X-Git-Url: https://git.adam-barratt.org.uk/?a=blobdiff_plain;f=modules%2Froles%2Fmanifests%2Fsyncproxy.pp;h=5aa4fde95d5932595e0180ad39c238ca80f4fae3;hb=48908338734a85831696849f15ae9f1019358648;hp=a9789bb25d6c2a3d8e9bc78545fde9ff044203a7;hpb=9902abbedc303e0d0e8a20d743720dc0f785f557;p=mirror%2Fdsa-puppet.git diff --git a/modules/roles/manifests/syncproxy.pp b/modules/roles/manifests/syncproxy.pp index a9789bb25..5aa4fde95 100644 --- a/modules/roles/manifests/syncproxy.pp +++ b/modules/roles/manifests/syncproxy.pp @@ -2,7 +2,7 @@ class roles::syncproxy { $bind = $::hostname ? { 'milanollo' => '5.153.231.9', 'mirror-anu' => '150.203.164.60', - 'mirror-isc' => '149.20.20.21', + 'mirror-isc' => '149.20.4.16', 'mirror-umn' => '128.101.240.216', 'klecker' => '130.89.148.10', default => '' @@ -10,7 +10,7 @@ class roles::syncproxy { $bind6 = $::hostname ? { 'milanollo' => '2001:41c8:1000:21::21:9', 'mirror-anu' => '2001:388:1034:2900::3c', - 'mirror-isc' => '2001:4f8:8:36::1deb:21', + 'mirror-isc' => '2001:4f8:1:c::16', 'mirror-umn' => '2607:ea00:101:3c0b::1deb:216', 'klecker' => '2001:610:1908:b000::148:10', default => '' @@ -24,12 +24,6 @@ class roles::syncproxy { default => 'unknown' } - rsync::site { 'syncproxy': - content => template('roles/syncproxy/rsyncd.conf.erb'), - bind => $bind, - bind6 => $bind6, - } - file { '/etc/rsyncd': ensure => 'directory' } @@ -42,7 +36,10 @@ class roles::syncproxy { if $::apache2 and $syncproxy_name != 'unknown' { include apache2::ssl - ssl::service { "$syncproxy_name": notify => Service['apache2'], key => true, } + ssl::service { "$syncproxy_name": + notify => Exec['service apache2 reload'], + key => true, + } apache2::site { '010-syncproxy.debian.org': site => 'syncproxy.debian.org', content => template('roles/syncproxy/syncproxy.debian.org-apache.erb') @@ -56,40 +53,17 @@ class roles::syncproxy { content => template('roles/syncproxy/syncproxy.debian.org-index.html.erb') } - file { '/etc/rsyncd-syncproxy-stunnel.conf': - content => template('roles/syncproxy/rsyncd-syncproxy-stunnel.conf.erb') - } - xinetd::service { "rsync-syncproxy-ssl": - bind => $bind, - id => "syncproxy-rsync-ssl", - server => '/usr/bin/stunnel4', - service => 'rsync-ssl', - type => 'UNLISTED', - port => '1873', - server_args => "/etc/rsyncd-syncproxy-stunnel.conf", - ferm => false, - instances => 50, - require => File["/etc/rsyncd-syncproxy-stunnel.conf"], + rsync::site { 'syncproxy': + content => template('roles/syncproxy/rsyncd.conf.erb'), + bind => $bind, + bind6 => $bind6, + sslname => "$syncproxy_name", } - - if $bind6 != '' { - xinetd::service { "rsync-syncproxy-ssl6": - bind => $bind6, - id => "syncproxy-rsync-ssl", - server => '/usr/bin/stunnel4', - service => 'rsync-ssl', - type => 'UNLISTED', - port => '1873', - server_args => "/etc/rsyncd-syncproxy-stunnel.conf", - ferm => false, - instances => 50, - require => File["/etc/rsyncd-syncproxy-stunnel.conf"], - } - } - - @ferm::rule { "dsa-rsync-ssl": - description => "Allow traffic to rsync ssl", - rule => "&SERVICE(tcp, 1873)" + } else { + rsync::site { 'syncproxy': + content => template('roles/syncproxy/rsyncd.conf.erb'), + bind => $bind, + bind6 => $bind6, } } }