Forge Home

luks

Puppet module for managing LUKS encrypted volumes

11,111 downloads

9,556 latest version

4.6 quality score

We run a couple of automated
scans to help you access a
module's quality. Each module is
given a score based on how well
the author has formatted their
code and documentation and
modules are also checked for
malware using VirusTotal.

Please note, the information below
is for guidance only and neither of
these methods should be considered
an endorsement by Puppet.

Version information

  • 1.0.1 (latest)
  • 1.0.0
  • 0.1.6
  • 0.1.5
  • 0.1.4
  • 0.1.3
  • 0.1.2
released Jul 3rd 2017
This version is compatible with:
  • ,

Start using this module

  • r10k or Code Manager
  • Bolt
  • Manual installation
  • Direct download

Add this module to your Puppetfile:

mod 'sammcj-luks', '1.0.1'
Learn more about managing modules with a Puppetfile

Add this module to your Bolt project:

bolt module add sammcj-luks
Learn more about using this module with an existing project

Manually install this module globally with Puppet module tool:

puppet module install sammcj-luks --version 1.0.1

Direct download is not typically how you would use a Puppet module to manage your infrastructure, but you may want to download the module in order to inspect the code.

Download

Documentation

sammcj/luks — version 1.0.1 Jul 3rd 2017

luks

Description

Puppet module for managing LUKS encrypted volumes

Code Climate

Setup

Beginning with LUKS

This is a very basic module for configuring encrypted volumes using LUKS on Linux.

Usage

The following creates a LUKS device at /dev/mapper/secretdata, backed by the partition at /dev/sdb1, encrypted with the value of $secret_key:

  include ::luks

  secret_key = hiera('luks_secret')

  luks::device { 'secretdata':
    device         => '/dev/sdb1',
    key            => $secret_key,
    remove_catalog => true,
  }

The secret key should come from somewhere encrypted such as hiera-eyaml.

Reference

Parameters

device

The hardware device to back LUKS with -- any existing data will be lost when formatted as a LUKS device!

key

The encryption key for the LUKS device.

force_format

Instructs LuksFormat to run in 'batchmode' which esentially forces the block device to be formatted, use with care.

base64

Set to true if the key is base64-encoded (necessary for encryption keys with binary data).

Defaults to false.

mapper

The name to use in /dev/mapper for the device.

Defaults to the name to the name of the resource, i.e. /dev/mapper/secretdata

Limitations

Development/Release Notes/Contributors/Etc.

Please feel free to submit issues, and merge requests or generally contribute to this module.