X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=modules%2Fpostgres%2Fmanifests%2Fbackup_server.pp;h=bf8efa04210dd3411f76dcd154d085e2c9d56aaa;hb=1dee729d00307f93d600b5bb6902494bd30a4484;hp=1f95f3eb8ecfc253c40003e7f6d28c442ccd5040;hpb=06b5ef2cf5af685b2e35f80bc108e0d5d21b0add;p=mirror%2Fdsa-puppet.git diff --git a/modules/postgres/manifests/backup_server.pp b/modules/postgres/manifests/backup_server.pp index 1f95f3eb8..bf8efa042 100644 --- a/modules/postgres/manifests/backup_server.pp +++ b/modules/postgres/manifests/backup_server.pp @@ -1,7 +1,9 @@ -# +# postgres backup server class postgres::backup_server { include postgres::backup_server::globals + $make_base_backups = '/usr/local/bin/postgres-make-base-backups' + ensure_packages ( [ 'libhash-merge-simple-perl', 'libyaml-perl', @@ -21,19 +23,19 @@ class postgres::backup_server { } Concat::Fragment <<| tag == $postgres::backup_server::globals::tag_base_backup |>> - file { $postgres::backup_server::globals::make_base_backups: + file { $make_base_backups: mode => '0555', content => template('postgres/backup_server/postgres-make-base-backups.erb'), } file { '/var/lib/dsa/postgres-make-base-backups': ensure => directory, - owner => 'debbackup', + owner => $postgres::backup_server::globals::backup_unix_user, mode => '0755', } concat::fragment { 'puppet-crontab--postgres-make_base_backups': target => '/etc/cron.d/puppet-crontab', content => @("EOF") - */30 * * * * debbackup sleep $(( RANDOM \% 1200 )); chronic ${$postgres::backup_server::globals::make_base_backups} + */30 * * * * ${postgres::backup_server::globals::backup_unix_user} sleep $(( RANDOM \% 1200 )); chronic ${make_base_backups} | EOF } @@ -42,54 +44,38 @@ class postgres::backup_server { # # do not let other hosts directly build our authorized_keys file, # instead go via a script that somewhat validates intput - file { '/etc/dsa/postgresql-backup': - ensure => 'directory', - } - file { '/usr/local/bin/postgres-make-backup-sshauthkeys': - content => template('postgres/backup_server/postgres-make-backup-sshauthkeys.erb'), - mode => '0555', - notify => Exec['postgres-make-backup-sshauthkeys'], + file { '/usr/local/bin/debbackup-ssh-wrap': + source => 'puppet:///modules/postgres/backup_server/debbackup-ssh-wrap', + mode => '0555' } file { '/usr/local/bin/postgres-make-one-base-backup': source => 'puppet:///modules/postgres/backup_server/postgres-make-one-base-backup', mode => '0555' } - file { '/etc/dsa/postgresql-backup/sshkeys-manual': - content => template('postgres/backup_server/sshkeys-manual.erb'), - notify => Exec['postgres-make-backup-sshauthkeys'], - } - concat { $postgres::backup_server::globals::sshkeys_sources: - notify => Exec['postgres-make-backup-sshauthkeys'], - } - concat::fragment { 'postgresql-backup/source-sshkeys-header': - target => $postgres::backup_server::globals::sshkeys_sources , - content => @(EOF), - # - | EOF - order => '00', - } - Concat::Fragment <<| tag == $postgres::backup_server::globals::tag_source_sshkey |>> - exec { 'postgres-make-backup-sshauthkeys': - command => '/usr/local/bin/postgres-make-backup-sshauthkeys', - refreshonly => true, + ssh::authorized_key_collect { 'postgres::backup_server': + target_user => $postgres::backup_server::globals::backup_unix_user, + collect_tag => $postgres::backup_server::globals::tag_source_sshkey, } #### # Maintain /etc/nagios/dsa-check-backuppg.conf # + file { '/etc/dsa/postgresql-backup': + ensure => 'directory', + } file { '/etc/dsa/postgresql-backup/dsa-check-backuppg.conf.d': ensure => 'directory', purge => true, force => true, recurse => true, - notify => Exec['update dsa-check-backuppg-manual.conf'], + notify => Exec['update dsa-check-backuppg.conf'], } - file { '/etc/dsa/postgresql-backup/dsa-check-backuppg.conf.d/manual.conf': - content => template('postgres/backup_server/dsa-check-backuppg-manual.conf.erb'), - notify => Exec['update dsa-check-backuppg-manual.conf'] + file { '/etc/dsa/postgresql-backup/dsa-check-backuppg.conf.d/globals.conf': + content => template('postgres/backup_server/dsa-check-backuppg-globals.conf.erb'), + notify => Exec['update dsa-check-backuppg.conf'] } File<<| tag == $postgres::backup_server::globals::tag_dsa_check_backupp |>> - exec { 'update dsa-check-backuppg-manual.conf': + exec { 'update dsa-check-backuppg.conf': command => @(EOF), perl -MYAML=LoadFile,Dump -MHash::Merge::Simple=merge -E 'say Dump(merge(map{LoadFile($_)}@ARGV))' /etc/dsa/postgresql-backup/dsa-check-backuppg.conf.d/*.conf > /etc/nagios/dsa-check-backuppg.conf | EOF @@ -97,18 +83,19 @@ class postgres::backup_server { refreshonly => true, } + file { '/etc/sudoers.d/backup-server': + mode => '0440', + content => template('postgres/backup_server/sudoers.erb'), + } + + #### # Maintain .pgpass file on backup servers # # concat { $postgres::backup_server::globals::pgpassfile: - owner => 'debbackup', - group => 'debbackup', + owner => $postgres::backup_server::globals::backup_unix_user, + group => $postgres::backup_server::globals::backup_unix_group, mode => '0400' } - concat::fragment{ 'pgpass-local': - target => $postgres::backup_server::globals::pgpassfile, - source => '/home/debbackup/.pgpass-local', - order => '00' - } Concat::Fragment <<| tag == $postgres::backup_server::globals::tag_source_pgpassline |>> }