Version information
This version is compatible with:
- Puppet Enterprise 2023.8.x, 2023.7.x, 2023.6.x, 2023.5.x, 2023.4.x, 2023.3.x, 2023.2.x, 2023.1.x, 2023.0.x, 2021.7.x, 2021.6.x, 2021.5.x, 2021.4.x, 2021.3.x, 2021.2.x, 2021.1.x, 2021.0.x
- Puppet >=7.0.0 <9.0.0
- , , , , , ,
Start using this module
Add this module to your Puppetfile:
mod 'jgazeley-freeradius', '4.0.0'
Learn more about managing modules with a PuppetfileDocumentation
freeradius
Table of Contents
- Overview
- Module Description - What the module does and why it is useful
- Usage - Configuration options and additional functionality
- Classes
- Resources
freeradius::attr
freeradius::blank
freeradius::cert
freeradius::client
freeradius::config
freeradius::dictionary
freeradius::home_server
freeradius::home_server_pool
freeradius::instantiate
freeradius::ldap
freeradius::listen
freeradius::module::ldap
freeradius::krb5
freeradius::module
freeradius::module::ippool
freeradius::module::linelog
freeradius::module::detail
freeradius::module::files
freeradius::module::eap
freeradius::module::preprocess
freeradius::module::huntgroup
freeradius::module::perl
freeradius::policy
freeradius::realm
freeradius::site
freeradius::sql
freeradius::statusclient
freeradius::template
freeradius::virtual_module
- Limitations - OS compatibility, etc.
Overview
This module installs and configures FreeRADIUS server on Linux. It supports FreeRADIUS 3.x only. It was designed with CentOS in mind but should work on other distributions.
This module requires Puppet 4.0.0 or greater. Puppet 3.x was discontinued at the end of 2016.
jgazeley/freeradius |
FreeRADIUS |
---|---|
3.x | 3.x |
2.x | 3.x |
1.x | 2.x and 3.x |
0.x | 2.x |
Module Description
This module installs FreeRADIUS from a distro-provided package and installs a
number of customised config files to enable flexibility. It then provides some
helpers to allow you to easily configure virtual servers (sites), modules, clients
and other config items. Most of these items accept a flat config file which you
supply either as a static file or a template - similar to the source
and content
parameters in Puppet's file
resource.
This module is designed to make it more straightforward for RADIUS administrators to deploy RADIUS servers using Puppet. This module does not serve as a wizard and does not avoid having to have an understanding of FreeRADIUS.
Usage
This module provides several classes and defined types which take parameters.
Classes
freeradius
The freeradius
class installs the base server. In the early releases, this class does not
have many parameters as most values are hard-coded. I am working on parameterising more
of the global settings to increase flexibility. Patches are welcome.
control_socket
Use of the control_socket
parameter in the freeradius class is deprecated. Use the freeradius::control_socket
class instead.
correct_escapes
Use correct backslash escaping in unlang. Default: true
max_requests
The maximum number of requests which the server keeps track of. This should be 256 multiplied by the number of clients. Default: 4096
max_request_time
The maximum time (in seconds) to handle a request. Default: 30
max_servers
Limit on the total number of servers running. Default: 4096
mysql_support
Install support for MySQL. Note this only installs the package. Use freeradius::sql
to configure SQL support. Default: false
perl_support
Install support for Perl. Default: false
preserve_mods
Leave recommended stock modules enabled. Default: true
utils_support
Install FreeRADIUS utils. Default: false
ldap_support
Install support for LDAP. Default: false
dhcp_support
Install support for DHCP. Default: false
krb5_support
Install support for Kerberos. Default: false
wpa_supplicant
Install wpa_supplicant
utility. Default: false
winbind_support
Add the radius user to the winbind privileged group. You must install winbind separately. Default: false
.
log_destination
Configure destination of log messages. Valid values are files
, syslog
, stdout
and stderr
. Default: files
.
syslog_facility
Configure which syslog facility to use when log_destination
is set to syslog
. Default: daemon
.
syslog
Add a syslog rule (using the saz/rsyslog
module). Default: false
.
log_auth
Log authentication requests (yes/no). Default: no
.
allow_vulnerable_openssl
Allow the server to start with versions of OpenSSL known to have critical vulnerabilities. (yes/no). Default: yes
.
package_ensure
Choose whether the package is just installed and left (installed
), or updated every Puppet run (latest
). Default: installed
class { 'freeradius':
max_requests => 4096,
max_servers => 4096,
mysql_support => true,
perl_support => true,
utils_support => true,
wpa_supplicant => true,
winbind_support => true,
syslog => true,
log_auth => 'yes',
}
freeradius::status_server
The freeradius::status_server
class enabled the status server.
To remove the status server, do not include this class and the server will be removed.
secret
The shared secret for the status server. Required.
port
The port to listen for status requests on. Default: 18121
listen
The address to listen on. Defaults to listen on all addresses but you could set this to $::ipaddress
or 127.0.0.1
. Default: *
# Enable status server
class { 'freeradius::status_server':
port => '18120',
secret => 't0pSecret!',
}
freeradius::control_socket
The freeradius::control_socket
class enables the control socket which can be used with RADMIN.
To remove the control socket, do not include this class and the socket will be removed.
mode
Whether the control socket should be read-only or read-write. Choose from ro
, rw
. Default: ro
.
# Enable control socket
class { 'freeradius::control_socket':
mode => 'ro',
}
freeradius::radsniff
The freeradius::radsniff
class configures and runs the RADSNIFF service.
It requires freeradius-utils to be installed, so will fail if utils_support
is not enabled on the freeradius
class.
Note: This is only supported on RedHat like systems at present.
options
Command line options to be passed to radsniff. Quotes are escaped
# Enable radsniff, with a filter, sending data to collectd (requires freeradius to be compiled for this)
class { 'freeradius::radsniff':
options => '-m -p1812,1813 -O unix:/var/run/collectd.sock -N freeradius -W 10 -i eth0 -f "src not 192.0.2.1"',
}
Resources
freeradius::attr
Install arbitrary attribute filters from a flat file. These are installed in an appropriate module config directory.
The contents of the attr_filter
module are automatically updated to reference the filters.
key
Specify a RADIUS attribute to be the key for this attribute filter. Enter only the string part of the name.
prefix
Specify the prefix for the attribute filter name before the dot, e.g. filter.post_proxy
. This is usually set
to filter
on FR2 and attr_filter
on FR3. Default: filter
.
freeradius::attr { 'eduroamlocal':
key => 'User-Name',
prefix => 'attr_filter',
source => 'puppet:///modules/site_freeradius/eduroamlocal',
}
relaxed
Whether the filter removes or copies unmatched attributes, relaxed = no or yes respectively. An undefined value results in no
explicit statement, causing the default behaviour of FreeRADIUS equivalent to 'relaxed = no'. Default: undef
.
freeradius::blank
Selectively blank certain stock config files that aren't required. This is preferable to deleting them because the package manager will replace certain files next time the package is upgraded, potentially causing unexpected behaviour.
The resource title should be the relative path from the FreeRADIUS config directory to the file(s) you want to blank. You can pass multiple files in an array.
freeradius::blank { 'sites-enabled/default': }
freeradius::blank { [
'sites-enabled/default',
'eap.conf',
]: }
freeradius::cert
Install certificates as provided. These are installed in certs
. Beware that any certificates not deployed by Puppet will be purged from this directory.
freeradius::cert { 'mycert.pem':
source => 'puppet:///modules/site_freeradius/mycert.pem',
type => 'key',
}
freeradius::cert { 'mycert.pem':
content => '<your key/cert content here>',
type => 'key',
}
type
Set file permissions on the installed certificate differently depending on whether this is a private key or a public certificate. Note that the default is to treat the file as a private key and remove world-readable privileges. Allowable values: cert
, key
. Default: key
.
freeradius::client
Define RADIUS clients as seen in clients.conf
# Single host example
freeradius::client { "wlan-controller01":
ip => '192.168.0.1',
secret => 'testing123',
shortname => 'wlc01',
nastype => 'other',
port => '1645-1646',
firewall => true,
}
# Range example
freeradius::client { "wlan-controllers":
ip => '192.168.0.0/24',
secret => 'testing123',
shortname => 'wlc01',
nastype => 'other',
port => '1645-1646',
firewall => true,
}
# Huntgroup Example
freeradius::client { "asa01":
ip => '192.168.0.1',
secret => 'testing123',
huntgroups => [
{ name => 'firewall',
conditions => [ 'NAS-IP-Address == 192.168.0.1' ] },
]
}
ip
The IP address of the client or range in CIDR format. For IPv6, use ipv6addr
. ip
and ip6
are mutually exclusive but one must be supplied.
Default: undef
.
ip6
The IPv6 address of the client or range in CIDR format. ip
and ip6
are mutually exclusive but one must be supplied. Default: undef
.
shortname
A short alias that is used in place of the IP address or fully qualified hostname provided in the first line of the section. Defaults to resource name.
secret
The RADIUS shared secret used for communication between the client/NAS and the RADIUS server. Required.
virtual_server
The virtual server that traffic from this client should be sent to. Default: undef
.
nastype
The nastype
attribute is used to tell the checkrad.pl
script which NAS-specific method it should use when checking simultaneous use. See man clients.conf
for a list of all options. Default: undef
.
proto
Transport protocol used by the client. If unspecified, defaults to "udp", which is the traditional RADIUS transport. Valid values are udp
, tcp
or *
for both of them. Default: undef
.
require_message_authenticator
Old-style clients do not send a Message-Authenticator in an Access-Request. RFC 5080 suggests that all clients SHOULD include it in an Access-Request. Valid values are yes
and no
. Default: no
.
login
Login used by checkrad.pl when querying the NAS for simultaneous use. Default: undef
.
password
Password used by checkrad.pl when querying the NAS for simultaneous use. Default: undef
.
coa_server
A pointer to the home_server_pool
OR a home_server
section that contains the CoA configuration for this client. Default: undef
.
response_window
Response window for proxied packets. Default: undef
.
max_connections
Limit the number of simultaneous TCP connections from a client. It is ignored for clients sending UDP traffic. Default: undef
.
lifetime
The lifetime, in seconds, of a TCP connection. It is ignored for clients sending UDP traffic. Default: undef
.
idle_timeout
The idle timeout, in seconds, of a TCP connection. It is ignored for clients sending UDP traffic. Default: undef
.
port
The UDP port that this virtual server should listen on. Leave blank if this client is not tied to a virtual server. Currently the port number is only used to create firewall exceptions and you only need to specify it if you set firewall => true
. Use port range syntax as in puppetlabs-firewall
. Default: undef
.
firewall
Create a firewall exception for this virtual server. If this is set to true
, you must also supply port
and either ip
or ip6
. Default: false
.
attributes
Array of attributes to assign to this client. Default: empty.
huntgroups
Array of hashes, each hash defines one freeradius::huntgroup. Hash keys are all passed to a new instance of freeradius::huntgroup.
freeradius::config
Install arbitrary config snippets from a flat file. These are installed in mods-config
freeradius::config { 'realm-checks.conf':
source => 'puppet:///modules/site_freeradius/realm-checks.conf',
}
freeradius::config { 'realm-checks.conf':
content => template('your_template),
}
freeradius::dictionary
Install custom dictionaries without breaking the default FreeRADIUS dictionary. Custom dictionaries are installed in dictionary.d
and automatically included in the global dictionary.
freeradius::dictionary { 'mydict':
source => 'puppet:///modules/site_freeradius/dictionary.mydict',
}
freeradius::home_server
This section defines a "Home Server" which is another RADIUS server that gets sent proxied requests.
secret
The shared secret use to "encrypt" and "sign" packets between FreeRADIUS and the home server.
type
Home servers can be sent Access-Request packets or Accounting-Request packets. Allowed values are:
auth
Handles Access-Request packetsacct
Handles Accounting-Request packetsauth+acct
Handles Access-Request packets at "port" and Accounting-Request packets at "port + 1"coa
Handles CoA-Request and Disconnect-Request packets.
Default: auth
ipaddr
IPv4 address or hostname of the home server. Specify one of ipaddr
, ipv6addr
or virtual_server
ipv6addr
IPv6 address or hostname of the home server. Specify one of ipaddr
, ipv6addr
or virtual_server
virtual_server
If you specify a virtual_server
here, then requests will be proxied internally to that virtual server.
These requests CANNOT be proxied again, however. The intent is to have the local server handle packets
when all home servers are dead. Specify one of ipaddr
, ipv6addr
or virtual_server
port
The port to which packets are sent. Usually 1812 for type "auth", and 1813 for type "acct".
Older servers may use 1645 and 1646. Use 3799 for type "coa" Default: 1812
proto
The transport protocol. If unspecified, defaults to "udp", which is the traditional
RADIUS transport. It may also be "tcp", in which case TCP will be used to talk to
this home server. Default: udp
status_check
Type of check to see if the home_server
is dead or alive. Valid values are none
, status-server
and request
. Default: undef
.
freeradius::home_server_pool
home_server
An array of one or more home servers (this must be an array even if you only have one home server). The names
of the home servers are NOT the hostnames, but the names of the sections. (e.g. home_server foo {...}
has name "foo".
Note that ALL home servers listed here have to be of the same type. i.e. they all have to be "auth", or they all have to be "acct", or they all have to be "auth+acct".
type
The type of this pool controls how home servers are chosen.
fail-over
the request is sent to the first live home server in the list. i.e. If the first home server is marked "dead", the second one is chosen, etc.load-balance
the least busy home server is chosen For non-EAP auth methods, and for acct packets, we recommend using "load-balance". It will ensure the highest availability for your network.client-balance
the home server is chosen by hashing the source IP address of the packet. This configuration is most useful to do simple load balancing for EAP sessionsclient-port-balance
the home server is chosen by hashing the source IP address and source port of the packet.keyed-balance
the home server is chosen by hashing (FNV) the contents of the Load-Balance-Key attribute from the control items.
The default type is fail-over
.
virtual_server
A virtual_server
may be specified here. If so, the "pre-proxy" and "post-proxy" sections are called when
the request is proxied, and when a response is received.
fallback
If ALL home servers are dead, then this "fallback" home server is used. If set, it takes precedence over any realm-based fallback, such as the DEFAULT realm.
For reasons of stability, this home server SHOULD be a virtual server. Otherwise, the fallback may itself be dead!
freeradius::huntgroup
Define a huntgroup given a name and the conditions under which a huntgroup matches a client.
freeradius::huntgroup { 'switchaccess':
huntgroup => 'switchaccess',
conditions => [
'NAS-IP-Address == 192.168.0.1'
]
}
huntgroup
Name of the huntgroup to assign, if conditions are all met. Default to the resource title.
conditons
Array of conditions which are used to match the client, each element should contain a condition in the form of 'Key == Value'.
type
home_server
freeradius::instantiate
Instantiate a module that is not automatically instantiated.
freeradius::instantiate { 'mymodule': }
freeradius::ldap
Deprecated. Use freeradius::module::ldap
instead.
freeradius::module::ldap
Configure LDAP support for FreeRADIUS
ensure
Whether the site should be present or not.
identity
LDAP account for searching the directory. Optional.
password
Password for the identity
account. Optional.
sasl
SASL parameters to use for admin binds to the ldap server. This is a hash with 3 possible keys:
mech
: The SASL mechanism used.proxy
: SASL authorizatino identity to proxy.realm
: SASL realm (used for kerberos)
Default: {}
basedn
Unless overridden in another section, the dn from which all searches will start from. Required.
server
Array of hostnames or IP addresses of the LDAP server(s). Note that this needs to match the name(s) in the LDAP
server certificate, if you're using ldaps. Default: [localhost
]
port
Port to connect to the LDAP server on. Default: 389
valuepair_attribute
Generic valuepair attribute. If set, this attribute will be retrieved in addition to any mapped attributes. Default: undef
.
update
Array with mapping of LDAP directory attributes to RADIUS dictionary attributes. Default: []
edir
Se to yes
if you have eDirectory and want to use the universal password mechanisms. Possible values are yes
and no
. Default: undef
.
edir_autz
Set to yes
if you want to bind as the user after retrieving the Cleartest-Password. Possible values are yes
and no
. Default: undef
.
user_base_dn
Where to start searching for users in the LDAP tree. Default: ${..base_dn}
.
user_filter
Filter for user objects. Default: uid=%{%{Stripped-User-Name}-%{User-Name}})
user_sasl
SASL parameters to use for user binds to the ldap server. This is a hash with 3 possible keys:
mech
: The SASL mechanism used.proxy
: SASL authorizatino identity to proxy.realm
: SASL realm (used for kerberos)
Default: {}
user_scope
Search scope for users. Valid values are base
, one
, sub
and children
. Default: undef
(sub
is applied).
user_sort_by
Server side result sorting. A list of space delimited attributes to order the result set by. Default: undef
.
user_access_attribute
If this undefined, anyone is authorized. If it is defined, the contents of this attribute determine whether or not the user is authorised. Default: undef
.
user_access_positive
Control whether the presence of access_attribute
allows access or denys access. Default: undef
.
group_base_dn
Where to start searching for groups in the LDAP tree. Default: ${..base_dn}
.
group_filter
Filter for group objects. Default: '(objectClass=posixGroup)'
.
group_scope
Search scope for groups. Valid values are base
, one
, sub
and children
. Default: undef
(sub
is applied).
group_name_attribute
Attribute that uniquely identifies a group. Default: undef
('cn'
is applied).
group_membership_filter
Filter to find group objects a user is member of. That is, group objects with attributes that identify members (the inverse of group_membership_attribute
). Default: undef
.
group_membership_attribute
The attribute in user objects which contain the namos or DNs of groups a user is a member of. Default: 'memberOf'
.
group_cacheable_name
If group_cacheable_name
or group_cacheable_dn
are enabled, all group information for the user will be retrieved from the directory and written to LDAP-Group attributes appropiaate for the instance of rlm_ldap. Default: undef
.
group_cacheable_dn
If group_cacheable_name
or group_cacheable_dn
are enabled, all group information for the user will be retrieved from the directory and written to LDAP-Group attributes appropiaate for the instance of rlm_ldap. Default: undef
.
group_cache_attribute
Override the normal cache attribute (<inst>-LDAP-Group
or LDAP-Group
if using the default instance) and create a custom attribute. Default: undef
.
group_attribute
Override the normal group comparison attribute name (<inst>-LDAP-Group
or LDAP-Group
if using the default instance). Default: undef
.
profile_filter
Filter for RADIUS profile objects. Default: undef
.
profile_default
The default profile. This may be a DN or an attribute reference. Default: undef
.
profile_attribute
The LDAP attribute containing profile DNs to apply in addition to the default profile above. Default: undef
.
client_base_dn
Where to start searching for clients in the LDAP tree. Default: '${..base_dn}'
.
client_filter
Filter to match client objects. Default: '(objectClass=radiusClient)'
.
client_scope
Search scope for clients. Valid values are base
, one
, sub
and children
. Default: undef
(sub
is applied).
read_clients
Load clients on startup. Default: undef
('no'
is applied).
dereference
Control under which situations LDAP aliases are followed. May be one of never
, searching
, finding
or always
. Default: undef
(always
is applied).
chase_referrals
With rebind
control whether the server follows references returned by LDAP directory. Mostly used for AD compatibility. Default: yes
.
rebind
With chase_referrals
control whether the server follows references returned by LDAP directory. Mostly used for AD compatibility. Default: yes
.
use_referral_credentials
On rebind, use the credentials from the rebind url instead of admin credentials. Default: no
.
This parameter should only be set when using FreeRADIUS 3.1.x.
session_tracking
If yes
, then include draft-wahl-ldap-session tracking controls. Default: undef
.
This parameter should only be set when using FreeRADIUS 3.1.x.
uses
How many times the connection can be used before being re-established. This is useful for things
like load balancers, which may exhibit sticky behaviour without it. 0
is unlimited. Default: 0
retry_delay
The number of seconds to wait after the server tries to open a connection, and fails. Default: `30'.
lifetime
The lifetime (in seconds) of the connection. Default: 0
(forever).
idle_timeout
Idle timeout (in seconds). A connection which is unused for this length of time will be closed. Default: 60
.
connect_timeout
Connection timeout (in seconds). The maximum amount of time to wait for a new connection to be established. Default: 3.0
.
This parameter should only be set when using FreeRADIUS 3.1.x.
idle
Sets the idle time before keepalive probes are sent. Default 60
This option may not be supported by your LDAP library. If this configuration entry appears in the
output of radiusd -X
then it is supported. Otherwise, it is unsupported and changing it will do nothing.
probes
Sets the maximum number of keepalive probes TCP should send before dropping the connection. Default: 3
This option may not be supported by your LDAP library. If this configuration entry appears in the
output of radiusd -X
then it is supported. Otherwise, it is unsupported and changing it will do nothing.
interval
Setss the interval in seconds between individual keepalive probes. Default: 3
This option may not be supported by your LDAP library. If this configuration entry appears in the
output of radiusd -X
then it is supported. Otherwise, it is unsupported and changing it will do nothing.
timeout
Number of seconds to wait for LDAP query to finish. Default: 10
timelimit
Seconds LDAP server has to process the query (server-side time limit). Default: 20
.
ldap_debug
Debug flag for LDAP SDK. Default: 0x0028
.
start
Connections to create during module instantiation. If the server cannot create specified number of
connections during instantiation it will exit. Set to 0 to allow the server to start without the
directory being available. Default: ${thread[pool].start_servers}
min
Minimum number of connections to keep open. Default: ${thread[pool].min_spare_servers}
max
Maximum number of connections. Default: ${thread[pool].max_servers}
spare
Spare connections to be left idle. Default: ${thread[pool].max_spare_servers}
starttls
Set this to 'yes' to use TLS encrypted connections to the LDAP database by using the StartTLS extended operation. The StartTLS operation is supposed to be used with normal ldap connections instead of using ldaps (port 636) connections
Default: no
cafile
Path to CA cert file for TLS
certfile
Path to cert file for TLS
capath
Path to CA cert files for TLS
keyfile
Path to key file for TLS
random_file
Random file used for TLS operations. Default: undef
('/dev/urandom'
is used).
requirecert
Certificate Verification requirements. Choose from: 'never' (do not even bother trying) 'allow' (try, but don't fail if the certificate cannot be verified) 'demand' (fail if the certificate does not verify) 'hard' (similar to 'demand' but fails if TLS cannot negotiate)
Default: allow
freeradius::krb5
Configure Kerberos support for FreeRADIUS
keytab
Full path to the Kerberos keytab file
principal
Name of the service principal
start
Connections to create during module instantiation. If the server cannot create specified number of
connections during instantiation it will exit. Set to 0 to allow the server to start without the
directory being available. Default: ${thread[pool].start_servers}
min
Minimum number of connections to keep open. Default: ${thread[pool].min_spare_servers}
max
Maximum number of connections. Default: ${thread[pool].max_servers}
spare
Spare connections to be left idle. Default: ${thread[pool].max_spare_servers}
freeradius::listen
Define listening interface
type
Type of listener. Must be one of auth
, acct
, proxy
, detail
, status
, coa
. Default: auth
ip
The IPv4 address of the interface to listen. ip
and ip6
are mutually exclusive. Default: undef
ip6
The IPv6 address of the interface to listen. ip
and ip6
are mutually exclusive. Default: undef
port
Default: undef
max_connections
Default : 16
lifetime
Default : 0
idle_timeout
Default : 30
freeradius::module
Install a module from a flat file, or enable a stock module that came with your distribution of
FreeRADIUS. Modules are installed into mods-available
and automatically symlinked into
mods-enabled
, to ensure compatibility with package managers. Any files in this directory that
are not managed by Puppet will be removed.
# Enable a stock module
freeradius::module { 'pap':
preserve => true,
}
# Install a custom module from a flat file
freeradius::module { 'buffered-sql':
source => 'puppet:///modules/site_freeradius/buffered-sql',
}
# Install a custom module from a template
freeradius::module { 'buffered-sql':
content => template('some_template.erb)',
}
freeradius::module::ippool
Install a ippool
module
ensure
If the module should present
or absent
. Default: present
.
range_start
The first IP address of the pool.
range_stop
The last IP address of the pool.
netmask
The network mask used for the pool
cache_size
The gdbm cache size for the db files. Default: number of IP address in the range.
filename
The main db file used to allocate address. Default: ${db_dir}/db.${name}
ip_index
Helper db index file. Default: ${db_dir}/db.${name}.index
override
If set, the Framed-IP-Address already in the reply (if any) will be discarded. Default: no
.
maximum_timeout
Maximum time in seconds that an entry may be active. Default: 0
(no timeout).
key
The key to use for the session database. Default: undef
.
freeradius::module::linelog
Install and configure linelog module to log text to files.
ensure
If the module should present
or absent
. Default: present
.
filename
The file where the logs will go. Default: ${logdir}/linelog
.
escape_filenames
If UTF-8 characters should be escaped from filename. Default: no
.
permissions
Unix-style permissions for the log file. Default: 0600
.
group
The Unix group which owns the log file. Default: undef
.
syslog_facility
Syslog facility (if logging via syslog). Default: undef
(daemon
).
syslog_severity
Syslog severity (if logging via syslog). Default: undef
(info
).
format
The default format string. Default: This is a log message for %{User-Name}
.
reference
If it is defined, the line string logged is dynamically expanded and the result is used to find another configuration entry here, with the given name. That name is then used as the format string. Default: messages.%{%reply:Packet-Type}:-default}
.
messages
Array of messages. The messages defined here are taken from the reference
expansion. Default: []
.
accounting_request
Array of messages. Similar to messages
but for accounting logs.
freeradius::module::detail
Install a detail module to write detailed log of accounting records.
ensure
If the module should present
or absent
. Default: present
.
filename
The file where the detailed logs will go. Default: ${radacctdir}/%{%{Packet-Src-IP-Address}:-%{Packet-Src-IPv6-Address}}/detail-%Y%m%d
.
escape_filenames
If UTF-8 characters should be escaped from filename. Default: no
.
permissions
Unix-style permissions for the log file. Default: 0600
.
group
The Unix group which owns the log file. Default: undef
.
header
Header to use in every entry in the detail file. Default: undef
(%t
).
locking
Enable if a detail file reader will be reading this file. Default: undef
.
log_packet_header
Log the package src/dst IP/port. Default: undef
.
suppress
Array of (sensitive) attributes that should be removed from the log. Default: []
.
freeradius::module::files
Install a file
module with users in freeradius.
ensure
If the module should present
or absent
. Default: present
.
moddir
Directory where the users file is located. Default: ${modconfdir}/${.:instance}
.
key
The default key attribute to use for matches. Default: undef
.
filename
The (old) users style filename. Default: ${moddir}/authorize
.
usersfile
Accepted for backups compatibility. Default: undef
.
acctusersfile
Accepted for backups compatibility. Default: undef
.
preproxy_usersfile
Accepted for backups compatibility. Default: undef
.
users
Array of hashes with users entries (see "man users"). If entry in the hash is an array which valid keys are:
login
: The login of the user.check_items
: An array with check components for the user entry.reply_items
: An array with reply components for the user entry.
For example:
freeradius::module::files {'myuserfile':
users => [
{
login => 'DEFAULT',
check_items => [
'Realm == NULL'
],
reply_items => [
'Fall-Through = No
],
},
],
}
will produce a user file like:
DEFAULT Realm == NULL
Fall-Through = No
You should use just one of users
, source
or content
parameters.
source
Provide source to a file with the users file. Default: undef
.
You should use just one of users
, source
or content
parameters.
content
Provide the content for the users file. Default: undef
.
You should use just one of users
, source
or content
parameters.
freeradius::module::eap
Install a module for EAP configuration
ensure
If the module should present
or absent
. Default: present
.
default_eap_type
Default EAP type. Default: md5
.
timer_expire
How much time an entry is maintained in the list to correlate EAP-Response packets with EAP-Request packets. Default: 60
.
ignore_unknown_eap_types
By setting this options to yes
, you can tell the server to keep processing requests with an EAP type it does not support. Default: no
.
cisco_accounting_username_bug
Enables a work around to handle Cisco AP1230B firmware bug. Default: no
.
max_sessions
Maximum number of EAP sessions the server tracked. Default: ${max_requests}
.
Parameters to configure EAP-pwd authentication.
eap_pwd
If set to true
configures EAP-pwd authentication. Default: false
.
pwd_group
group
used in pwd configuration. Default: undef
.
pwd_server_id
server_id
option in pwd configuration. Default: undef
.
pwd_fragment_size
fragment_size
option in pwd configuration. Default: undef
.
pwd_virtual_server
The virtual server which determines the "known good" password for the user in pwd authentication. Default: undef
.
Parameters to configure Generic Tocken Card
gtc_challenge
The default challenge. Default: undef
gtc_auth_type
auth_type
use in GTC. Default: PAP
.
Parameters for TLS configuration
tls_config_name
Name for the tls-config
. It normally should not be used. Default: tls-common
.
tls_private_key_password
Private key password. Default: undef
.
tls_private_key_file
File with the private key of the server. Default: ${certdir}/server.pem
.
tls_certificate_file
File with the certificate of the server. Default: ${certdir}/server.pem
.
tls_ca_file
File with the trusted root CA list. Default: ${certdir}/ca.pem
.
tls_auth_chain
When setting to no
, the server certificate file MUST include the full certificate chain. Default: undef
.
tls_psk_identity
PSK identity (if OpenSSL supports TLS-PSK). Default: undef
.
tls_psk_hexphrase
PSK (hex) password (if OpenSSL supports TLS-PSK). Default: undef
.
tls_dh_file
DH file. Default: ${certdir}/dh
.
tls_random_file
Random file. Default: undef
(/dev/urandom
).
tls_fragment_size
Fragment size for TLS packets. Default: undef
.
tls_include_length
If set to no, total length of the message is included only in the first packet of a fragment series. Default: undef
.
tls_check_crl
Check the certificate revocation list. Default: undef
.
tls_check_all_crl
Check if intermediate CAs have been revoked. Default: undef
.
tls_allow_expired_crl
Allow use of an expired CRL. Default: undef
.
tls_ca_path
Path to the CA file. Default: ${cadir}
.
tls_check_cert_issuer
If set, the value will be checked against the DN of the issuer in the client certificate. Default: undef
.
tls_check_cert_cn
If it is set, the value will be xlat'ed and checked against the CN in the client certificate. Default: undef
tls_cipher_list
Set this option to specify the allowed TLS cipher suites. Default: DEFAULT
.
tls_disable_tlsv1_2
Disable TLS v1.2. Default: undef
.
tls_ecdh_curve
Elliptical cryptography configuration. Default: prime256v1
.
tls_cache_enable
Enable TLS cache. Default: yes
.
tls_cache_lifetime
Lifetime of the cached entries, in hours. Default: 24
.
tls_cache_max_entries
The maximum number of entries in the cache. Default: 255
.
tls_cache_name
Internal name of the session cache. Default: undef
.
tls_cache_persist_dir
Simple directory-based storage of sessions. Default: undef
.
tls_verify_skip_if_ocsp_ok
If the OCSP checks suceed, the verify section is run to allow additional checks. Default: undef
.
tls_verify_tmpdir
Temporary directory where the client certificates are stored. Default: undef
.
tls_verify_client
The command used to verify the client certificate. Default: undef
.
tls_ocsp_enable
Enable OCSP certificate verification. Default: no
.
tls_ocsp_override_cert_url
If set to yes
the OCSP Responder URL is overrided. Default: yes
.
tls_ocsp_url
The URL used to verify the certificate when tls_ocsp_override_cert_url
is set to yes
. Default: http://127.0.0.1/ocsp/
.
tls_ocsp_use_nonce
If the OCSP Responder can not cope with nonce in the request, then it can be set to no
. Default: undef
.
tls_ocsp_timeout
Number of seconds before giving up waiting for OCSP response. Default: undef
.
tls_ocsp_softfail
To treat OCSP errors as soft. Default: undef
.
tls_virtual_server
Virtual server for EAP-TLS requests. Default: undef
.
Parameters for TTLS configuration
ttls_default_eap_type
Default EAP type use inside the TTLS tunnel. Default: md5
.
ttls_copy_request_to_tunnel
If set to yes
, any attribute in the ouside of the tunnel but not in the tunneled request is copied to the tunneled request. Default: no
.
ttls_use_tunneled_reply
If set to yes
, reply attributes get from the tunneled request are sent as part of the outside reply. Default: no
.
ttls_virtual_server
The virtual server that will handle tunneled requests. Default: inner-tunnel
.
ttls_include_length
If set to no, total length of the message is included only in the first packet of a fragment series. Default: undef
.
ttls_require_client_cert
Set to yes
to require a client certificate. Default: undef
.
Parameters for PEAP configuration
peap_default_eap_type
Default EAP type used in tunneled EAP session. Default: mschapv2
.
peap_copy_request_to_tunnel
If set to yes
, any attribute in the ouside of the tunnel but not in the tunneled request is copied to the tunneled request. Default: no
.
peap_use_tunneled_reply
If set to yes
, reply attributes get from the tunneled request are sent as part of the outside reply. Default: no
.
peap_proxy_tunneled_request_as_eap
Set the parameter to no
to proxy the tunneled EAP-MSCHAP-V2 as normal MSCHAPv2. Default: undef
.
peap_virtual_server
The virtual server that will handle tunneled requests. Default: inner-tunnel
.
peap_soh
Enables support for MS-SoH. Default: undef
.
peap_soh_virtual_server
The virtual server that will handle tunneled requests. Default: undef
.
peap_require_client_cert
Set to yes
to require a client certificate. Default: undef
.
Parameters for MS-CHAPv2 configuration
mschapv2_send_error
If set to yes
, then the error message will be sent back to the client. Default: undef
.
mschapv2_identity
Server indentifier to send back in the challenge. Default: undef
.
freeradius::module::preprocess
Install a preprocess module to process huntgroups and hints files.
ensure
If the module should present
or absent
. Default: present
.
moddir
Directory where the preprocess' files are located. Default: ${modconfdir}/${.:instance}
.
huntgroups
Path for the huntgroups file. Defaut: ${moddir}/huntgroups
.
hints
Path for the hints file. Default ${moddir}/hints
.
with_ascend_hack
This hack changes Ascend's weird port numbering to standar 0-??? port numbers. Default: no
.
ascend_channels_per_line
Default: 23
.
with_ntdomain_hack
Windows NT machines often authenticate themselves as NT_DOMAIN\username
. If this parameter is set to yes
, then the NT_DOMAIN
portion of the user-name is silently discarded. Default: no
.
with_specialix_jetstream_hack
Set to yes
if you are using a Specialix Jetstream 8500 access server. Default: no
.
with_cicso_vsa_hack
Set to yes
if you are using a Cisco or Quintum NAS. Default: no
.
freeradius::module::huntgroup
Creates a huntgroup entry in a huntgroup file (see freeradius::module::preprocess
)
conditions
Array of rules to match in this huntgroup.
order
Order of this huntgroup in the huntgroup files. This is the order
parameter for the underlying concat::fragment
. Default: `50' .
huntgroup
The path of the huntgroup file. Default: huntgroup
.
freeradius::module::perl
Installs the Perl module rlm_perl with more advanced configuration
freeradius::module::perl { 'somename':
perl_filename => 'scriptname.pl',
path => "puppet:///modules/profiles/radius_proxy/",
function_names => $function_names,
}
perl_filename
Filename of the Perl script.
path
The path of the source file on the Puppet server.
function_names
If different function names to default are used, or if seperate functions for accounting start and stop are used, just pass a hash of default and actual function names.
$function_names = {
"func_authenticate" => "alternative_name",
"func_start_accounting" => "start_function",
"func_stop_accounting" => "stop_function",
}
freeradius::policy
Install a policy from a flat file.
freeradius::policy { 'my-policies':
source => 'puppet:///modules/site_freeradius/my-policies',
}
freeradius::realm
Define a realm in proxy.conf
. Realms point to pools of home servers.
virtual_server
Set this to "proxy" requests internally to a virtual server. The pre-proxy and post-proxy sections are run just as with any other kind of home server. The virtual server then receives the request, and replies, just as with any other packet. Once proxied internally like this, the request CANNOT be proxied internally or externally.
auth_pool
For authentication, the auth_pool
configuration item should point to a home_server_pool
that was previously
defined. All of the home servers in the auth_pool
must be of type auth
.
acct_pool
For accounting, the acct_pool
configuration item should point to a home_server_pool
that was previously
defined. All of the home servers in the acct_pool
must be of type acct
.
pool
If you have a home_server_pool
where all of the home servers are of type auth+acct
, you can just use the pool
configuration item, instead of specifying both auth_pool
and acct_pool
.
nostrip
Normally, when an incoming User-Name is matched against the realm, the realm name is "stripped" off, and the "stripped"
user name is used to perform matches.If you do not want this to happen, set this to true
. Default: false
.
order
Set custom order of realm fragments, otherwise they are automatically ordered alphabetically. Default: 30
freeradius::script
Install a helper script, e.g. which might be called upon by a virtual server. These are
placed in scripts
and are not automatically included by the server.
freeradius::script{ 'myperlscript.pl':
source => 'puppet:///modules/site_freeradius/myperlscript.pl',
}
freeradius::site
Install a virtual server (a.k.a. site) from a flat file. Sites are installed into sites-available
and automatically symlinked into sites-enabled
, to ensure compatibility with package managers.
Any files in this directory that are not managed by Puppet will be removed.
freeradius::site { 'inner-tunnel':
source => 'puppet:///modules/site_freeradius/inner-tunnel',
}
ensure
Whether the site should be present or not.
source
Provide source to a file with the configuration of the site. Default: undef
.
content
Provide content for the configuartion of the site. Default: undef
.
authorize
Array of options (as String) for the authorize section of the site. This parameter is
ignored if source
or content
are used. Default: [].
authenticate
Array of options (as String) for the authenticate section of the site. This parameter is
ignored if source
or content
are used. Default: [].
preacct
Array of options (as String) for the preacct section of the site. This parameter is
ignored if source
or content
are used. Default: [].
accounting
Array of options (as String) for the accounting section of the site. This parameter is
ignored if source
or content
are used. Default: [].
session
Array of options (as String) for the session section of the site. This parameter is
ignored if source
or content
are used. Default: [].
post_auth
Array of options (as String) for the post-auth section of the site. This parameter is
ignored if source
or content
are used. Default: [].
pre_proxy
Array of options (as String) for the pre-proxy section of the site. This parameter is
ignored if source
or content
are used. Default: [].
post_proxy
Array of options (as String) for the post-proxy section of the site. This parameter is
ignored if source
or content
are used. Default: [].
listen
Array of listen definitions for the site. This parameter is ignored if source
or
content
are used. Default: [].
freeradius::sql
Configure SQL connections. You can define multiple database connections by
invoking this resource multiple times. If you are using MySQL, don't forget to
also set mysql_support => true
in the base freeradius
class.
freeradius::sql { 'mydatabase':
database => 'mysql',
server => '192.168.0.1',
login => 'radius',
password => 'topsecret',
radius_db => 'radius',
}
database
Default: undef
. Required. Specify which FreeRADIUS database driver to use. Choose one of mysql
, mssql
, oracle
, postgresql
server
Default: localhost
. Specify hostname of IP address of the database server.
port
TCP port to connect to the database. Default: 3306
.
login
Default: radius
. Username to connect to the databae.
password
Default: undef
. Required. Password to connect to the database.
radius_db
Default: radius
. Name of the database. Normally you should leave this alone. If you are using Oracle then use this instead:
(DESCRIPTION=(ADDRESS=(PROTOCOL=TCP)(HOST=localhost)(PORT=1521))(CONNECT_DATA=(SID=your_sid)))
.
num_sql_socks
Default: same as max_servers
. Number of sql connections to make to the database server.
Setting this to LESS than the number of threads means that some threads may starve, and
you will see errors like "No connections available and at max connection limit". Setting
this to MORE than the number of threads means that there are more connections than necessary.
Leave blank to set it to the same value as the number of threads.
lifetime
Default: 0
. Lifetime of an SQL socket. If you are having network issues such as TCP sessions expiring, you may need to set the socket
lifetime. If set to non-zero, any open connections will be closed $lifetime
seconds after they were first opened.
max_queries
Default: 0
. Maximum number of queries used by an SQL socket. If you are having issues with SQL sockets lasting "too long", you can
limit the number of queries performed over one socket. After $max_qeuries
, the socket will be closed. Use 0 for "no limit".
query_file
query_file
has been deprecated - use custom_query_file
instead
Default: sql/${database}/dialup.conf
. Relative path to the file which contains your SQL queries. By
default, points to the dialup.conf
specific to your database engine, so leave this blank if you are
using stock queries.
If you need to use custom queries, it is recommended that you deploy your query file using
freeradius::script
to install the file into scripts/custom_dialup.conf
and then
set query_file
to scripts/custom_dialup.conf
.
custom_query_file
Default: null
. Puppet fileserver path to a file which contains your SQL queries, i.e. dialup.conf
. This
option is intended to be a replacment for query_file
, which requires separate deployment of the file. This
option allows you to specify a Puppet-managed custom dialup.conf
which is installed and loaded automatically.
query_file
must be left blank if you use custom_query_file
.
acct_table1
If you want both stop and start records logged to the same SQL table, leave this as is. If you want them in
different tables, put the start table in $acct_table1
and stop table in $acct_table2
. Default : radacct
acct_table2
If you want both stop and start records logged to the same SQL table, leave this as is. If you want them in
different tables, put the start table in $acct_table1
and stop table in $acct_table2
. Default : radacct
postauth_table
Table for storing data after authentication
authcheck_table
Default: radcheck
authreply_table
Default: radreply
groupcheck_table
Default: radgroupcheck
groupreply_table
Default: radgroupreply
usergroup_table
Table to keep group info. Default: radusergroup
read_groups
If set to yes
(default) we read the group tables. If set to no
the user MUST have Fall-Through = Yes
in the radreply table. Default: yes
.
deletestalesessions
Remove stale session if checkrad does not see a double login. Default: yes
.
sqltrace
Print all SQL statements when in debug mode (-x). Default: no
.
sqltracefile
Location for SQL statements to be stored if $sqltrace = yes
. Default:
${logdir}/sqllog.sql
connect_failure_retry_delay
Number of seconds to dely retrying on a failed database connection (per socket). Default: 60
.
nas_table
Table to keep radius client info. Default: nas
.
readclients
Set to yes
to read radius clients from the database ($nas_table
) Clients will ONLY be read on server startup. For performance
and security reasons, finding clients via SQL queries CANNOT be done "live" while the server is running. Default: no
.
pool_start
Connections to create during module instantiation. Default: 1.
pool_min
Minimum number of connnections to keep open. Default: 1.
pool_spare
Spare connections to be left idle. Default: 1.
pool_idle_timeout
Idle timeout (in seconds). A connection which is unused for this length of time will be closed. Default: 60.
pool_connect_timeout
Connection timeout (in seconds). The maximum amount of time to wait for a new connection to be established. Default: '3.0'. This parameter should only be set when using FreeRADIUS 3.1.x.
freeradius::statusclient
Define RADIUS clients, specifically to connect to the status server for monitoring.
Very similar usage to freeradius::client
but with fewer options.
ip
Default: undef
. The IP address of the client in CIDR format. For IPv6, use ipv6addr
. ip
and ip6
are mutually exclusive but one must be supplied.
ip6
Default: undef
. The IPv6 address of the client in CIDR format. ip
and ip6
are mutually exclusive but one must be supplied.
secret
required. The RADIUS shared secret used for communication between the client/NAS and the RADIUS server.
port
Default: undef
. The UDP port that this virtual server should listen on. Leave blank if this client is not tied to a virtual server.
shortname
required. A short alias that is used in place of the IP address or fully qualified hostname provided in the first line of the section.
freeradius::template
Define template items that can be referred to in other config items
source
Provide source to a file with the template item. Specify only one of source
or content
.
content
Provide content of template item. Specify only one of source
or content
.
freeradius::virtual_module
Define a virtual module which consists of one or more other modules, for failover or load-balancing purposes.
submodules
Provide an array of submodules which will be loaded into this virtual module. Required.
type
Select the type of virtual module from redundant
, load-balance
, redundant-load-balance
or group
. See virtual modules
and load-balancing for more details.
# Load virtual module myldap
freeradius::virtual_module { 'myldap':
submodules => ['ldap1', 'ldap2'],
type => 'redundant-load-balance',
}
Limitations
This module is targeted at FreeRADIUS 3.x running on CentOS 7. It will not work on FreeRADIUS 2.x. It has not been thoroughly tested on other distributions, but might work. Likely sticking points with other distros are the names of packages, services and file paths.
This module requires Puppet 4 or greater.
Changelog
Please refer to the GitHub releases page for the changelog for 4.0.0 and onwards
3.9.2
- Bugfix: Restart FreeRADIUS after any huntgroups modification
3.9.1
- Various bugfixes in parameter type validation (thanks @craigwatson and @amateo)
3.9.0
- Bugfix: Fix mismatch between
tls_verify_client
parameter in the eap module manifest andtls_client
in the eap template (thanks @guest715) - Bugfix: Fix users template permits the users array to contain either Hashes or Strings (thanks @guest715)
- Bugfix: Create ippool files in freerad::module::ippool (thanks @amateo)
- Convert module packaging to PDK
- Update OS & Puppet version compatibility data
- Lint fixes
- Add data type validation for all parameters
3.8.2
- Bugfix: Fix for client iptables rules being repeatedly added by subsequent Puppet runs (thanks @guest715)
- Bugfix: Module file notifies service, not only symlink (thanks @ihpu)
- Add support for Debian 10 / Freeradius 3.0.16 (thanks @OlivierLM)
3.8.1
- Bugfix: Enable
attr_filter
module before service restart (thanks @theosotr)
3.8.0
- Add proper support for perl modules (thanks @deligatedgeek)
3.7.0
- Add support for Ubuntu 18.04 LTS (thanks @rogermartensson)
- Improved support for Debian 9 (thanks @carlgarner)
- Improvements to huntgroups (thanks @amateo)
- General bug fixes (thanks @infracaninophile, @coreone and @olivierlm))
3.6.0
- Add support for Debian 9 (thanks @its-not-a-bug-its-a-feature)
3.5.0
- Add support for huntgroups (thanks @sts and @phaer)
3.4.3
- Fix missing notify that caused problems when adding a new virtual server in
sites_available
3.4.1
- Fix calling syntax for logrotate
- Add param
package_ensure
3.4.0
- Fix bug with modules that have ensure => absent
- Fix bug with module::files where content and source
- Fix bug with path of krb5 module
- Manage parameter
allow_expired_crl
- Clean up comments in templates to reduce the size
3.3.0
- Deploy modules to
mods_available
and symlink tomods_enabled
- Deploy modules to
sites_available
and symlink tosites_enabled
3.2.0
- Warn instead of failing if the FR version is not 3.x
- Update logrotate module dependency
- Add PostgreSQL support
- Fix bug with templating home servers in Puppet 4
- Fix bug with logrotate postrotate on non Red Hat distros
3.1.0
- Provide facility to enable/disable specific EAP types in
freeradius::module::eap
3.0.0
- More parameters available for
freeradius::client
- Allow management of
freeradius::dictionary
withsource
orcontent
- Enable status checks for
freeradius::home_server
- More configurable options for
freeradius
base class - More sensible permissions on various config files
- Refactor
freeradius::ldap
asfreeradius::module::ldap
and add more params - Create
freeradius::listen
to manage arbitrary listeners - Create
freeradius::module::detail
to configure detail loggers - Create
freeradius::module::eap
to manage instantiations of theeap
module - Create
freeradius::module::files
to manage instantiations of thefiles
module - Create
freeradius::module::huntgroup
to manage huntgroups - Create
freeradius::module::ippool
to manage ippool resources - Create
freeradius::module::linelog
to configure linelog loggers - Create
freeradius::module::preprocess
to manage instantiations of thepreprocess
module - Fix some compatibility problems with Debian/Ubuntu systems
- Allow
freeradius::site
resources (virtual servers) to have their content managed other than just with flat files - Add more options to
freeradius::sql
- Add various types of validation for Puppet 4
2.3.1
- Fix bug with log rotation throwing errors when radiusd is not running
2.3.0
- Add support to configure virtual modules for fail-over and load-balancing
2.2.0
- Add support to configure the krb5 module
2.1.4
- Fix compatibility with Puppet 4
2.1.3
- Fix compatibility with Puppet 4
2.1.2
- Write out ldap config with different syntax for FreeRADIUS 3.0.x and 3.1.x when using multiple servers
2.1.1
- Fix bug with the facts not reporting version numbers accurately
2.1.0
- Various changes to preserve stock modules in a FreeRADIUS installation and be able to toggle them
2.0.1
- Fix up LDAP template to allow better compatibility with FreeRADIUS 3.1.x
2.0.0
- Drop support for FreeRADIUS 2.x, enabling us to keep the codebase tidier
1.3.0
- Add support for defining config templates
1.2.6
- Fix a bug that now enables sqltrace (sqllog) to work on FR3
1.2.5
- Switch to use saz/rsyslog to manage syslog rules
1.2.4
- Start with just 1 SQL socket by default to avoid overloading the SQL server
1.2.3
- Make facts fail gracefully if radiusd is not installed
1.2.2
- Fix a bug that stops statusclients from working
1.2.1
- Fix a bug that prevent 1.2.0 from working on FreeRADIUS 2
1.2.0
- Deprecate
netmask
parameter fromfreeradius::client
1.1.0
- Add support to supply an array of multiple LDAP servers
1.0.4
- Make an educated guess about the version of FR when the fact is unavailable (e.g. on the first Puppet run)
1.0.3
- Iron out a couple of issues with LDAP compatibility with Active Directory
1.0.2
- Fixed a bug that prevented LDAP from working on any port except 389
1.0.1
- Fixed a bug that caused an error when no proxy config items were defined
1.0.0
- Support for FreeRADIUS 3
- Native support for managing the LDAP module
- Native support for configuring realms (via realms, home_server and home_server_pool)
- Improved handling of attribute filtering
- Improved handling of SQL support
This release retains support for FreeRADIUS 2 but some of the parameters have changed so you will probably need to make changes to the way you use this module. Upgrade on a dev system first!
0.4.5
- Tweak wildcard matching on logrotate config
0.4.4
- Fix bug displaying deprecation notice and update documentation to reflect this
0.4.3
- Manage log rotation with rodjek/logrotate instead of deploying flat files
0.4.2
- Provide new SQL option custom_query_file
0.4.1
- Cease management of custom logging modules
logtofile
andlogtosyslog
since it does not make sense to manage these globally - Purge instantiation of unused modules
0.4.0
- Move control_socket into its own class and add parameters
- Improve the way the status_server is added or removed
- Delete all unmanaged sites from sites-available
0.3.8
- Purge all non-managed sites
0.3.7
- Minor linting of code to improve score
- Minor linting of metadata to improve score
0.3.6
- Bugfixes and feature improvements in
freeradius::sql
0.3.5
- Add ability to customise SQL socket lifetimes
- Purge all non-managed clients
- Add defined type to blank out unneeded config files without deleting them
0.3.4
- Correctly pass template content to control-socket
0.3.3
- The default behaviour is now to purge anything in ${confdir}/certs that is not managed by Puppet
0.3.2
- Various improvements to support Debian family
- Optional content parameters in various resources
0.3.1
- Fix a bug which prevents the module from working properly on Debian/Ubuntu (thanks @diranged)
0.3.0
- Add
ensure
parameter to all defined types
0.2.0
- Add support for customising
sql.conf
natively by addingfreeradius::sql
0.1.4
- Fix ambiguity about net/netmask in freeradius::client
0.1.3
- Add support for managing firewall rules automatically
- Add support for installation certificates & keys
- Make syslog support an optional component
- Various bugfixes
0.1.2
- Improved modular installs with optional components
- Improved support for Debian
- Clarify dependencies on other modules
- Lots of bugfixes
0.1.0
- Initial release with support for installing FreeRADIUS and configuring servers, modules, clients and other objects using flat files.
- Probably works only with FreeRADIUS 2.x
- Only tested with CentOS 6
Dependencies
- puppetlabs/stdlib (>=5.0.0 <10.0.0)
- puppetlabs/firewall (>=7.0.0 <9.0.0)
- saz/rsyslog (>=3.0.0 <6.0.0)
- puppet/logrotate (>=1.4.0 <8.0.0)
- puppetlabs/concat (>=1.0.0 <10.0.0)
- puppet/systemd (>=3.0.0 <6.0.0)
Apache License Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION 1. Definitions. "License" shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. "Licensor" shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. "Legal Entity" shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, "control" means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. "You" (or "Your") shall mean an individual or Legal Entity exercising permissions granted by this License. "Source" form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. "Object" form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. "Work" shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). "Derivative Works" shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. "Contribution" shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously marked or otherwise designated in writing by the copyright owner as "Not a Contribution." "Contributor" shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work. 2. Grant of Copyright License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare Derivative Works of, publicly display, publicly perform, sublicense, and distribute the Work and such Derivative Works in Source or Object form. 3. Grant of Patent License. Subject to the terms and conditions of this License, each Contributor hereby grants to You a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable (except as stated in this section) patent license to make, have made, use, offer to sell, sell, import, and otherwise transfer the Work, where such license applies only to those patent claims licensable by such Contributor that are necessarily infringed by their Contribution(s) alone or by combination of their Contribution(s) with the Work to which such Contribution(s) was submitted. If You institute patent litigation against any entity (including a cross-claim or counterclaim in a lawsuit) alleging that the Work or a Contribution incorporated within the Work constitutes direct or contributory patent infringement, then any patent licenses granted to You under this License for that Work shall terminate as of the date such litigation is filed. 4. Redistribution. You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions: (a) You must give any other recipients of the Work or Derivative Works a copy of this License; and (b) You must cause any modified files to carry prominent notices stating that You changed the files; and (c) You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and (d) If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License. You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License. 5. Submission of Contributions. Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions. 6. Trademarks. This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file. 7. Disclaimer of Warranty. Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License. 8. Limitation of Liability. In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages. 9. Accepting Warranty or Additional Liability. While redistributing the Work or Derivative Works thereof, You may choose to offer, and charge a fee for, acceptance of support, warranty, indemnity, or other liability obligations and/or rights consistent with this License. However, in accepting such obligations, You may act only on Your own behalf and on Your sole responsibility, not on behalf of any other Contributor, and only if You agree to indemnify, defend, and hold each Contributor harmless for any liability incurred by, or claims asserted against, such Contributor by reason of your accepting any such warranty or additional liability. END OF TERMS AND CONDITIONS APPENDIX: How to apply the Apache License to your work. To apply the Apache License to your work, attach the following boilerplate notice, with the fields enclosed by brackets "{}" replaced with your own identifying information. (Don't include the brackets!) The text should be enclosed in the appropriate comment syntax for the file format. We also recommend that a file or class name and description of purpose be included on the same "printed page" as the copyright notice for easier identification within third-party archives. Copyright {yyyy} {name of copyright owner} Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.