--- /dev/null
+# <target name> <source device> <key file> <options>
+root /dev/mapper/vg-root none luks,cipher=aes-cbc-essiv:sha256
+home /dev/mapper/vg-home none luks,cipher=aes-cbc-essiv:sha256
+var /dev/mapper/vg-var none luks,cipher=aes-cbc-essiv:sha256
+cswap /dev/sda1 /dev/random swap,cipher=aes-cbc-essiv:sha256
--- /dev/null
+/dev/mapper/cswap none swap sw 0 0
+/dev/mapper/root / ext3 defaults,errors=remount-ro 0 1
+/dev/mapper/home /home ext3 defaults,errors=remount-ro 0 2
+/dev/mapper/var /var ext3 defaults,errors=remount-ro 0 2
+/dev/sda2 /boot ext3 defaults,errors=remount-ro 0 2
class nodo::desktop inherits nodo::physical {
include utils::desktop
+ include pam
+ include xorg
# fstab
file { "/etc/fstab":
- source => "puppet://$desktop/modules/nodo/etc/fstab/desktop",
+ source => "puppet://$server/modules/nodo/etc/fstab/desktop",
owner => "root",
group => "root",
mode => 0644,
# crypttab
file { "/etc/crypttab":
- source => "puppet://$desktop/modules/nodo/etc/crypttab/desktop",
+ source => "puppet://$server/modules/nodo/etc/crypttab/desktop",
owner => "root",
group => "root",
mode => 0644,
ensure => directory,
mode => 0755,
}
-
- # pam - login
- file { "/etc/pam.d/login":
- source => "puppet://$desktop/modules/nodo/etc/pam.d/login",
- owner => "root",
- group => "root",
- mode => 0644,
- ensure => present,
- }
-
- # pam - gdm
- file { "/etc/pam.d/gdm":
- source => "puppet://$desktop/modules/nodo/etc/pam.d/gdm",
- owner => "root",
- group => "root",
- mode => 0644,
- ensure => present,
- }
-
- # pam - mountpoints
- file { "/etc/security/pam_mount.conf.xml":
- ensure => present,
- owner => root,
- group => root,
- mode => 0644,
- source => "puppet://$server/files/etc/security/pam_mount.conf.xml",
- }
-
- # xorg
- file { "/etc/X11/xorg.conf":
- ensure => present,
- owner => root,
- group => root,
- mode => 0644,
- source => "puppet://$server/files/etc/X11/xorg.conf/$hostname",
- }
}
import "subsystems/database.pp"
import "subsystems/websites.pp"
import "subsystems/munin.pp"
+import "subsystems/pam.pp"
+import "subsystems/xorg.pp"
# Import nodo classes
import "nodo.pp"
import "storage.pp"
import "test.pp"
import "removable.pp"
+import "laptop.pp"
--- /dev/null
+class nodo::laptop inherits nodo::physical {
+ include utils::laptop
+ include pam
+ include xorg
+
+ # fstab
+ file { "/etc/fstab":
+ source => "puppet://$server/modules/nodo/etc/fstab/laptop",
+ owner => "root",
+ group => "root",
+ mode => 0644,
+ ensure => present,
+ }
+
+ # crypttab
+ file { "/etc/crypttab":
+ source => "puppet://$server/modules/nodo/etc/crypttab/laptop",
+ owner => "root",
+ group => "root",
+ mode => 0644,
+ ensure => present,
+ }
+
+ # data
+ file { "/var/data":
+ ensure => directory,
+ mode => 0755,
+ }
+}
--- /dev/null
+class pam {
+ # pam - login
+ file { "/etc/pam.d/login":
+ source => "puppet://$server/modules/nodo/etc/pam.d/login",
+ owner => "root",
+ group => "root",
+ mode => 0644,
+ ensure => present,
+ }
+
+ # pam - gdm
+ file { "/etc/pam.d/gdm":
+ source => "puppet://$server/modules/nodo/etc/pam.d/gdm",
+ owner => "root",
+ group => "root",
+ mode => 0644,
+ ensure => present,
+ }
+
+ # pam - mountpoints
+ file { "/etc/security/pam_mount.conf.xml":
+ ensure => present,
+ owner => root,
+ group => root,
+ mode => 0644,
+ source => "puppet://$server/files/etc/security/pam_mount.conf.xml",
+ }
+}
--- /dev/null
+class xorg {
+ # xorg
+ file { "/etc/X11/xorg.conf":
+ ensure => present,
+ owner => root,
+ group => root,
+ mode => 0644,
+ source => "puppet://$server/files/etc/X11/xorg.conf/$hostname",
+ }
+}