Skip to content
Snippets Groups Projects
Select Git revision
  • 53d20791b5d6b3bebae3054ddbfd4e7bda489aa0
  • master default protected
  • ll-workflow
  • alc-scindage-donnees-pj
  • b24
  • FJ_LL_Tbl_Contrat
  • alc-docker-node
  • ll-apiplatform
  • php84
  • ll-rgpd
  • b23
  • alc-filtre-type-intervenant
  • ll-sans-mdb5
  • formules-ancienne-infra
  • ll-formules
  • alc-intervenant-dmep
  • ll-suppr-v_vol-s
  • b20
  • ll-postgresql
  • b23.0.1
  • b22
  • 24.8
  • 24.7
  • 24.6
  • 24.5
  • 24.4
  • 24.3
  • 24.2
  • 24.1
  • 24.0
  • 23.15
  • 24.0-beta19
  • 24.0-beta18
  • 24.0-beta17
  • 24.0-beta16
  • 24.0-beta15
  • 24.0-beta14
  • 24.0-beta13
  • 23.14
  • 24.0-beta12
  • 24.0-beta11
41 results

Anonymisation.php

Blame
  • Code owners
    Assign users and groups as approvers for specific file changes. Learn more.
    client.pp 1.62 KiB
    # Install FreeRADIUS clients (WISMs or testing servers)
    define freeradius::client (
      $shortname,
      $secret,
      $ip             = undef,
      $ip6            = undef,
      $virtual_server = undef,
      $nastype        = undef,
      $netmask        = undef,
      $redirect       = undef,
      $port           = undef,
      $srcip          = undef,
      $firewall       = false,
      $ensure         = present,
    ) {
      $fr_package  = $::freeradius::params::fr_package
      $fr_service  = $::freeradius::params::fr_service
      $fr_basepath = $::freeradius::params::fr_basepath
      $fr_group    = $::freeradius::params::fr_group
    
      file { "${fr_basepath}/clients.d/${shortname}.conf":
        ensure  => $ensure,
        mode    => '0640',
        owner   => 'root',
        group   => $fr_group,
        content => template('freeradius/client.conf.erb'),
        require => [File["${fr_basepath}/clients.d"], Group[$fr_group]],
        notify  => Service[$fr_service],
      }
    
      if ($firewall and $ensure == 'present') {
        if $port {
          if $ip {
            firewall { "100-${shortname}-${port}-v4":
              proto  => 'udp',
              dport  => $port,
              action => 'accept',
              source => $netmask ? {
                undef   => $ip,
                default => "${ip}/${netmask}",
              },
            }
          } elsif $ip6 {
            firewall { "100-${shortname}-${port}-v6":
              proto    => 'udp',
              dport    => $port,
              action   => 'accept',
              provider => 'ip6tables',
              source   => $netmask ? {
                undef   => $ip6,
                default => "${ip6}/${netmask}",
              },
            }
          }
        } else {
          fail('Must specify $port if you specify $firewall')
        }
      }
    }