Newer
Older
# $access_control_ips: an array of IP addresses that should have
# access to administrative pages (e.g., the status page). These addresses
# should be valid CIDR ranges.
# Example:
#
# - 171.67.218.160/28
# - 172.27.218.160/28
# - 171.64.19.46/32
#
# Note that '127.0.0.1/32' and '::1/128' are automatically added to this
# list.
# DEFAULT: [] (the empty array)
#
# $access_checkInterval: sets the property
# idp.service.access.checkInterval in the services.xml file. This is time
# is how often access-control.xml should be checked for reload.
# DEFAULT: 'PT5M'
#
# $relyingparty_checkInterval: sets the property
# idp.service.relyingparty.checkInterval in the services.xml file. This is time
# is how often relying-party.xml should be checked for reload.
# DEFAULT: 'PT2M'
#
# $access_nameidGeneration: sets the property
# idp.service.nameidGeneration.checkInterval in the services.xml
# file. This time is how often saml-nameid.xml should be checked for
# reload. DEFAULT: 'PT2M'
#
# $nameid_checkInterval: sets the property
# idp.service.nameidGeneration.checkInterval in the services.xml
# file. This time is how often saml-nameid.xml should be checked for
# reload. DEFAULT: 'PT2M'
#
# $filter_checkInterval: sets the property
# idp.service.attribute.filter.checkInterval in the services.xml
# file. This time is how often attribute-filter.xml should be checked for
# reload. DEFAULT: 'PT2M'
#
# $resolver_checkInterval: sets the property
# idp.service.attribute.resolver.checkInterval in the services.xml
# file. This time is how often attribute-resolver.xml should be checked for
# reload. DEFAULT: 'PT2M'
#
# $logging_checkInterval: sets the property
# idp.service.logging.checkInterval in the services.xml
# file. This time is how often logback.xml should be checked for
# reload. DEFAULT: 'PT2M'
$access_checkInterval = 'PT5M',
$nameid_checkInterval = 'PT2M',
$filter_checkInterval = 'PT2M',
$resolver_checkInterval = 'PT2M',
# Let's make some local copies of variables that will be useful in the
# ERB files.
## tomcat8 configuration
file { '/etc/default/tomcat8':
ensure => present,
source => 'puppet:///modules/shibb_idp3/etc/default/tomcat8',
mode => '0644',
}
# Default file resource attributes
File {
ensure => 'present',
mode => '0644',
owner => 'tomcat8',
group => 'tomcat8',
}
# services.properties
# Controls the dynamic reloading behavior of
# services listed services.xml. Right now, we want relying-party
# resources to use legacy V2 format.
file { '/etc/shibboleth-idp/conf/services.properties':
content => template('shibb_idp3/etc/shibboleth-idp/conf/services.properties.erb'),
require => Package['shibboleth-identity-provider'],
}
### Create the directory where the SP metadata files go.
file { '/etc/shibboleth-idp/metadata':
ensure => directory,
require => Package['shibboleth-identity-provider'],
# 1. web.xml: custom version contains TwoStepRemoteUser definition.
file { '/opt/shibboleth-idp/webapp/WEB-INF/web.xml':
content => template('shibb_idp3/opt/shibboleth-idp/webapp/WEB-INF/web.xml.erb'),
require => Package['shibboleth-identity-provider'],
# 2. access-control.xml: allow access to status page
file { '/etc/shibboleth-idp/conf/access-control.xml':
content => template('shibb_idp3/etc/shibboleth-idp/conf/access-control.xml.erb'),
require => Package['shibboleth-identity-provider'],
# 3. logback.xml: log-level settings
file { '/etc/shibboleth-idp/conf/logback.xml':
content => template('shibb_idp3/etc/shibboleth-idp/conf/logback.xml.erb'),
require => Package['shibboleth-identity-provider'],
# 3. saml-nameid.xml
file { '/etc/shibboleth-idp/conf/saml-nameid.properties':
content => template('shibb_idp3/etc/shibboleth-idp/conf/saml-nameid.properties.erb'),
require => Package['shibboleth-identity-provider'],
file { '/etc/shibboleth-idp/conf/authn/general-authn.xml':
content => template('shibb_idp3/etc/shibboleth-idp/conf/authn/general-authn.xml.erb'),
require => Package['shibboleth-identity-provider'],
file { '/etc/shibboleth-idp/conf/authn/twostepremoteuser-authn-config.xml':
source => 'puppet:///modules/shibb_idp3/etc/shibboleth-idp/conf/authn/twostepremoteuser-authn-config.xml',
require => Package['shibboleth-identity-provider'],
file { '/opt/shibboleth-idp/flows/authn/TwoStepRemoteUser/twostepremoteuser-authn-beans.xml':
source => 'puppet:///modules/shibb_idp3/opt/shibboleth-idp/flows/authn/TwoStepRemoteUser/twostepremoteuser-authn-beans.xml',
require => File['/opt/shibboleth-idp/flows/authn/TwoStepRemoteUser/'],
file {
'/opt/shibboleth-idp/flows/authn/TwoStepRemoteUser/':
ensure => directory,
require => Package['shibboleth-identity-provider'];
'/opt/shibboleth-idp/flows/authn/TwoStepRemoteUser/twostepremoteuser-authn-flow.xml':
source => 'puppet:///modules/shibb_idp3/opt/shibboleth-idp/flows/authn/TwoStepRemoteUser/twostepremoteuser-authn-flow.xml',
require => Package['shibboleth-identity-provider'];