X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=modules%2Fpostgres%2Fmanifests%2Fbackup_server%2Fregister_backup_clienthost.pp;h=fc4cc0c1bb69621e1f7f81b9a737bd76522e88dd;hb=421d51cedb758b5a27a89b5c458562f9c279cbc3;hp=7580845e03f3f883a33cd8ef24127966cbb3610e;hpb=dc2858047a151e2fbe466678c21d6533a5c245bf;p=mirror%2Fdsa-puppet.git diff --git a/modules/postgres/manifests/backup_server/register_backup_clienthost.pp b/modules/postgres/manifests/backup_server/register_backup_clienthost.pp index 7580845e0..fc4cc0c1b 100644 --- a/modules/postgres/manifests/backup_server/register_backup_clienthost.pp +++ b/modules/postgres/manifests/backup_server/register_backup_clienthost.pp @@ -1,12 +1,20 @@ # register this host at the backup servers # # This class set up the ssh authorization on the backup servers -# so this client can push WAL segments. -define postgres::backup_server::register_backup_clienthost ( +# so this client can push WAL segments. Furthermore, the +# client will be allowed to read other hosts backups -- specify +# the list of allowed target hosts via params. +# +# @param allow_read_basedir directory under which files can be read +# @param allow_read_hosts subdirectories under base to allow +class postgres::backup_server::register_backup_clienthost ( + String $allow_read_basedir = '/srv/backups/pg', + Array[Stdlib::Fqdn] $allow_read_hosts = [], ) { include postgres::backup_server::globals - $ssh_command = "/usr/local/bin/debbackup-ssh-wrap ${::hostname}" + $allowstr = $allow_read_hosts.map |$host| { "--read-allow=${allow_read_basedir}/${host}" }.join(' ') + $ssh_command = "/usr/local/bin/debbackup-ssh-wrap ${allowstr} ${::hostname}" ssh::authorized_key_add { 'register_backup_clienthost': target_user => $postgres::backup_server::globals::backup_unix_user,