auth.conf 4.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116
  1. # This is the default auth.conf file, which implements the default rules
  2. # used by the puppet master. (That is, the rules below will still apply
  3. # even if this file is deleted.)
  4. #
  5. # The ACLs are evaluated in top-down order. More specific stanzas should
  6. # be towards the top of the file and more general ones at the bottom;
  7. # otherwise, the general rules may "steal" requests that should be
  8. # governed by the specific rules.
  9. #
  10. # See http://docs.puppetlabs.com/guides/rest_auth_conf.html for a more complete
  11. # description of auth.conf's behavior.
  12. #
  13. # Supported syntax:
  14. # Each stanza in auth.conf starts with a path to match, followed
  15. # by optional modifiers, and finally, a series of allow or deny
  16. # directives.
  17. #
  18. # Example Stanza
  19. # ---------------------------------
  20. # path /path/to/resource # simple prefix match
  21. # # path ~ regex # alternately, regex match
  22. # [environment envlist]
  23. # [method methodlist]
  24. # [auth[enthicated] {yes|no|on|off|any}]
  25. # allow [host|backreference|*|regex]
  26. # deny [host|backreference|*|regex]
  27. # allow_ip [ip|cidr|ip_wildcard|*]
  28. # deny_ip [ip|cidr|ip_wildcard|*]
  29. #
  30. # The path match can either be a simple prefix match or a regular
  31. # expression. `path /file` would match both `/file_metadata` and
  32. # `/file_content`. Regex matches allow the use of backreferences
  33. # in the allow/deny directives.
  34. #
  35. # The regex syntax is the same as for Ruby regex, and captures backreferences
  36. # for use in the `allow` and `deny` lines of that stanza
  37. #
  38. # Examples:
  39. #
  40. # path ~ ^/path/to/resource # Equivalent to `path /path/to/resource`.
  41. # allow * # Allow all authenticated nodes (since auth
  42. # # defaults to `yes`).
  43. #
  44. # path ~ ^/catalog/([^/]+)$ # Permit nodes to access their own catalog (by
  45. # allow $1 # certname), but not any other node's catalog.
  46. #
  47. # path ~ ^/file_(metadata|content)/extra_files/ # Only allow certain nodes to
  48. # auth yes # access the "extra_files"
  49. # allow /^(.+)\.example\.com$/ # mount point; note this must
  50. # allow_ip 192.168.100.0/24 # go ABOVE the "/file" rule,
  51. # # since it is more specific.
  52. #
  53. # environment:: restrict an ACL to a comma-separated list of environments
  54. # method:: restrict an ACL to a comma-separated list of HTTP methods
  55. # auth:: restrict an ACL to an authenticated or unauthenticated request
  56. # the default when unspecified is to restrict the ACL to authenticated requests
  57. # (ie exactly as if auth yes was present).
  58. #
  59. ### Authenticated ACLs - these rules apply only when the client
  60. ### has a valid certificate and is thus authenticated
  61. # allow nodes to retrieve their own catalog
  62. path ~ ^/catalog/([^/]+)$
  63. method find
  64. allow $1
  65. # allow nodes to retrieve their own node definition
  66. path ~ ^/node/([^/]+)$
  67. method find
  68. allow $1
  69. # allow all nodes to access the certificates services
  70. path /certificate_revocation_list/ca
  71. method find
  72. allow *
  73. # allow all nodes to store their own reports
  74. path ~ ^/report/([^/]+)$
  75. method save
  76. allow $1
  77. # Allow all nodes to access all file services; this is necessary for
  78. # pluginsync, file serving from modules, and file serving from custom
  79. # mount points (see fileserver.conf). Note that the `/file` prefix matches
  80. # requests to both the file_metadata and file_content paths. See "Examples"
  81. # above if you need more granular access control for custom mount points.
  82. path /file
  83. allow *
  84. ### Unauthenticated ACLs, for clients without valid certificates; authenticated
  85. ### clients can also access these paths, though they rarely need to.
  86. # allow access to the CA certificate; unauthenticated nodes need this
  87. # in order to validate the puppet master's certificate
  88. path /certificate/ca
  89. auth any
  90. method find
  91. allow *
  92. # allow nodes to retrieve the certificate they requested earlier
  93. path /certificate/
  94. auth any
  95. method find
  96. allow *
  97. # allow nodes to request a new certificate
  98. path /certificate_request
  99. auth any
  100. method find, save
  101. allow *
  102. # deny everything else; this ACL is not strictly necessary, but
  103. # illustrates the default policy.
  104. path /
  105. auth any