profile", + owner => 'ttx', + group => 'ttx', + mode => 640, + replace => 'false', + ensure => 'present', + } + + + +} + \ No newline at end of file diff --git a/manifests/server.pp b/manifests/server.pp new file mode 100644 index 0000000000..00e2e6e10f --- /dev/null +++ b/manifests/server.pp @@ -0,0 +1,29 @@ +import "openstack_admins_users" + +node default { + include openstack_admins_users + + package { "python-software-properties": + ensure => latest + } + + package { "puppet": + ensure => latest + } + + package { "bzr": + ensure => latest + } + + package { "git": + ensure => latest + } + + package { "python-setuptools": + ensure => latest + } + + package { "byobu": + ensure => latest + } +} diff --git a/manifests/slave.pp b/manifests/slave.pp new file mode 100644 index 0000000000..f643e2b222 --- /dev/null +++ b/manifests/slave.pp @@ -0,0 +1,51 @@ +import "openstack_ci_admins_users" +import "static_users" + +node default { + include openstack_ci_admins_users + include static_users + + package { "python-software-properties": + ensure => latest + } + + package { "openjdk-6-jre": + ensure => latest + } + + package { "puppet": + ensure => latest + } + + package { "bzr": + ensure => latest + } + + package { "git": + ensure => latest + } + + package { "python-setuptools": + ensure => latest + } + + package { "python-sphinx": + ensure => latest + } + + package { "graphviz": + ensure => latest + } + + package { "pep8": + ensure => latest + } + + package { "pylint": + ensure => latest + } + + package { "byobu": + ensure => latest + } +} diff --git a/manifests/static_users.pp b/manifests/static_users.pp new file mode 100644 index 0000000000..84fd74ef4f --- /dev/null +++ b/manifests/static_users.pp @@ -0,0 +1,104 @@ +class static_users { + + group { 'jenkins': + ensure => 'present' + } + + user { 'jenkins': + ensure => 'present', + comment => 'Jenkins User', + home => $operatingsystem ? { + Darwin => '/Users/jenkins', + solaris => '/export/home/jenkins', + default => '/home/jenkins', + }, + gid => 'jenkins', + shell => '/bin/bash', + groups => ['wheel','sudo'], + membership => 'minimum', + } + + file { 'jenkinshome': + name => $operatingsystem ? { + Darwin => '/Users/jenkins', + solaris => '/export/home/jenkins', + default => '/home/jenkins', + }, + owner => 'jenkins', + group => 'jenkins', + mode => 644, + ensure => 'directory', + } + + + file { 'jenkinssshdir': + name => $operatingsystem ? { + Darwin => '/Users/jenkins/.ssh', + solaris => '/export/home/jenkins/.ssh', + default => '/home/jenkins/.ssh', + }, + owner => 'jenkins', + group => 'jenkins', + mode => 600, + ensure => 'directory', + require => File['jenkinshome'], + } + + file { 'jenkinskeys': + name => $operatingsystem ? { + Darwin => '/Users/jenkins/.ssh/authorized_keys', + solaris => '/export/home/jenkins/.ssh/authorized_keys', + default => '/home/jenkins/.ssh/authorized_keys', + }, + owner => 'jenkins', + group => 'jenkins', + mode => 640, + content => "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAtioTW2wh3mBRuj+R0Jyb/mLt5sjJ8dEvYyA8zfur1dnqEt5uQNLacW4fHBDFWJoLHfhdfbvray5wWMAcIuGEiAA2WEH23YzgIbyArCSI+z7gB3SET8zgff25ukXlN+1mBSrKWxIza+tB3NU62WbtO6hmelwvSkZ3d7SDfHxrc4zEpmHDuMhxALl8e1idqYzNA+1EhZpbcaf720mX+KD3oszmY2lqD1OkKMquRSD0USXPGlH3HK11MTeCArKRHMgTdIlVeqvYH0v0Wd1w/8mbXgHxfGzMYS1Ej0fzzJ0PC5z5rOqsMqY1X2aC1KlHIFLAeSf4Cx0JNlSpYSrlZ/RoiQ== hudson@hudson", + ensure => 'present', + require => File['jenkinssshdir'], + } + + file { 'jenkinsbashrc': + name => $operatingsystem ? { + Darwin => '/Users/jenkins/.bashrc', + solaris => '/export/home/jenkins/.bashrc', + default => '/home/jenkins/.bashrc', + }, + owner => 'jenkins', + group => 'jenkins', + mode => 640, + source => "/etc/skel/.bashrc", + replace => 'false', + ensure => 'present', + } + + file { 'jenkinsbash_logout': + name => $operatingsystem ? { + Darwin => '/Users/jenkins/.bash_logout', + solaris => '/export/home/jenkins/.bash_logout', + default => '/home/jenkins/.bash_logout', + }, + source => "/etc/skel/.bash_logout", + owner => 'jenkins', + group => 'jenkins', + mode => 640, + replace => 'false', + ensure => 'present', + } + + file { 'jenkinsprofile': + name => $operatingsystem ? { + Darwin => '/Users/jenkins/.profile', + solaris => '/export/home/jenkins/.profile', + default => '/home/jenkins/.profile', + }, + source => "/etc/skel/.profile", + owner => 'jenkins', + group => 'jenkins', + mode => 640, + replace => 'false', + ensure => 'present', + } + +} + diff --git a/modules/drizzle_user/manifests/init.pp b/modules/drizzle_user/manifests/init.pp new file mode 100644 index 0000000000..9febc354f8 --- /dev/null +++ b/modules/drizzle_user/manifests/init.pp @@ -0,0 +1,32 @@ +define drizzle_user ( $username, $fullname ) { + + group { $username: + ensure => 'present' + } + + user { $username: + ensure => 'present', + comment => $fullname, + home => $operatingsystem ? { + Darwin => '/Users/$username', + solaris => '/export/home/$username', + default => '/home/$username', + }, + managehome => true, + } + + + file { 'sshdir': + name => $operatingsystem ? { + Darwin => '/Users/$username/.ssh', + solaris => '/export/home/$username/.ssh', + default => '/home/$username/.ssh', + }, + owner => $username, + group => $username, + mode => 600, + ensure => 'directory', + require => User[$username], + } + +} diff --git a/modules/sudoers/files/sudoers b/modules/sudoers/files/sudoers new file mode 100644 index 0000000000..693e87ea8b --- /dev/null +++ b/modules/sudoers/files/sudoers @@ -0,0 +1,24 @@ +# /etc/sudoers +# +# This file MUST be edited with the 'visudo' command as root. +# +# See the man page for details on how to write a sudoers file. +# + +Defaults env_reset + +# Host alias specification + +# User alias specification + +# Cmnd alias specification +#drizzle ALL = NOPASSWD: /usr/bin/pbuilder + + +# User privilege specification +root ALL=(ALL) ALL + +# Uncomment to allow members of group sudo to not need a password +# (Note that later entries override this, so you might need to move +# it further down) +%wheel ALL=NOPASSWD: ALL diff --git a/modules/sudoers/files/sudoers.Darwin b/modules/sudoers/files/sudoers.Darwin new file mode 100644 index 0000000000..16125f90e1 --- /dev/null +++ b/modules/sudoers/files/sudoers.Darwin @@ -0,0 +1,25 @@ +# /etc/sudoers +# +# This file MUST be edited with the 'visudo' command as root. +# +# See the man page for details on how to write a sudoers file. +# + +Defaults env_reset + +# Host alias specification + +# User alias specification + +# Cmnd alias specification + +# User privilege specification +root ALL=(ALL) ALL + +# Allow members of group sudo to execute any command after they have +# provided their password +# (Note that later entries override this, so you might need to move +# it further down) +%admin ALL=(ALL) NOPASSWD: ALL +# +#includedir /etc/sudoers.d diff --git a/modules/sudoers/files/sudoers.Ubuntu b/modules/sudoers/files/sudoers.Ubuntu new file mode 100644 index 0000000000..d5f2ccb83a --- /dev/null +++ b/modules/sudoers/files/sudoers.Ubuntu @@ -0,0 +1,25 @@ +# /etc/sudoers +# +# This file MUST be edited with the 'visudo' command as root. +# +# See the man page for details on how to write a sudoers file. +# + +Defaults env_reset + +# Host alias specification + +# User alias specification + +# Cmnd alias specification + +# User privilege specification +root ALL=(ALL) ALL + +# Allow members of group sudo to execute any command after they have +# provided their password +# (Note that later entries override this, so you might need to move +# it further down) +%sudo ALL=(ALL) NOPASSWD: ALL +# +#includedir /etc/sudoers.d diff --git a/modules/sudoers/manifests/init.pp b/modules/sudoers/manifests/init.pp new file mode 100644 index 0000000000..bad9c25e8c --- /dev/null +++ b/modules/sudoers/manifests/init.pp @@ -0,0 +1,28 @@ +class sudoers { + group { 'wheel': + ensure => 'present' + } + group { 'sudo': + ensure => 'present' + } + group { 'admin': + ensure => 'present' + } + + file { '/etc/sudoers': + owner => 'root', + group => 'root', + mode => 440, + ensure => 'present', + source => [ + "puppet:///modules/sudoers/sudoers.$operatingsystem", + "puppet:///modules/sudoers/sudoers" + ], + replace => 'true', + } + + file { '/etc/alternatives/editor': + ensure => link, + target => "/usr/bin/vim.basic", + } +}