puppet/dovecot/manifests/init.pp
2011-04-20 12:20:30 +03:00

97 lines
2.6 KiB
Puppet

class dovecot::common {
case $operatingsystem {
centos,fedora: {
package { ["dovecot"]:
ensure => installed,
}
}
default: {
fail("Dovecot module not supported in ${operatingsystem}.")
}
}
}
# Variables
# dovecot_mail_domain = foo.invalid
# dovecot_mx_mailname = mail.foo.invalid
# dovecot_ssl_csr = puppet:///private/foo.invalid.csr
# dovecot_ssl_cert = puppet:///private/foo.invalid.crt
# dovecot_ssl_key = puppet:///private/foo.invalid.key
# dovecot_ssl_chain = puppet:///private/foo.invalid.chain.crt
class dovecot::server inherits dovecot::common {
case $operatingsystem {
centos,fedora: {
$dovecot_ssl_dir = "/etc/pki/tls"
}
default: {
fail("Dovecot module not supported in ${operatingsystem}.")
}
}
service { "dovecot":
ensure => running,
enable => true,
require => File["/etc/dovecot.conf"],
}
if $dovecot_ssl_csr {
file { "$dovecot_ssl_dir/private/${dovecot_mx_mailname}.csr":
ensure => present,
source => $dovecot_ssl_csr,
mode => 0640,
owner => root,
group => root,
notify => Service["dovecot"],
}
}
if $dovecot_ssl_chain {
file { "$dovecot_ssl_dir/certs/${dovecot_mx_mailname}.chain.crt":
ensure => present,
source => $dovecot_ssl_chain,
mode => 0644,
owner => root,
group => root,
notify => Service["dovecot"],
}
}
if $dovecot_ssl_cert {
file { "$dovecot_ssl_dir/certs/${dovecot_mx_mailname}.crt":
ensure => present,
source => $dovecot_ssl_cert,
mode => 0644,
owner => root,
group => root,
notify => Service["dovecot"],
}
} else {
fail("You need to define an ssl_cert in your node manifest.")
}
if $dovecot_ssl_key {
file { "$dovecot_ssl_dir/private/${dovecot_mx_mailname}.key":
ensure => present,
source => $dovecot_ssl_key,
mode => 0600,
owner => root,
group => root,
notify => Service["dovecot"],
}
} else {
fail("You need to define an ssl_key in your node manifest.")
}
file { "/etc/dovecot.conf":
ensure => present,
content => template("dovecot/dovecot.conf.erb"),
mode => 0644,
owner => root,
group => root,
notify => Service["dovecot"],
}
}