Mercurial > repos > other > Puppet
view modules/apache/manifests/mod/security.pp @ 106:ef0926ee389a puppet-3.6
Lock down Apache headers for security, based on https://securityheaders.io/
author | IBBoard <dev@ibboard.co.uk> |
---|---|
date | Sat, 14 May 2016 17:10:10 +0100 |
parents | 37675581a273 |
children | 675c1cc61eaf |
line wrap: on
line source
class apache::mod::security ( $crs_package = $::apache::params::modsec_crs_package, $activated_rules = $::apache::params::modsec_default_rules, $modsec_dir = $::apache::params::modsec_dir, $allowed_methods = 'GET HEAD POST OPTIONS', $content_types = 'application/x-www-form-urlencoded|multipart/form-data|text/xml|application/xml|application/x-amf', $restricted_extensions = '.asa/ .asax/ .ascx/ .axd/ .backup/ .bak/ .bat/ .cdx/ .cer/ .cfg/ .cmd/ .com/ .config/ .conf/ .cs/ .csproj/ .csr/ .dat/ .db/ .dbf/ .dll/ .dos/ .htr/ .htw/ .ida/ .idc/ .idq/ .inc/ .ini/ .key/ .licx/ .lnk/ .log/ .mdb/ .old/ .pass/ .pdb/ .pol/ .printer/ .pwd/ .resources/ .resx/ .sql/ .sys/ .vb/ .vbs/ .vbproj/ .vsdisco/ .webinfo/ .xsd/ .xsx/', $restricted_headers = '/Proxy-Connection/ /Lock-Token/ /Content-Range/ /Translate/ /via/ /if/', ){ if $::osfamily == 'FreeBSD' { fail('FreeBSD is not currently supported') } ::apache::mod { 'security': id => 'security2_module', lib => 'mod_security2.so', } ::apache::mod { 'unique_id_module': id => 'unique_id_module', lib => 'mod_unique_id.so', } if $crs_package { package { $crs_package: ensure => 'latest', before => File['security.conf'], } } # Template uses: # - $modsec_dir file { 'security.conf': ensure => file, content => template('apache/mod/security.conf.erb'), path => "${::apache::mod_dir}/security.conf", owner => $::apache::params::user, group => $::apache::params::group, require => Exec["mkdir ${::apache::mod_dir}"], before => File[$::apache::mod_dir], notify => Class['apache::service'], } file { $modsec_dir: ensure => directory, owner => $::apache::params::user, group => $::apache::params::group, mode => '0555', purge => true, force => true, recurse => true, } file { "${modsec_dir}/activated_rules": ensure => directory, owner => $::apache::params::user, group => $::apache::params::group, mode => '0555', purge => true, force => true, recurse => true, notify => Class['apache::service'], } file { "${modsec_dir}/security_crs.conf": ensure => file, content => template('apache/mod/security_crs.conf.erb'), require => File[$modsec_dir], notify => Class['apache::service'], } apache::security::rule_link { $activated_rules: } }