Use unique names for pg_hba.conf entries
[mirror/dsa-puppet.git] / modules / roles / manifests / security_mirror.pp
index 0482362..e87431a 100644 (file)
@@ -1,74 +1,67 @@
-class roles::security_mirror {
-       $rsync_bind = $::hostname ? {
-               mirror-anu => '150.203.164.61',
-               mirror-isc => '149.20.20.19',
-               mirror-umn => '128.101.240.215',
-               default    => '',
-       }
-       $rsync_bind6 = $::hostname ? {
-               mirror-anu => '2001:388:1034:2900::3d',
-               mirror-isc => '2001:4f8:8:36::1deb:19',
-               mirror-umn => '2607:ea00:101:3c0b::1deb:215',
-               default    => '',
-       }
-       $ftp_bind = $::hostname ? {
-               mirror-anu => '150.203.164.61',
-               default => '',
-       }
-       $ftp_bind6 = $::hostname ? {
-               mirror-anu => '2001:388:1034:2900::3d',
-               default => undef,
-       }
+# security mirror
+#
+# @param listen_addr IP addresses to have rsync listen on
+# @param onion_service provide the onion service from this host
+# @param healthcheck_name name to access this node in the health checker
+class roles::security_mirror(
+  Array[Stdlib::IP::Address] $listen_addr = [],
+  Boolean $onion_service = false,
+  Optional[String] $healthcheck_name = undef,
+){
+  include roles::archvsync_base
+  include apache2
+  include apache2::expires
+  include apache2::rewrite
 
-       include apache2::cache
-       apache2::site { '010-security.debian.org':
-               site   => 'security.debian.org',
-               content => template('roles/security_mirror/security.debian.org.erb')
-       }
+  $enclosed_addresses_rsync = empty($listen_addr) ? {
+    true    => ['[::]'],
+    default => enclose_ipv6($listen_addr),
+  }
+  $_enclosed_addresses = empty($listen_addr) ? {
+    true    => ['*'],
+    default => enclose_ipv6($listen_addr),
+  }
+  $vhost_listen = $_enclosed_addresses.map |$a| { "${a}:80" } .join(' ')
 
-       include ferm::ftp_conntrack
-       vsftpd::site { 'security':
-               banner       => 'security.debian.org FTP server (vsftpd)',
-               logfile      => '/var/log/ftp/vsftpd-security.debian.org.log',
-               max_clients  => 200,
-               root         => '/srv/ftp.root/',
-               bind         => $ftp_bind,
-       }
-       if ($ftp_bind6) {
-               vsftpd::site { 'security6':
-                       banner       => 'security.debian.org FTP server (vsftpd)',
-                       logfile      => '/var/log/ftp/vsftpd-security6.debian.org.log',
-                       max_clients  => 200,
-                       root         => '/srv/ftp.root/',
-                       bind         => $ftp_bind6,
-               }
-       }
+  apache2::site { '010-security.debian.org':
+    site    => 'security.debian.org',
+    content => template('roles/security_mirror/security.debian.org.erb')
+  }
 
-       rsync::site { 'security':
-               source      => 'puppet:///modules/roles/security_mirror/rsyncd.conf',
-               max_clients => 100,
-               bind        => $rsync_bind,
-               bind6       => $rsync_bind6,
-       }
+  rsync::site { 'security':
+    source      => 'puppet:///modules/roles/security_mirror/rsyncd.conf',
+    max_clients => 100,
+    binds       => $enclosed_addresses_rsync,
+  }
 
+  if $onion_service {
+    $onion_addr = empty($listen_addr) ? {
+      true    => $base::public_address,
+      default => filter_ipv4($listen_addr)[0]
+    }
+    if ! $onion_addr {
+      fail("Do not have a useable address for the onionservice on ${::hostname}.  Is \$listen_addr empty or does it not have an IPv4 address?.")
+    }
 
-       $onion_v4_addr = $::hostname ? {
-               mirror-anu => '150.203.164.61',
-               mirror-isc => '149.20.20.19',
-               mirror-umn => '128.101.240.215',
-               villa      => '212.211.132.32',
-               lobos      => '212.211.132.250',
-               default   => undef,
-       }
-       if has_role('security_mirror_onion') {
-               if ! $onion_v4_addr {
-                       fail("Do not have an onion_v4_addr set for $::hostname.")
-               }
+    onion::service { 'security.debian.org':
+      port           => 80,
+      target_port    => 80,
+      target_address => $onion_addr,
+    }
+  }
 
-               onion::service { 'security.debian.org':
-                       port => 80,
-                       target_port => 80,
-                       target_address => $onion_v4_addr,
-               }
-       }
+  Ferm::Rule::Simple <<| tag == 'ssh::server::from::security_master' |>>
+
+  mirror_health::service { 'security':
+    this_host_service_name => $healthcheck_name,
+    url                    => 'http://security.backend.mirrors.debian.org/debian-security/dists/stable/updates/Release',
+    health_url             => 'http://security.backend.mirrors.debian.org/_health',
+  }
+
+  # security abusers
+  #  198.108.67.48 DoS against our rsync service
+  ferm::rule { 'dsa-security-abusers':
+    prio => '005',
+    rule => 'saddr ( 198.108.67.48/32 ) DROP',
+  }
 }