eid-ops/global/overlay/etc/puppet/manifests/cosmos-site.pp

1023 lines
39 KiB
ObjectPascal
Raw Permalink Normal View History

2013-09-02 16:01:50 +02:00
# This manifest is managed using cosmos
Exec {
path => "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
}
2017-08-15 11:37:45 +02:00
include sunet
2013-09-02 16:01:50 +02:00
2017-08-15 11:37:45 +02:00
class mailclient ($domain) {
sunet::preseed_package {"postfix": ensure => present, options => {domain => $domain}}
}
class autoupdate {
class { 'sunet::updater': cron => true, cosmos_automatic_reboot => true }
}
2018-07-25 16:11:30 +02:00
class jumphosts {}
2024-05-16 13:56:00 +02:00
class infra_ca_rp (Boolean $monitor_infra_cert = true,){
sunet::ici_ca::rp { 'infra': monitor_infra_cert => $monitor_infra_cert}
2017-08-15 11:37:45 +02:00
}
# you need a default node, all nodes need ssh + ufw
node default {
}
2018-09-24 18:35:20 +02:00
class site_alias($alias_name=undef) {
2018-09-24 18:32:23 +02:00
file { "/var/www/$alias_name":
2018-09-24 18:30:08 +02:00
ensure => link,
2018-09-24 18:39:29 +02:00
target => $name
2018-09-24 18:30:08 +02:00
}
}
2017-08-15 11:37:45 +02:00
class common {
include sunet::tools
include sunet::motd
include sunet::ntp
2023-07-05 13:27:43 +02:00
if $::sunet_nftables_opt_in != 'yes' and ! ( $::operatingsystem == 'Ubuntu' and versioncmp($::operatingsystemrelease, '22.04') >= 0 ) {
warning('Enabling UFW')
include ufw
} else {
warning('Enabling nftables')
ensure_resource ('class','sunet::nftables::init', { })
}
2017-08-15 11:37:45 +02:00
include apt
# Only import appaprmor for ubuntu22 and older
if ($facts['os']['name'] == 'Ubuntu' and versioncmp($facts['os']['release']['full'], '22.04') <= 0 ){
include apparmor
}
include sunet::packages::jq
package { 'needrestart': ensure => installed}
2020-03-24 10:24:59 +01:00
package {'lshw': ensure => 'latest'}
2018-05-03 12:55:17 +02:00
# change git repo from gitops.sunet.se to platform.sunet.se
exec { 'git_repo_sunet':
cwd => '/var/cache/cosmos/repo',
command => '/usr/bin/git remote set-url origin https://platform.sunet.se/swedenconnect/eid-ops.git git://gitops.sunet.se/eid-ops',
onlyif => '/usr/bin/git remote get-url origin | grep -qi gitops.sunet.se/eid-ops',
}
2017-08-15 11:37:45 +02:00
}
class dhcp6_client {
ufw::allow { "allow-dhcp6-546":
ip => 'any',
port => '546',
proto => 'udp',
}
ufw::allow { "allow-dhcp6-547":
ip => 'any',
port => '547',
proto => 'udp'
}
}
class entropyclient {
# Entropy is not needed on modern kernels, we should remove this class when done with SC-2522
if ($facts['os']['name'] == 'Ubuntu' and versioncmp($facts['os']['release']['full'], '22.04') <= 0 ){
include sunet::simple_entropy
sunet::ucrandom {'random.nordu.net': ensure => absent }
sunet::nagios::nrpe_check_process { 'haveged': }
}
2017-08-15 11:37:45 +02:00
}
2018-02-23 15:30:56 +01:00
class openstack_dockerhost {
2017-08-15 11:37:45 +02:00
class { 'sunet::dockerhost':
2018-02-23 15:30:56 +01:00
docker_version => '17.12.0~ce-0~ubuntu',
2017-11-30 17:17:04 +01:00
docker_package_name => 'docker-ce',
2017-08-15 11:37:45 +02:00
storage_driver => "aufs",
run_docker_cleanup => true,
manage_dockerhost_unbound => true,
2017-11-30 17:17:04 +01:00
docker_network => true
2017-08-15 11:37:45 +02:00
}
}
class sunet_iaas_cloud {
sunet::cloud_init::config { 'disable_datasources':
config => { datasource_list => [ 'None' ] }
}
sunet::cloud_init::config { 'keep_root_enabled':
config => { disable_root => 'false' }
}
}
class webserver($enabled=true) {
if $enabled {
ufw::allow { "allow-http":
ip => 'any',
port => '80'
}
ufw::allow { "allow-https":
ip => 'any',
port => '443'
}
} else {
ufw::deny { "allow-http":
ip => 'any',
port => '80'
}
ufw::deny { "allow-https":
ip => 'any',
port => '443'
}
2017-08-15 11:37:45 +02:00
}
}
2024-02-21 19:30:00 +01:00
class webserver_new {
sunet::misc::ufw_allow { 'http':
from => 'any',
port => '80',
}
sunet::misc::ufw_allow { 'https':
from => 'any',
port => '443',
}
}
2018-02-12 23:39:28 +01:00
class servicemonitor {
2023-05-08 17:49:50 +02:00
$nagios_ip_v4 = hiera_array('nagios_ip_v4',[]);
sunet::misc::ufw_allow { "allow-servicemonitor-from-nagios":
from => $nagios_ip_v4,
2018-02-13 09:36:22 +01:00
port => '444',
}
}
2017-10-26 14:49:34 +02:00
class https_server {
}
class fe_servers {
}
class eidas_log {
2021-03-19 13:40:03 +01:00
ensure_resource('file','/etc/logrotate.d',{
2020-03-30 16:27:33 +02:00
ensure => 'directory',
mode => '0755'
})
2020-03-30 16:28:39 +02:00
file {'/etc/logrotate.d/eidas_logs':
ensure => file,
path => '/etc/logrotate.d/eidas_logs',
mode => '0644',
2020-03-30 16:28:39 +02:00
content => template('eid/eidas_logs/eidas_logs.erb')
}
}
2018-09-24 09:26:58 +02:00
2017-08-15 11:37:45 +02:00
class swamid_metadata($filename=undef) {
sunet::metadata::swamid { "$filename": }
}
class saml_metadata($filename=undef, $cert=undef, $url=undef) {
sunet::metadata { "$filename": url => $url, cert => $cert }
}
2017-11-13 07:43:40 +01:00
class md_repo_client {
2018-07-04 10:21:54 +02:00
sunet::snippets::reinstall::keep {['/etc/metadata','/root/.ssh']: } ->
2017-11-13 07:46:49 +01:00
sunet::ssh_git_repo {'/var/cache/metadata_r1':
2017-11-13 07:43:40 +01:00
username => 'root',
group => 'root',
hostname => 'r1.komreg.net',
url => 'git@r1.komreg.net:komreg-metadata.git',
id => 'komreg',
manage_user => false
2018-01-22 10:07:57 +01:00
} ->
package { ['make']: ensure => latest } ->
2017-11-13 09:42:39 +01:00
sunet::scriptherder::cronjob { 'verify_and_update':
2017-11-13 09:52:08 +01:00
cmd => '/var/cache/metadata_r1/scripts/do-update.sh',
2017-11-13 09:42:39 +01:00
minute => '*/5',
ok_criteria => ['exit_status=0', 'max_age=15m'],
warn_criteria => ['exit_status=0', 'max_age=1h'],
}
2017-11-13 09:05:24 +01:00
}
2018-07-02 08:48:12 +02:00
class eidas_metadata_key {
2018-01-22 14:14:32 +01:00
sunet::snippets::secret_file {"/etc/credentials/metadata.key":
2018-01-22 10:07:57 +01:00
hiera_key => 'eidas_metadata_key',
base64 => true
}
2018-07-02 08:48:12 +02:00
}
2021-12-08 08:13:04 +01:00
class eidas_hsm_client($luna_version="7.4-dev") {
2018-07-02 08:48:12 +02:00
$pkcs11pin = hiera('pkcs11pin',"")
sunet::snippets::reinstall::keep {['/etc/luna','/etc/Chrystoki.conf.d']: } ->
2018-06-20 11:59:37 +02:00
file {['/etc/luna','/etc/luna/cert']: ensure => directory } ->
sunet::docker_run {"${name}_hsmproxy":
hostname => "${::fqdn}",
image => 'docker.sunet.se/luna-client',
imagetag => $luna_version,
volumes => ['/dev/log:/dev/log','/etc/Chrystoki.conf.d:/etc/Chrystoki.conf.d','/etc/luna/cert:/usr/safenet/lunaclient/cert'],
env => ["PKCS11PIN=${pkcs11pin}"],
extra_parameters => ["--log-driver=syslog"]
2018-06-20 11:59:37 +02:00
}
2018-07-25 16:17:30 +02:00
sunet::scriptherder::cronjob { "${name}_restart_hsmproxy":
2018-09-19 10:47:16 +02:00
cmd => "/usr/sbin/service docker-${name}_hsmproxy restart",
2018-07-25 16:17:30 +02:00
minute => '9',
hour => '0',
ok_criteria => ['exit_status=0','max_age=48h'],
warn_criteria => ['exit_status=1','max_age=50h'],
}
2018-07-02 08:48:12 +02:00
}
2018-09-06 17:11:54 +02:00
class md_signer($dest_host=undef,$dest_dir="",$version="eidas") {
package { ['xsltproc','libxml2-utils','attr']: ensure => latest } ->
2018-07-02 08:48:12 +02:00
sunet::pyff {$name:
2018-09-06 17:11:54 +02:00
version => $version,
2018-07-02 08:48:12 +02:00
pound_and_varnish => false,
pipeline => "${name}.fd",
2019-01-09 16:48:35 +01:00
volumes => ["/etc/credentials:/etc/credentials"],
docker_run_extra_parameters => ["--log-driver=syslog"]
2018-07-02 08:48:12 +02:00
}
if ($dest_host) {
sunet::ssh_host_credential { "${name}-publish-credential":
hostname => $dest_host,
username => 'root',
group => 'root',
manage_user => false,
ssh_privkey => safe_hiera("publisher_ssh_privkey")
} ->
sunet::scriptherder::cronjob { "${name}-publish":
cmd => "env RSYNC_ARGS='--chown=www-data:www-data --chmod=D0755,F0664 --xattrs' /usr/local/bin/mirror-mdq.sh http://localhost root@${dest_host}:${dest_dir}",
minute => '*/5',
ok_criteria => ['exit_status=0'],
warn_criteria => ['max_age=30m']
}
2018-01-22 10:07:57 +01:00
}
}
2022-03-22 15:53:32 +01:00
class md_publisher(Array $allow_clients=['any'], $keyname=undef, String $dir="/var/www/html", $signer_ip_adress=undef) {
2021-03-19 13:40:03 +01:00
$_keyname = $keyname ? {
2018-02-12 00:39:51 +01:00
undef => $::fqdn,
default => $keyname
}
# this allows fileage check to work wo sudo
2018-02-27 14:28:43 +01:00
file { '/var/www': ensure => directory, mode => '0755' } ->
file { '/var/www/html': ensure => directory, mode => '0755', owner => 'www-data', group =>'www-data' } ->
sunet::ssh_keys { 'publisher-keys':
config => safe_hiera('publisher_ssh_keys_mapping', {}),
key_database_name => 'publisher_ssh_keys_db'
2018-02-11 23:29:14 +01:00
} ->
package {['lighttpd','attr']: ensure => latest } ->
2021-03-19 13:40:03 +01:00
exec {'enable-ssl':
2018-02-12 00:43:32 +01:00
command => "/usr/sbin/lighttpd-enable-mod ssl",
onlyif => "test ! -h /etc/lighttpd/conf-enabled/*ssl*"
2018-02-12 00:39:51 +01:00
} ->
2018-02-12 00:59:14 +01:00
file {'/etc/lighttpd/server.pem':
ensure => 'link',
2018-02-12 01:00:20 +01:00
target => "/etc/ssl/private/${_keyname}.pem"
2018-02-12 00:39:51 +01:00
} ->
if ($::operatingsystemrelease < '20.04') {
apparmor::profile { 'usr.sbin.lighttpd': source => '/etc/apparmor-cosmos/usr.sbin.lighttpd' }
}
else {
apparmor::profile { 'usr.sbin.lighttpd': source => '/etc/apparmor-cosmos/usr.sbin.lighttpd.upgraded' }
}
file {'/etc/lighttpd/conf-enabled/99-mime-xattr.conf':
ensure => file,
mode => '0640',
owner => 'root',
group => 'root',
content => inline_template("mimetype.use-xattr = \"enable\"\n")
} ->
service {'lighttpd': ensure => running } ->
2018-02-11 22:25:47 +01:00
sunet::misc::ufw_allow {'allow-lighttpd':
2018-02-11 22:01:31 +01:00
from => $allow_clients,
2018-02-12 00:24:51 +01:00
port => 443
2018-02-12 22:04:10 +01:00
} ->
sunet::nagios::nrpe_check_fileage {"metadata_aggregate":
filename => "/var/www/html/entities/index.html", # yes this is correct
warning_age => '1800',
2018-02-12 22:04:10 +01:00
critical_age => '86400'
2018-02-11 22:01:31 +01:00
}
2022-03-22 15:53:32 +01:00
sunet::misc::ufw_allow { "allow_ssh":
from => $signer_ip_adress,
port => '22',
}
2018-02-11 22:01:31 +01:00
}
2019-02-05 14:03:02 +01:00
class mdsl_publisher() {
sunet::nagios::nrpe_check_fileage {"mdsl_aggregate":
filename => "/var/www/html/mdservicelist-aggregate.xml", # yes this is correct
warning_age => '600',
critical_age => '86400'
}
sunet::nagios::nrpe_check_fileage {"mdsl_se":
filename => "/var/www/html/mdservicelist-se.xml", # yes this is correct
warning_age => '600',
critical_age => '86400'
}
}
class proxy_eidas_metadata() {
2024-05-27 22:51:30 +02:00
sunet::nagios::nrpe_check_fileage {"proxy_eidas_metadata_cache":
filename => "/etc/eidas-proxy/se/ps-mdcache/metadata-cache.xml",
warning_age => '600',
critical_age => '172800'
}
}
2017-10-26 14:00:42 +02:00
class md_repo_server($hostname) {
2018-06-28 20:20:31 +02:00
ensure_resource('sunet::system_user', 'www-data', {
username => 'www-data',
group => 'www-data',
managehome => false,
shell => '/bin/bash'
})
class {'sunet::gitolite': save_private_admin_key_on_server=>false }
2018-06-28 20:20:31 +02:00
sunet::snippets::add_user_to_group { 'add_www_data_to_git':
username => 'www-data',
group => 'git'
} ->
2017-08-15 11:37:45 +02:00
sunet::docker_run {'gitweb':
image => 'docker.sunet.se/gitweb',
imagetag => 'latest',
volumes => ['/etc/dehydrated:/etc/dehydrated','/home/git:/home/git'],
ports => ['443:443','80:80'],
2018-12-10 14:59:51 +01:00
env => ["HOSTNAME=$hostname","ACMEDIR=/etc/dehydrated","KEYDIR=/etc/dehydrated"],
extra_parameters => ["--log-driver=syslog"]
2018-08-14 13:11:25 +02:00
}
ensure_resource('class','webserver',{})
ensure_resource('class','https_server',{})
$md_signers_ip = hiera_array('md_signers',[])
sunet::misc::ufw_allow { 'allow_ssh_md_signers':
from => $md_signers_ip,
port => '22',
}
2017-08-15 11:37:45 +02:00
}
2019-11-07 10:23:29 +01:00
class eidas_de_middleware_hsm($version="110-fixes-sc-p11",$hostname='localhost') {
2019-07-12 11:31:41 +02:00
$_version = safe_hiera('eidas_demw_version',$version)
$_hostname = safe_hiera('eidas_demw_hostname',$hostname)
$poseidas_admin_hashed_password = safe_hiera('poseidas_admin_hashed_password')
$spring_datasource_password = safe_hiera('spring_datasource_password')
$pkcs11_pin = safe_hiera('pkcs11_pin')
#saved directly in admin inteface from version 3.0.0 onwards
2019-07-12 11:31:41 +02:00
$demw_tls_client_key = safe_hiera('demw_tls_client_key')
$demw_tls_client_cert = safe_hiera('demw_tls_client_cert')
$demw_tls_server_cert = safe_hiera('demw_tls_server_cert')
2024-07-10 10:14:52 +02:00
file {['/opt/eidas-middleware','/opt/eidas-middleware/configuration','/opt/eidas-middleware/database', '/opt/eidas-middleware/database/hsql']: ensure => directory } ->
2019-07-18 16:49:11 +02:00
file {['/etc/luna','/etc/luna/cert']: ensure => directory } ->
2019-07-12 11:31:41 +02:00
sunet::docker_run {'eidas-demw':
image => 'docker.sunet.se/eidas-demw',
imagetag => $_version,
hostname => "${::fqdn}",
ports => ['443:8443','10000:10000'],
2019-07-12 11:31:41 +02:00
volumes => ['/var/log/eidas-middleware:/var/log/eidas-middleware',
'/opt/eidas-middleware/configuration:/opt/eidas-middleware/configuration',
'/opt/eidas-middleware/database:/opt/eidas-middleware/database',
'/dev/log:/dev/log',
2019-07-18 16:49:11 +02:00
'/etc/luna/cert:/usr/safenet/lunaclient/cert',
'/etc/Chrystoki.conf.d:/etc/Chrystoki.conf.d',
2019-07-12 11:31:41 +02:00
'/etc/ssl:/etc/ssl'],
env => ["CERTNAME=${::fqdn}_infra",
"LOGGING_LEVEL_DE_GOVERNIKUS_EUMW_POSEIDAS_SERVER_IDPROVIDER_CONFIG=DEBUG",
"SC_HSM.P11_PIN=$pkcs11_pin",
"SC_HSM_P11_CONFIG_FILE=/opt/eidas-middleware/configuration/hsm/demw-sunpkcs11-config",
"SC_HSM.P11_ALIAS=sc_eidas_sign",
2021-12-11 13:25:51 +01:00
'JAVA_OPTS="-DformatMsgNoLookups=true -Dlog4j2.formatMsgNoLookups=true"',
2019-07-12 11:31:41 +02:00
"SPRING_DATASOURCE_PASSWORD=$spring_datasource_password"],
extra_parameters => ["--log-driver=syslog"]
2021-11-22 10:51:56 +01:00
}
2019-07-12 11:31:41 +02:00
}
2024-03-21 19:21:46 +01:00
class eidas_de_middleware_hsm_test($version="110-fixes-sc-p11",$hostname='localhost') {
$_version = safe_hiera('eidas_demw_version',$version)
$_hostname = safe_hiera('eidas_demw_hostname',$hostname)
$spring_datasource_password = safe_hiera('spring_datasource_password')
$pkcs11_pin = safe_hiera('pkcs11_pin')
2024-06-08 00:46:46 +02:00
#saved directly in admin inteface from version 3.0.0 onwards
2024-03-21 19:21:46 +01:00
$demw_tls_client_key = safe_hiera('demw_tls_client_key')
$demw_tls_client_cert = safe_hiera('demw_tls_client_cert')
$demw_tls_server_cert = safe_hiera('demw_tls_server_cert')
2024-07-10 10:14:52 +02:00
file {['/opt/eidas-middleware','/opt/eidas-middleware/configuration','/opt/eidas-middleware/database','/opt/eidas-middleware/database/hsql']: ensure => directory } ->
2024-03-21 19:21:46 +01:00
file {['/etc/luna','/etc/luna/cert']: ensure => directory } ->
sunet::docker_run {'eidas-demw':
image => 'docker.sunet.se/eidas-demw',
imagetag => $_version,
hostname => "${::fqdn}",
2024-03-21 21:33:55 +01:00
ports => ['443:8443','10000:10000'],
2024-03-21 19:21:46 +01:00
volumes => ['/var/log/eidas-middleware:/var/log/eidas-middleware',
'/opt/eidas-middleware/configuration:/opt/eidas-middleware/configuration',
'/opt/eidas-middleware/database:/opt/eidas-middleware/database',
'/dev/log:/dev/log',
'/etc/luna/cert:/usr/safenet/lunaclient/cert',
'/etc/Chrystoki.conf.d:/etc/Chrystoki.conf.d',
'/etc/ssl:/etc/ssl'],
env => ["CERTNAME=${::fqdn}_infra",
2024-06-27 22:27:16 +02:00
"LOGGING_LEVEL_DE_GOVERNIKUS_EUMW_POSEIDAS_SERVER_IDPROVIDER_CONFIG=DEBUG",
"SC_HSM.P11_PIN=$pkcs11_pin",
"SC_HSM_P11_CONFIG_FILE=/opt/eidas-middleware/configuration/hsm/demw-sunpkcs11-config",
"SC_HSM.P11_ALIAS=sc_eidas_sign",
2024-03-21 19:21:46 +01:00
'JAVA_OPTS="-DformatMsgNoLookups=true -Dlog4j2.formatMsgNoLookups=true"',
"SPRING_DATASOURCE_PASSWORD=$spring_datasource_password"],
2024-06-08 00:46:46 +02:00
extra_parameters => ["--log-driver=syslog"]
2024-03-21 19:21:46 +01:00
}
sunet::nftables::docker_expose { 'https' :
allow_clients => 'any',
port => '443',
iif => "${interface_default}",
}
2024-03-21 21:33:55 +01:00
sunet::nftables::docker_expose { 'admin_gui' :
2024-03-21 19:21:46 +01:00
allow_clients => 'any',
port => '10000',
iif => "${interface_default}",
}
}
2018-09-03 22:50:33 +02:00
class eidas_de_middleware($version="106-rs",$hostname='localhost') {
2018-09-03 23:04:49 +02:00
$_version = safe_hiera('eidas_demw_version',$version)
$_hostname = safe_hiera('eidas_demw_hostname',$hostname)
2018-09-03 23:06:30 +02:00
$poseidas_admin_hashed_password = safe_hiera('poseidas_admin_hashed_password')
2018-09-03 22:50:33 +02:00
$spring_datasource_password = safe_hiera('spring_datasource_password')
2024-06-08 00:46:46 +02:00
#saved directly in admin inteface from version 3.0.0 onwards
2018-09-03 22:50:33 +02:00
$middleware_crypt_pin = safe_hiera('middleware_crypt_pin')
$middleware_sign_pin = safe_hiera('middleware_sign_pin')
$demw_tls_client_key = safe_hiera('demw_tls_client_key')
$demw_tls_client_cert = safe_hiera('demw_tls_client_cert')
$demw_tls_server_cert = safe_hiera('demw_tls_server_cert')
2019-07-12 11:31:41 +02:00
2024-07-10 10:14:52 +02:00
file {['/opt/eidas-middleware','/opt/eidas-middleware/configuration','/opt/eidas-middleware/database','/opt/eidas-middleware/database/hsql']: ensure => directory } ->
2024-06-08 00:46:46 +02:00
#saved directly in admin interface from version 3.0.0 onwards
2018-09-04 09:22:49 +02:00
sunet::snippets::secret_file {"/opt/eidas-middleware/configuration/eidasmw-signature-keystore.jks":
2018-09-03 23:02:47 +02:00
hiera_key => 'eidasmw-signature-keystore',
base64 => true
} ->
2024-06-08 00:46:46 +02:00
#no longer needed in version 3.0.0 onwards
2021-08-13 14:45:54 +02:00
file { '/opt/eidas-middleware/configuration/POSeIDAS.xml.sh':
ensure => present,
content => template('eid/demw/POSeIDAS.xml.sh.erb'),
mode => '0744',
}
2024-06-08 00:46:46 +02:00
#saved directly in admin interface from version 3.0.0 onwards
2018-09-04 09:22:49 +02:00
sunet::snippets::secret_file {"/opt/eidas-middleware/configuration/eidasmw-crypto-keystore.jks":
2018-09-03 23:02:47 +02:00
hiera_key => 'eidasmw-crypto-keystore',
base64 => true
2024-06-08 00:46:46 +02:00
}
2018-09-03 22:50:33 +02:00
sunet::docker_run {'eidas-demw':
image => 'docker.sunet.se/eidas-demw',
imagetag => $_version,
hostname => "${::fqdn}",
2020-12-17 09:56:41 +01:00
ports => ['443:8443','127.0.0.1:10000:10000'],
2018-09-03 22:50:33 +02:00
volumes => ['/var/log/eidas-middleware:/var/log/eidas-middleware',
'/opt/eidas-middleware/configuration:/opt/eidas-middleware/configuration',
'/opt/eidas-middleware/database:/opt/eidas-middleware/database',
2018-09-03 22:50:33 +02:00
'/dev/log:/dev/log',
'/etc/ssl:/etc/ssl'],
2018-09-04 11:37:50 +02:00
env => ["CERTNAME=${::fqdn}_infra",
"PUBLIC_HOSTNAME=$_hostname",
2018-09-03 22:50:33 +02:00
"SPRING_DATASOURCE_PASSWORD=$spring_datasource_password",
2024-06-08 00:51:07 +02:00
'JAVA_OPTS="-DformatMsgNoLookups=true -Dlog4j2.formatMsgNoLookups=true"'],
2018-12-10 14:59:51 +01:00
extra_parameters => ["--log-driver=syslog"]
2018-09-03 22:50:33 +02:00
}
}
2018-08-24 13:11:16 +02:00
class eidas_sp($version="1.0.0",$hostname='localhost',$environment='qa') {
2018-08-13 12:27:55 +02:00
$_version = safe_hiera('eidas_sp_version',$version)
$_hostname = safe_hiera('eidas_sp_hostname',$hostname)
file {['/etc/eidas-sp','/var/log/eidas-sp','/etc/ssl']: ensure => directory } ->
sunet::docker_run {'eidas-sp':
image => 'docker.sunet.se/eidas-sp',
imagetag => $_version,
hostname => "${::fqdn}",
2023-05-23 09:42:37 +02:00
ports => ['443:8443','127.0.0.1:444:8444'],
2018-08-13 12:27:55 +02:00
volumes => ['/var/log/eidas-sp:/var/log/eidas-sp',
'/etc/eidas-sp:/etc/eidas-sp',
'/dev/log:/dev/log',
'/etc/ssl:/etc/ssl'],
2018-08-27 12:39:58 +02:00
env => ["SERVER_SERVLET_CONTEXT_PATH=/",
2018-08-13 12:27:55 +02:00
"SP_USE_SC_LOGO=false",
2018-08-13 16:35:53 +02:00
"SP_ENTITY_ID=https://$_hostname/sp",
2018-08-24 13:11:16 +02:00
"SPRING_PROFILES_ACTIVE=$environment",
2018-12-10 14:59:51 +01:00
"SP_BASE_URI=https://$_hostname"],
extra_parameters => ["--log-driver=syslog"]
2018-08-14 13:08:53 +02:00
}
2018-08-14 13:11:25 +02:00
ensure_resource('class','webserver',{})
ensure_resource('class','https_server',{})
2018-08-13 12:27:55 +02:00
}
2018-12-07 10:06:29 +01:00
class test_my_eid($version="1.0.1",$hostname='localhost',$environment='qa') {
$_version = safe_hiera('test_my_eid_version',$version)
$_hostname = safe_hiera('test_my_eid_hostname',$hostname)
file {['/etc/test-my-eid','/var/log/test-my-eid','/etc/ssl']: ensure => directory } ->
if ($environment== 'default') {
sunet::docker_run {'test-my-eid':
image => 'docker.sunet.se/test-my-eid',
imagetag => $_version,
hostname => "${::fqdn}",
ports => ['443:8443','127.0.0.1:444:8444'],
volumes => ['/var/log/test-my-eid:/var/log/test-my-eid',
'/etc/test-my-eid:/etc/test-my-eid',
'/dev/log:/dev/log',
'/etc/ssl:/etc/ssl'],
env => ["SERVER_SERVLET_CONTEXT_PATH=/",
"SP_ENTITY_ID=https://$_hostname/sp",
"SIGN_SP_ENTITY_ID=https://$_hostname/sp-sign",
"SPRING_PROFILES_ACTIVE=$environment",
"SP_BASE_URI=https://$_hostname",
"SP_DISCOVERY_STATIC_IDP_CONFIGURATION=file:/etc/test-my-eid/idp-disco-test.properties",
"SP_FEDERATION_METADATA_URL=https://test.md.swedenconnect.se/role/idp.xml",
"SP_FEDERATION_METADATA_VALIDATION_CERTIFICATE=file:/etc/test-my-eid/test-metadata-signer.crt",
"SP_EIDAS_CONNECTOR_ENTITY_ID=https://test.connector.eidas.swedenconnect.se/eidas"],
extra_parameters => ["--log-driver=syslog"]
}
} else {
sunet::docker_run {'test-my-eid':
image => 'docker.sunet.se/test-my-eid',
imagetag => $_version,
hostname => "${::fqdn}",
ports => ['443:8443','127.0.0.1:444:8444'],
volumes => ['/var/log/test-my-eid:/var/log/test-my-eid',
'/etc/test-my-eid:/etc/test-my-eid',
'/dev/log:/dev/log',
'/etc/ssl:/etc/ssl'],
env => ["SERVER_SERVLET_CONTEXT_PATH=/",
"SP_ENTITY_ID=https://$_hostname/sp",
"SIGN_SP_ENTITY_ID=https://$_hostname/sp-sign",
"SPRING_PROFILES_ACTIVE=$environment",
"SP_BASE_URI=https://$_hostname",
"SP_DISCOVERY_STATIC_IDP_CONFIGURATION=file:/etc/test-my-eid/idp-disco-$environment.properties"],
extra_parameters => ["--log-driver=syslog"]
}
2019-03-22 09:08:48 +01:00
}
ensure_resource('class','webserver',{})
ensure_resource('class','https_server',{})
}
2019-04-25 19:52:25 +02:00
class eidastest($version="1.0.0", $hostname="locahost") {
$_version = safe_hiera('eidastest_version',$version)
$_hostname = safe_hiera('eidastest_hostname',$hostname)
$home = '/etc/eidastest'
file { "${home}":
ensure => directory,
owner => 'root',
group => 'root',
path => "${home}",
mode => '0755',
}
2021-04-16 16:39:38 +02:00
file { "${home}/eidastest/config.ini":
content => template('eid/eidastest/config.ini.erb'),
owner => 'root',
group => 'root',
mode => '0755',
}
2021-05-27 16:19:33 +02:00
file { "${home}/eidastest/supervise_firefox_processes.sh":
content => template('eid/eidastest/supervise_firefox_processes.sh.erb'),
2021-04-16 16:39:38 +02:00
owner => 'root',
group => 'root',
mode => '0755',
}
2019-04-25 19:52:25 +02:00
$compose = hiera("eidastest_compose")
sunet::docker_compose {'eidastest_docker_compose':
service_name => 'eidastest',
description => 'eidastest service',
compose_dir => "${home}",
content => inline_template("<%= @compose.to_yaml %>\n")
2019-10-23 11:21:17 +02:00
}
2018-12-07 10:06:29 +01:00
ensure_resource('class','webserver',{})
ensure_resource('class','https_server',{})
}
class swedenconnect_refidp($version="1.0.3",$hostname='localhost',$env=undef) {
2018-08-14 13:05:45 +02:00
$_version = safe_hiera('swedenconnect_refidp_version',$version)
$_hostname = safe_hiera('swedenconnect_refidp_hostname',$hostname)
$idp_persistent_id_salt = safe_hiera('idp_persistent_id_salt');
$idp_fticks_salt = safe_hiera('idp_fticks_salt');
$proxy_header_secret = safe_hiera('proxy_header_secret');
2018-08-14 13:23:41 +02:00
file { ["/etc/swedenconnect-idp","/etc/swedenconnect-idp/credentials"]: ensure => directory } ->
2018-08-14 13:05:45 +02:00
sunet::docker_run {'swedenconnect-idp':
image => 'docker.sunet.se/swedenconnect-idp',
imagetag => $_version,
hostname => "${::fqdn}",
2018-08-14 13:19:25 +02:00
ports => ['443:8443'],
2018-08-14 13:05:45 +02:00
volumes => ['/var/log/swedenconnect-idp:/var/log/swedenconnect-idp',
'/etc/swedenconnect-idp:/etc/swedenconnect-idp',
'/dev/log:/dev/log',
'/etc/ssl:/etc/ssl'],
env => ["IDP_SERVER_HOSTNAME=$_hostname",
"TOMCAT_HOSTNAME=$_hostname",
2023-03-24 15:58:54 +01:00
"IDP_FEDERATION_METADATA_URL=https://${env}.md.swedenconnect.se/entities/",
"IDP_FEDERATION_METADATA_VALIDATION_CERT=/etc/swedenconnect-idp/credentials/trust/sc-${env}-metadata-validation-cert.crt",
"TOMCAT_TLS_SERVER_KEY=/etc/ssl/private/${::fqdn}_infra.key",
"TOMCAT_TLS_SERVER_CERTIFICATE=/etc/ssl/certs/${::fqdn}_infra.crt",
2018-08-14 13:05:45 +02:00
"TOMCAT_PROXY_SHARED_SECRET=$proxy_header_secret",
"IDP_PERSISTENT_ID_SALT=$idp_persistent_id_salt",
"IDP_FTICKS_SALT=$idp_fticks_salt"],
extra_parameters => ["--log-driver=syslog"]
2018-08-14 13:08:53 +02:00
}
2018-08-14 13:19:25 +02:00
ensure_resource('class','webserver',{})
2018-08-14 13:23:41 +02:00
ensure_resource('class','https_server',{})
2018-08-14 13:05:45 +02:00
}
2020-05-29 14:35:11 +02:00
class eidas_connector($version="1.0.6",$hostname='localhost',$luna_debug='no') {
$_version = safe_hiera('eidas_connector_version',$version)
2018-05-02 21:01:24 +02:00
$_hostname = safe_hiera('eidas_connector_hostname',$hostname)
2017-12-11 09:25:38 +01:00
$prid_service = safe_hiera('eidas_prid_service')
2021-06-03 17:50:43 +02:00
$idp_fticks_salt = safe_hiera('idp_fticks_salt');
2018-09-06 16:18:03 +02:00
$pkcs11_pin = safe_hiera('pkcs11_pin');
2021-06-03 17:50:43 +02:00
$idp_persistent_id_salt = safe_hiera('idp_persistent_id_salt');
$idp_sealer_password = safe_hiera('idp_sealer_password');
$proxy_header_secret = safe_hiera('proxy_header_secret');
2017-11-23 10:28:56 +01:00
file {['/etc/eidas-connector','/etc/eidas-connector/credentials','/etc/eidas-connector/credentials/sp','/etc/eidas-connector/credentials/idp','/etc/eidas-connector/credentials/tomcat','/var/log/eidas-connector']: ensure => directory } ->
2017-12-19 14:56:53 +01:00
sunet::snippets::secret_file {"/etc/eidas-connector/credentials/sealer.jks":
2017-11-23 10:04:43 +01:00
hiera_key => 'eidas_connector_sealer_jks',
base64 => true
} ->
2017-12-19 14:41:21 +01:00
sunet::snippets::secret_file {"/etc/eidas-connector/credentials/connector.key":
hiera_key => 'eidas_connector_key',
2017-11-23 10:04:43 +01:00
base64 => true
} ->
2017-12-19 14:41:21 +01:00
sunet::snippets::secret_file {"/etc/eidas-connector/credentials/metadata.key":
2017-12-19 14:54:59 +01:00
hiera_key => 'eidas_metadata_key',
2017-11-23 10:04:43 +01:00
base64 => true
} ->
sunet::snippets::secret_file {"/etc/eidas-connector/credentials/tomcat/tomcat-key.pem":
hiera_key => 'eidas_connector_tomcat_key',
base64 => true
} ->
2018-06-20 16:58:07 +02:00
file {['/etc/luna','/etc/luna/cert']: ensure => directory } ->
sunet::docker_run {'eidas-connector':
image => 'docker.sunet.se/eidas-connector',
imagetag => $_version,
2018-07-18 00:25:08 +02:00
hostname => "${::fqdn}",
ports => ['443:8443'],
volumes => ['/var/log/eidas-connector:/var/log/eidas-connector',
2017-12-11 09:42:02 +01:00
'/etc/eidas-connector:/etc/eidas-connector',
2018-06-20 16:58:07 +02:00
'/dev/log:/dev/log',
'/etc/luna/cert:/usr/safenet/lunaclient/cert',
2018-07-18 00:17:01 +02:00
'/etc/Chrystoki.conf.d:/etc/Chrystoki.conf.d',
2017-12-11 09:42:02 +01:00
'/etc/ssl:/etc/ssl'],
2018-05-02 21:01:24 +02:00
env => ["IDP_SERVER_HOSTNAME=$_hostname",
"TOMCAT_HOSTNAME=$_hostname",
"TOMCAT_PROXY_SHARED_SECRET=$proxy_header_secret",
2017-12-06 23:00:56 +01:00
"EIDAS_METADATA_IGNORE_SIGNATURE_VALIDATION=false",
2018-09-06 16:18:03 +02:00
"PKCS11_PIN=$pkcs11_pin",
2020-05-29 14:35:11 +02:00
"LUNA_DEBUG=$luna_debug",
2018-05-02 21:01:24 +02:00
"IDP_ENTITY_ID=https://$_hostname/eidas",
"SP_ENTITY_ID=https://$_hostname/idp/metadata/sp",
2017-10-30 08:48:02 +01:00
"IDP_PERSISTENT_ID_SALT=$idp_persistent_id_salt",
2017-11-23 21:28:14 +01:00
"IDP_SEALER_PASSWORD=$idp_sealer_password",
2019-01-08 16:20:04 +01:00
"IDP_FTICKS_SALT=$idp_fticks_salt",
"IDP_PRID_SERVICE_URL=$prid_service"],
extra_parameters => ["--log-driver=syslog"]
2018-08-14 13:11:25 +02:00
}
sunet::scriptherder::cronjob { "${name}_clean_logs":
cmd => "/usr/bin/find /var/log/eidas-connector -ctime +180 -type f -name *.log -delete",
minute => '2',
hour => '0',
ok_criteria => ['exit_status=0','max_age=48h'],
warn_criteria => ['exit_status=1','max_age=50h'],
}
2018-08-14 13:11:25 +02:00
ensure_resource('class','webserver',{})
ensure_resource('class','https_server',{})
}
2018-12-11 14:03:54 +01:00
class eidas_proxy($version='1.0.0',$country='se',$hostname='localhost', $spring_config_param='SPRING_CONFIG_LOCATION') {
2017-12-15 11:09:12 +01:00
$_version = safe_hiera('eidas_proxy_version',$version)
2018-05-02 21:01:24 +02:00
$_hostname = safe_hiera('eidas_proxy_hostname',$hostname);
2017-12-19 13:43:05 +01:00
$_country = safe_hiera('eidas_proxy_country',$country);
2018-09-20 15:21:55 +02:00
$_pkcs11pin = safe_hiera('pkcs11_pin');
$_eidas_proxy_oidc_rp_jks = safe_hiera('eidas_proxy_oidc_rp_jks','');
$proxy_service_cookie_encrypt_pw = safe_hiera('proxy_service_cookie_encrypt_pw');
2017-12-19 13:43:05 +01:00
file {['/etc/eidas-proxy/',"/etc/eidas-proxy/$_country"]: ensure => directory } ->
file {["/etc/eidas-proxy/$_country/keystore"]: ensure => directory } ->
2017-12-19 13:43:05 +01:00
sunet::snippets::secret_file {"/etc/eidas-proxy/$_country/metadata.p12":
2017-12-19 13:31:41 +01:00
hiera_key => 'eidas_metadata_key',
base64 => true
} ->
2017-12-19 13:43:05 +01:00
sunet::snippets::secret_file {"/etc/eidas-proxy/$_country/proxy.p12":
2017-12-19 13:31:41 +01:00
hiera_key => 'eidas_proxy_key',
base64 => true
} ->
2018-06-20 16:58:07 +02:00
file {['/etc/luna','/etc/luna/cert']: ensure => directory } ->
sunet::docker_run {'eidas-proxy':
image => 'docker.sunet.se/eidas-proxy',
2017-12-15 11:09:12 +01:00
imagetag => $_version,
2018-07-18 00:25:08 +02:00
hostname => "${::fqdn}",
ports => ['443:8443','127.0.0.1:444:8444'],
volumes => ['/var/log/eidas-proxy:/var/log/eidas-proxy',
'/etc/eidas-proxy:/etc/eidas-proxy',
2018-06-20 16:58:07 +02:00
'/dev/log:/dev/log',
'/etc/luna/cert:/usr/safenet/lunaclient/cert',
2018-07-18 00:17:01 +02:00
'/etc/Chrystoki.conf.d:/etc/Chrystoki.conf.d',
'/etc/ssl:/etc/ssl'],
2018-05-02 21:01:24 +02:00
env => ["PROXY_SERVICE_DOMAIN_PREFIX=https://$_hostname/eidas-ps",
2017-10-27 14:36:57 +02:00
"SPRING_PROFILES_ACTIVE=se",
2017-12-16 20:59:52 +01:00
"CERTNAME=${::fqdn}_infra",
2018-09-20 15:21:55 +02:00
"PKCS11_PIN=${_pkcs11pin}",
2018-12-11 14:02:14 +01:00
"$spring_config_param=/etc/eidas-proxy/$_country/cfg/",
"PROXY_SERVICE_COOKIEENCRYPTPW=$proxy_service_cookie_encrypt_pw"],
extra_parameters => ["--log-driver=syslog"]
2018-08-14 13:11:25 +02:00
}
ensure_resource('class','webserver',{})
ensure_resource('class','https_server',{})
if $_eidas_proxy_oidc_rp_jks != '' {
sunet::snippets::secret_file {"/etc/eidas-proxy/$_country/keystore/oidc-rp.jks":
hiera_key => 'eidas_proxy_oidc_rp_jks',
base64 => true
}
}
2017-12-06 22:55:22 +01:00
}
2019-05-29 13:31:00 +02:00
class prid($version="1.0.0",$clients="",$mdsl="") {
$_version = safe_hiera('eidas_prid_version',$version)
$_mdsl = safe_hiera('eidas_prid_mdsl',$mdsl)
$hostname = $::fqdn
2018-06-18 11:59:07 +02:00
$_allow_clients = safe_hiera($clients)
2017-12-08 15:42:24 +01:00
sunet::docker_run {'prid':
2017-12-06 22:55:22 +01:00
image => 'docker.sunet.se/prid-service',
2018-01-11 18:05:16 +01:00
imagetag => $_version,
2017-12-06 22:55:22 +01:00
hostname => "$hostname",
2018-05-30 17:53:34 +02:00
ports => ['443:8443','127.0.0.1:444:8444'],
2017-12-06 23:19:49 +01:00
volumes => ['/etc/prid-service:/etc/prid-service',
2017-12-06 22:55:22 +01:00
'/etc/ssl:/etc/ssl'],
2017-12-08 16:11:58 +01:00
env => ["PRID_SERVICE_POLICY_CONFIGURATION=file:///etc/prid-service/policy.properties",
2019-05-29 13:31:00 +02:00
"PRID_SERVICE_METADATA_SERVICELIST_URL=$_mdsl",
"CERTNAME=${hostname}_infra"],
extra_parameters => ["--log-driver=syslog"]
2018-05-30 17:53:34 +02:00
} ->
2018-06-18 11:59:07 +02:00
sunet::misc::ufw_allow {'allow-prid':
from => $_allow_clients,
port => 443
} ->
2018-05-30 17:53:34 +02:00
class {'https_server': }
}
class prid_local($version="1.0.0",$clients="",$mdsl="") {
$_version = safe_hiera('eidas_prid_version',$version)
$_mdsl = safe_hiera('eidas_prid_mdsl',$mdsl)
$hostname = $::fqdn
$_allow_clients = safe_hiera($clients)
sunet::docker_run {'prid':
image => 'docker.sunet.se/prid-service',
imagetag => $_version,
hostname => "$hostname",
2022-02-28 19:04:50 +01:00
ports => ['127.0.0.1:80:8080','127.0.0.1:444:8444'],
volumes => ['/etc/prid-service:/etc/prid-service',
'/etc/ssl:/etc/ssl'],
2022-02-28 19:04:50 +01:00
env => ['JAVA_OPTS="-Dserver.port=8080 -Dserver.ssl.enabled=false -Dmanagement.server.port=8444 -Dmanagement.ssl.enabled=true"',
"PRID_SERVICE_POLICY_CONFIGURATION=file:///etc/prid-service/policy.properties",
"PRID_SERVICE_METADATA_SERVICELIST_URL=$_mdsl",
"CERTNAME=${hostname}_infra"],
extra_parameters => ["--log-driver=syslog"]
}
}
2018-05-30 17:53:34 +02:00
class validator($version="2.0.0") {
$_version = safe_hiera('validator_version',$version)
$hostname = $::fqdn
sunet::docker_run {'metadata-validator':
image => 'docker.sunet.se/metadata-validator',
imagetag => $_version,
hostname => "$hostname",
ports => ['443:8443','127.0.0.1:444:8009'],
volumes => ['/etc/ssl:/etc/ssl',
'/etc/metadata-validator:/opt/webapp/mdval',
'/etc/localtime:/etc/localtime:ro'],
2022-04-01 19:49:09 +02:00
env => ["SPRING_CONFIG_ADDITIONAL_LOCATION=/opt/webapp/mdval/cfg/",
"CERTNAME=${hostname}_infra"],
extra_parameters => ["--log-driver=syslog"]
2018-08-14 13:11:25 +02:00
}
ensure_resource('class','webserver',{})
ensure_resource('class','https_server',{})
}
2018-10-16 19:01:04 +02:00
class proxy_testsp($version="1.0.1",$public_hostname=undef,$uri_path="/testps",$profile="qa") {
$_version = safe_hiera('proxy_testsp_version',$version)
$hostname = $::fqdn
$_public_hostname = $public_hostname ? {
undef => $hostname,
default => $public_hostname
}
sunet::docker_run {'eidas-ps-testsp':
image => 'docker.sunet.se/eidas-ps-testsp',
imagetag => $_version,
hostname => $hostname,
ports => ['443:8443','127.0.0.1:8444:8009'],
volumes => ['/etc/ssl:/etc/ssl',
'/etc/localtime:/etc/localtime:ro'],
env => ["CERTNAME=$hostname",
"SP_ACCESS_ALLOW_ALL=true",
"SP_BASE_URI=https://$_public_hostname",
"SERVER_SERVLET_CONTEXT_PATH=$uri_path",
"SPRING_PROFILES_ACTIVE=$profile"],
extra_parameters => ["--log-driver=syslog"]
2018-10-16 19:01:04 +02:00
}
}
2018-05-04 18:07:49 +02:00
class github_client_credential {
sunet::ssh_host_credential { "github":
hostname => "github.com",
id => "github",
2018-05-04 18:10:01 +02:00
manage_user => false
2018-05-04 18:07:49 +02:00
}
}
2018-05-04 17:37:25 +02:00
class pages($version=undef) {
class { 'sunet::pages': version => $version }
sunet::docker_run {'people-sunet-se':
image => 'docker.sunet.se/static-vhosts',
ports => ['80:80'],
volumes => ['/var/www:/usr/local/apache2/vhosts'],
extra_parameters => ["--log-driver=syslog"]
2018-05-04 17:37:25 +02:00
}
2018-08-14 13:11:25 +02:00
ensure_resource('class','webserver',{})
2018-05-04 17:37:25 +02:00
}
2017-08-15 11:37:45 +02:00
class sunetops {
2023-09-08 12:04:42 +02:00
sunet::ssh_keys { 'sunetops':
config => safe_hiera('sunetops_ssh_keys', {})
}
# OS hardening
# For now we skip this on ubuntu24, SC-2522
if ($facts['os']['name'] == 'Ubuntu' and versioncmp($facts['os']['release']['full'], '22.04') <= 0 ){
2024-12-19 15:46:16 +01:00
if $facts['networking']['hostname'] =~ /kvm/ {
class {'bastion':
fstab_fix_shm => false,
sysctl_net_hardening => false,
}
} else {
class {'bastion':
fstab_fix_shm => false,
fixperms_paranoia => true,
}
}
}
2023-09-08 12:04:42 +02:00
}
2024-01-11 11:26:37 +01:00
class konsulter {
2023-09-08 12:13:16 +02:00
sunet::ssh_keys { 'konsulter':
config => safe_hiera('konsulter_ssh_keys', {})
}
}
2017-08-15 11:37:45 +02:00
class nrpe {
2020-07-07 18:07:18 +02:00
require apt
class {'sunet::nagios': }
package {'nagios-plugins-contrib': ensure => latest}
2024-01-15 14:30:20 +01:00
if ($facts['os']['name'] == 'Ubuntu' and versioncmp($facts['os']['release']['full'], '22.04') >= 0 ){
2024-01-15 14:30:20 +01:00
$mem_w = '90'
$mem_c = '95'
} else {
$mem_w = '10'
$mem_c = '5'
}
sunet::nagios::nrpe_command { 'check_memory':
command_line => "/usr/lib/nagios/plugins/check_memory -w ${mem_w}% -c ${mem_c}%"
2020-07-07 18:07:18 +02:00
}
sunet::nagios::nrpe_command {'check_mem':
command_line => '/usr/lib/nagios/plugins/check_memory -w 10% -c 5%'
}
sunet::nagios::nrpe_command {'check_boot_15_5':
command_line => '/usr/lib/nagios/plugins/check_disk -w 15% -c 5% -p /boot'
}
sunet::nagios::nrpe_command {'check_entropy':
2022-09-26 10:54:57 +02:00
command_line => '/usr/lib/nagios/plugins/check_entropy -w 200'
2020-07-07 18:07:18 +02:00
}
sunet::nagios::nrpe_command {'check_ntp_time':
command_line => '/usr/lib/nagios/plugins/check_ntp_time -H localhost'
}
sunet::nagios::nrpe_command {'check_scriptherder':
command_line => '/usr/local/bin/scriptherder --mode check'
}
sunet::nagios::nrpe_command {'check_apt':
command_line => '/usr/lib/nagios/plugins/check_apt'
}
sunet::nagios::nrpe_command {'check_eidas_health':
command_line => '/usr/lib/nagios/plugins/check_eidas_health.sh localhost'
}
sunet::sudoer {'nagios_run_needrestart_command':
user_name => 'nagios',
collection => 'nagios',
command_line => "/usr/sbin/needrestart -p -l"
}
sunet::nagios::nrpe_command {'check_needrestart':
command_line => "sudo /usr/sbin/needrestart -p -l"
}
exec { "create_${name}_service_dir":
command => '/bin/mkdir -p /etc/systemd/system/nagios-nrpe-server.service.d/',
unless => '/usr/bin/test -d /etc/systemd/system/nagios-nrpe-server.service.d/',
}
exec { "${name}_daemon_reload":
command => 'systemctl daemon-reload',
refreshonly => true,
}
$str = "# Some NRPE checks will get fishy results when using a PrivateTmp.
# E.g check_apt: https://askubuntu.com/questions/1415415/check-apt-issue-with-nagios
[Service]
PrivateTmp=false"
file {
'/etc/systemd/system/nagios-nrpe-server.service.d/privatetmp.conf':
ensure => file,
mode => '0444',
content => $str,
2024-05-31 18:30:06 +02:00
require => [Exec["create_${name}_service_dir"], Package[nagios-nrpe-server]],
notify => [Exec["${name}_daemon_reload"],Service[nagios-nrpe-server]],
}
2017-08-15 11:37:45 +02:00
}
class redis_cluster_node {
2020-07-07 18:07:18 +02:00
file { '/opt/redis': ensure => directory }
sysctl { 'vm.overcommit_memory': value => '1' }
sunet::redis::server {'redis-master':
allow_clients => hiera_array('redis_client_ips', []),
cluster_nodes => hiera_array('redis_sentinel_ips', []),
2020-07-07 18:07:18 +02:00
}
sunet::redis::server {'redis-sentinel':
2019-10-18 17:08:23 +02:00
port => 26379,
sentinel_config => 'yes',
allow_clients => hiera_array('redis_client_ips', []),
cluster_nodes => hiera_array('redis_sentinel_ips', []),
2020-07-07 18:07:18 +02:00
}
}
class redis_frontend_node ($hostname=undef,$ca="infra") {
2020-07-07 18:07:18 +02:00
file { '/opt/redis': ensure => directory }
sunet::redis::haproxy {'redis-haproxy':
cluster_nodes => hiera_array('redis_sentinel_ips', []),
client_ca => "/etc/ssl/certs/${ca}.crt",
certificate => "/etc/ssl/private/${::fqdn}_${ca}.pem"
2020-07-07 18:07:18 +02:00
}
}
2022-01-21 15:12:36 +01:00
node 'fe-tug-1.test.komreg.net' {
# Set up Cosmos class for common sunet-frontend files. Should ideally be set up in
# the bootstrapping phase, since setting it up here will require > 1 run
# of 'cosmos apply' before everything is in place. Perfection will have
# to come later.
file_line { 'cosmos_conf_frontend1_common':
path => '/etc/cosmos/cosmos.conf',
line => 'COSMOS_REPO_MODELS="$COSMOS_REPO/fe-test-common/:$COSMOS_REPO_MODELS"',
}
}
node 'fe-fre-1.test.komreg.net' {
# Set up Cosmos class for common sunet-frontend files. Should ideally be set up in
# the bootstrapping phase, since setting it up here will require > 1 run
# of 'cosmos apply' before everything is in place. Perfection will have
# to come later.
file_line { 'cosmos_conf_frontend1_common':
path => '/etc/cosmos/cosmos.conf',
line => 'COSMOS_REPO_MODELS="$COSMOS_REPO/fe-test-common/:$COSMOS_REPO_MODELS"',
}
}
2022-02-22 13:09:14 +01:00
node 'natmd-test-1.komreg.net' {
file_line { 'cosmos_conf':
path => '/etc/cosmos/cosmos.conf',
line => 'COSMOS_REPO_MODELS="$COSMOS_REPO/natmd-test-common/:$COSMOS_REPO_MODELS"',
}
}
2022-02-23 10:58:12 +01:00
node 'natmd-test-2.komreg.net' {
file_line { 'cosmos_conf':
path => '/etc/cosmos/cosmos.conf',
line => 'COSMOS_REPO_MODELS="$COSMOS_REPO/natmd-test-common/:$COSMOS_REPO_MODELS"',
}
}
node 'eumd-test-1.komreg.net' {
file_line { 'cosmos_conf':
path => '/etc/cosmos/cosmos.conf',
line => 'COSMOS_REPO_MODELS="$COSMOS_REPO/eumd-test-common/:$COSMOS_REPO_MODELS"',
}
}
node 'eumd-test-2.komreg.net' {
file_line { 'cosmos_conf':
path => '/etc/cosmos/cosmos.conf',
line => 'COSMOS_REPO_MODELS="$COSMOS_REPO/eumd-test-common/:$COSMOS_REPO_MODELS"',
}
}
2024-01-25 13:51:43 +01:00
node 'relay-1.swedenconnect.se' {
sunet::scriptherder::cronjob { "rsync_certificate_to_relay_2":
cmd => "/usr/bin/rsync -av --copy-links --delete /etc/letsencrypt/live/relay.swedenconnect.se/ root@relay-2.swedenconnect.se:",
minute => '9',
hour => '0',
ok_criteria => ['exit_status=0','max_age=48h'],
warn_criteria => ['exit_status=1','max_age=50h'],
}
}
2024-05-08 09:24:16 +02:00
node 'eidas-proxy-1.test.sveidas.se' {
# Set up Cosmos class for common proxy files for test. Should ideally be set up in
# the bootstrapping phase, since setting it up here will require > 1 run
# of 'cosmos apply' before everything is in place. Perfection will have
# to come later.
file_line { 'cosmos_conf_proxy_test_common':
path => '/etc/cosmos/cosmos.conf',
line => 'COSMOS_REPO_MODELS="$COSMOS_REPO/eidas-test-proxy/:$COSMOS_REPO_MODELS"',
}
}