# our bacula client configuration # # this mostly configures the file daemon, but also firewall rules and # fragments to sent to the other servers. # # @param port_fd Port that bacula-fd listens on # @param ensure present or absent class bacula::client( Integer $port_fd = 9102, Enum['present', 'absent'] $ensure = defined(Class['bacula::not_a_client']) ? { true => 'absent', default => 'present' }, ) inherits bacula { $package_ensure = $ensure ? { 'present' => 'installed', 'absent' => 'purged' } $service_ensure = $ensure ? { 'present' => 'running', 'absent' => 'stopped' } $service_enable = $ensure ? { 'present' => true, 'absent' => false } $reverse_ensure = $ensure ? { 'present' => 'absent', 'absent' => 'present' } if $ensure == 'present' { @@bacula::storage_per_node { $::fqdn: } @@bacula::node { $::fqdn: port_fd => $port_fd, } @@concat::fragment { "bacula-dsa-client-list::${::fqdn}": target => $bacula::bacula_dsa_client_list , content => @("EOF"), ${::fqdn} | EOF tag => $bacula::tag_bacula_dsa_client_list, } # allow access from director Ferm::Rule::Simple <<| tag == "bacula::director-to-fd::${bacula::bacula_director_address}" |>> { port => $port_fd, } # get access to the storage @@ferm::rule::simple { "bacula::fd-to-storage::${::fqdn}": tag => "bacula::fd-to-storage::${bacula::bacula_storage_address}", description => 'Allow bacula-fd access to the bacula-storage', chain => 'bacula-sd', saddr => $bacula::public_addresses, } } elsif $ensure == 'absent' { file { '/etc/bacula': ensure => absent, purge => true, force => true, recurse => true; } } ensure_packages ( [ 'bacula-fd', 'bacula-common', ], { ensure => $package_ensure }) service { 'bacula-fd': ensure => $service_ensure, enable => $service_enable, hasstatus => true, require => Package['bacula-fd'] } exec { 'bacula-fd restart-when-idle': path => '/usr/bin:/usr/sbin:/bin:/sbin', command => "sh -c 'setsid /usr/local/sbin/bacula-idle-restart ${port_fd} bacula-fd &'", refreshonly => true, subscribe => [ File[$bacula::bacula_ssl_server_cert], File[$bacula::bacula_ssl_client_cert] ], require => File['/usr/local/sbin/bacula-idle-restart'], } file { '/etc/bacula/bacula-fd.conf': ensure => $ensure, content => template('bacula/bacula-fd.conf.erb'), mode => '0640', owner => root, group => bacula, require => Package['bacula-fd'], notify => Exec['bacula-fd restart-when-idle'], } file { '/usr/local/sbin/bacula-backup-dirs': ensure => $ensure, mode => '0775', source => 'puppet:///modules/bacula/bacula-backup-dirs', } file { '/usr/local/sbin/postbaculajob': ensure => $ensure, mode => '0775', source => 'puppet:///modules/bacula/postbaculajob', } file { '/etc/default/bacula-fd': ensure => $ensure, content => template('bacula/default.bacula-fd.erb'), mode => '0400', owner => root, group => root, require => Package['bacula-fd'], notify => Service['bacula-fd'], } if (versioncmp($::lsbmajdistrelease, '9') >= 0 and $facts['systemd']) { dsa_systemd::override { 'bacula-fd': content => @(EOT) [Service] ExecStart= ExecStart=/usr/sbin/bacula-fd -c $CONFIG -f -u bacula -k | EOT } } else { dsa_systemd::override { 'bacula-fd': ensure => absent, } } }