X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=modules%2Fpostgres%2Fmanifests%2Fbackup_server%2Fregister_backup_clienthost.pp;h=5dff84554170b7b1ce207be8fc1aa737d0f3fa74;hb=d348da25beaad1ff77c3f94b8b1b53fc29f6b3ef;hp=00ef58288b67591560cd09ca1a6bf4bd92472f56;hpb=fa71f654c67691b4b4a276cf936eb76cab6d60f6;p=mirror%2Fdsa-puppet.git diff --git a/modules/postgres/manifests/backup_server/register_backup_clienthost.pp b/modules/postgres/manifests/backup_server/register_backup_clienthost.pp index 00ef58288..5dff84554 100644 --- a/modules/postgres/manifests/backup_server/register_backup_clienthost.pp +++ b/modules/postgres/manifests/backup_server/register_backup_clienthost.pp @@ -1,19 +1,26 @@ +# register this host at the backup servers # +# This class set up the ssh authorization on the backup servers +# so this client can push WAL segments. Furthermore, the +# client will be allowed to read other hosts backups -- specify +# the list of allowed target hosts via params. +# +# @param allow_read_basedir directory under which files can be read +# @param allow_read_hosts subdirectories under base to allow define postgres::backup_server::register_backup_clienthost ( - $sshpubkey = $::postgresql_key, - $ipaddrlist = join(getfromhash($site::nodeinfo, 'ldap', 'ipHostNumber'), ","), - $hostname = $::hostname, + String $allow_read_basedir = '/srv/backups/pg', + Array[Stdlib::Fqdn] $allow_read_hosts = lookup( { 'name' => 'postgres::backup_server::register_backup_clienthost::allow_read_hosts', 'default_value' => [] } ), ) { - include postgres::backup_server::globals + include postgres::backup_server::globals + + $allowstr = $allow_read_hosts.map |$host| { "--read-allow=${allow_read_basedir}/${host}" }.join(' ') + $ssh_command = "/usr/local/bin/debbackup-ssh-wrap ${allowstr} ${::hostname}" - if $sshpubkey { - $addr = assert_type(String[1], $ipaddrlist) - @@concat::fragment { "postgresql::server::backup-source-clienthost::$name::$fqdn": - target => $postgres::backup_server::globals::sshkeys_sources , - content => @("EOF"), - ${hostname} ${addr} ${sshpubkey} - | EOF - tag => $postgres::backup_server::globals::tag_source_sshkey, - } - } + ssh::authorized_key_add { 'register_backup_clienthost': + target_user => $postgres::backup_server::globals::backup_unix_user, + key => dig($facts, 'ssh_keys_users', 'postgres', 'id_rsa.pub', 'line'), + command => $ssh_command, + from => $base::public_addresses, + collect_tag => $postgres::backup_server::globals::tag_source_sshkey, + } }