This is a Puppet module for cntlm based on the second generation layout ("NextGen") of Example42 Puppet Modules.
Made by Guillaume Lederrey
Official git repository: http://github.com/gehel/puppet-cntlm
Released under the terms of Apache 2 License.
This module requires functions provided by the Example42 Puppi module (you need it even if you don't use and install Puppi)
For detailed info about the logic and usage patterns of Example42 modules check the DOCS directory on Example42 main modules set.
-
Install cntlm with default settings
class { 'cntlm': }
-
Install a specific version of cntlm package
class { 'cntlm': version => '1.0.1', }
-
Disable cntlm service.
class { 'cntlm': disable => true }
-
Remove cntlm package
class { 'cntlm': absent => true }
-
Enable auditing without without making changes on existing cntlm configuration files
class { 'cntlm': audit_only => true }
-
Module dry-run: Do not make any change on all the resources provided by the module
class { 'cntlm': noops => true }
-
Use custom sources for main config file
class { 'cntlm': source => [ "puppet:///modules/example42/cntlm/cntlm.conf-${hostname}" , "puppet:///modules/example42/cntlm/cntlm.conf" ], }
-
Use custom template for main config file. Note that template and source arguments are alternative.
class { 'cntlm': template => 'example42/cntlm/cntlm.conf.erb', }
-
Automatically include a custom subclass
class { 'cntlm': my_class => 'example42::my_cntlm', }
-
Activate puppi (recommended, but disabled by default)
class { 'cntlm': puppi => true, }
-
Activate puppi and use a custom puppi_helper template (to be provided separately with a puppi::helper define ) to customize the output of puppi commands
class { 'cntlm': puppi => true, puppi_helper => 'myhelper', }
-
Activate automatic monitoring (recommended, but disabled by default). This option requires the usage of Example42 monitor and relevant monitor tools modules
class { 'cntlm': monitor => true, monitor_tool => [ 'nagios' , 'monit' , 'munin' ], }
-
Activate automatic firewalling. This option requires the usage of Example42 firewall and relevant firewall tools modules
class { 'cntlm': firewall => true, firewall_tool => 'iptables', firewall_src => '10.42.0.0/24', firewall_dst => $ipaddress_eth0, }