# include roles::dbmaster
#
class roles::dbmaster {
+ include apache2
- include roles::pubsub::parameters
-
- $rabbit_password = $roles::pubsub::parameters::rabbit_password
-
- ssl::service { 'db.debian.org':
- notify => [ Exec['service apache2 reload'],
- Service['slapd'] ],
- key => true,
- tlsaport => [443, 389, 636],
- }
-
- file { "/etc/ldap/db.debian.org.key":
- ensure => present,
- mode => '0440',
- group => 'openldap',
- source => 'puppet:///modules/ssl/from-letsencrypt/db.debian.org.key',
- links => follow,
- }
-
- roles::pubsub::config { 'generate':
- key => 'dsa-udgenerate',
- exchange => dsa,
- topic => 'dsa.ud.replicate',
- vhost => dsa,
- username => $::fqdn,
- password => $rabbit_password
- }
-
- service { 'slapd':
- ensure => running,
- }
+ include roles::pubsub::parameters
+
+ $rabbit_password = $roles::pubsub::parameters::rabbit_password
+
+ ssl::service { 'db.debian.org':
+ notify => [ Exec['service apache2 reload'],
+ Service['slapd'] ],
+ key => true,
+ tlsaport => [443, 389, 636],
+ }
+
+ file { '/etc/ldap/db.debian.org.key':
+ ensure => present,
+ mode => '0440',
+ group => 'openldap',
+ content => inline_template('<%= File.read(scope().call_function("hiera", ["paths.letsencrypt_dir"]) + "/db.debian.org.key") %>'),
+ links => follow,
+ }
+
+ roles::pubsub::config { 'generate':
+ key => 'dsa-udgenerate',
+ exchange => dsa,
+ topic => 'dsa.ud.replicate',
+ vhost => dsa,
+ username => $::fqdn,
+ password => $rabbit_password
+ }
+
+ service { 'slapd':
+ ensure => running,
+ }
+
+ ssh::keygen {'dsa': }
+ ssh::authorized_key_add { 'dbmaster::puppetmaster::nagios-build':
+ target_user => 'puppet',
+ command => '/srv/puppet.debian.org/sync/bin/puppet-ssh-wrap draghi.debian.org nagiosconfig',
+ key => $facts['dsa_key'],
+ collect_tag => 'puppetmaster',
+ }
+
+ exim::vdomain { 'db.debian.org':
+ mail_user => 'mail_db',
+ mail_group => 'nogroup',
+ }
}