]> git.donarmstrong.com Git - dsa-puppet.git/blob - manifests/site.pp
fix type, need coffee
[dsa-puppet.git] / manifests / site.pp
1 Package {
2     require => File["/etc/apt/apt.conf.d/local-recommends"]
3 }
4
5 File {
6     owner   => root,
7     group   => root,
8     mode    => 444,
9     ensure  => file,
10 }
11
12 Exec {
13     path => "/usr/bin:/usr/sbin:/bin:/sbin"
14 }
15
16 node default {
17     $localinfo = yamlinfo('*', "/etc/puppet/modules/debian-org/misc/local.yaml")
18     $nodeinfo  = nodeinfo($fqdn, "/etc/puppet/modules/debian-org/misc/local.yaml")
19     $hoster    = whohosts($nodeinfo, "/etc/puppet/modules/debian-org/misc/hoster.yaml")
20     $keyinfo   = allnodeinfo("sshRSAHostKey", "ipHostNumber")
21     notice("hoster for ${fqdn} is ${hoster}")
22
23     $mxinfo   = allnodeinfo("mXRecord")
24
25     include munin-node
26     include sudo
27     include ssh
28     include debian-org
29     include monit
30     include apt-keys
31     include ntp
32     include ssl
33
34     include motd
35
36     case $hostname {
37         finzi,fano,fasch,field:    { include kfreebsd }
38     }
39
40     case $smartarraycontroller {
41         "true":    { include debian-proliant }
42     }
43     case $kvmdomain {
44         "true":    { package { acpid: ensure => installed } }
45     }
46     case $mptraid {
47         "true":    { include "raidmpt" }
48     }
49
50     case $mta {
51         "exim4":   {
52              case extractnodeinfo($nodeinfo, 'heavy_exim') {
53                   'true':  { include exim::mx }
54                   default: { include exim }
55              }
56         }
57     }
58
59     case extractnodeinfo($nodeinfo, 'muninmaster') {
60         true: { include munin-node::master }
61     }
62
63     case extractnodeinfo($nodeinfo, 'nagiosmaster') {
64         true:    { include nagios::server }
65         default: { include nagios::client }
66     }
67
68     case $apache2 {
69          "true":  {
70               case extractnodeinfo($nodeinfo, 'apache2_security_mirror') {
71                      true:    { include apache2::security_mirror }
72                      default: { include apache2 }
73               }
74          }
75     }
76
77     case extractnodeinfo($nodeinfo, 'buildd') {
78          'true':  {
79              include buildd
80              case $kernel {
81                  Linux: {
82                      include ferm
83                  }
84              }
85          }
86     }
87
88     case $hostname {
89         klecker,ravel,senfl,orff: { include named::secondary }
90         geo1,geo2,geo3:           { include named::geodns }
91         bartok,schein,steffani,franck:   { include named::recursor }
92     }
93
94     case $hostname {
95         franck,powell,logtest01,geo1,geo2,geo3,bartok,senfl,beethoven,piatti,saens,villa,lobos,raff,gluck,schein,wieck,steffani,ball,handel,tchaikovsky,heininen,nielsen,kokkonen,kaufmann: { include ferm }
96     }
97
98     case $hostname {
99         agricola,albeniz,gabrielli,zee,zelenka: { include ferm }
100     }
101
102     case $hostname {
103         zandonai,zelenka: {
104            @ferm::rule { "dsa-zivit-rrdcollect":
105                description  => "port 6666 for rrdcollect for zivit",
106                rule         => "&SERVICE_RANGE(tcp, 6666, ( 10.130.18.71 ))"
107            }
108            @ferm::rule { "dsa-zivit-zabbix":
109                description  => "port 10050 for zabbix for zivit",
110                rule         => "&SERVICE_RANGE(tcp, 10050, ( 10.130.18.76 ))"
111            }
112         }
113         piatti: {
114            @ferm::rule { "dsa-udd-stunnel":
115                description  => "port 8080 for udd stunnel",
116                rule         => "&SERVICE_RANGE(tcp, http-alt, ( 192.25.206.16 70.103.162.29 217.196.43.134 ))"
117            }
118         }
119         senfl: {
120            @ferm::rule { "dsa-rsync":
121                     domain          => "(ip ip6)",
122                     description     => "Allow rsync access",
123                     rule            => "&SERVICE(tcp, 873)"
124            }
125         }
126         saens,villa,lobos,raff,gluck,schein,wieck,steffani,franck: {
127            @ferm::rule { "dsa-ftp":
128                     domain          => "(ip ip6)",
129                     description     => "Allow ftp access",
130                     rule            => "&SERVICE(tcp, 21)"
131            }
132            @ferm::rule { "dsa-rsync":
133                     domain          => "(ip ip6)",
134                     description     => "Allow rsync access",
135                     rule            => "&SERVICE(tcp, 873)"
136            }
137         }
138         ancina,zelenka: {
139            @ferm::rule { "dsa-time":
140                     description     => "Allow time access",
141                     rule            => "&SERVICE_RANGE(tcp, time, \$HOST_NAGIOS_V4)"
142            }
143         }
144         handel: {
145            @ferm::rule { "dsa-puppet":
146                     description     => "Allow puppet access",
147                     rule            => "&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V4)"
148            }
149            @ferm::rule { "dsa-puppet-v6":
150                     domain          => 'ip6',
151                     description     => "Allow puppet access",
152                     rule            => "&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V6)"
153            }
154         }
155         powell: {
156            @ferm::rule { "dsa-powell-v6-tunnel":
157                     description     => "Allow powell to use V6 tunnel broker",
158                     rule            => "proto ipv6 saddr 212.227.117.6 jump ACCEPT"
159            }
160            @ferm::rule { "dsa-powell-btseed":
161                     domain          => "(ip ip6)",
162                     description     => "Allow powell to seed BT",
163                     rule            => "proto tcp dport 8000:8100 jump ACCEPT"
164            }
165            @ferm::rule { "dsa-powell-rsync":
166                     description     => "Hoster wants to sync from here, and why not",
167                     rule            => "&SERVICE_RANGE(tcp, rsync, ( 195.20.242.90 192.25.206.33 82.195.75.106 206.12.19.118 ))"
168            }
169         }
170         beethoven: {
171            @ferm::rule { "dsa-merikanto-beethoven":
172                     description     => "Allow merikanto",  # for nfs, and that uses all kind of ports by default.
173                     rule            => "source 172.22.127.147 interface bond0 jump ACCEPT",
174            }
175         }
176         heininen: {
177            @ferm::rule { "dsa-syslog":
178                     description     => "Allow syslog access",
179                     rule            => "&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V4)"
180            }
181            @ferm::rule { "dsa-syslog-v6":
182                     domain          => 'ip6',
183                     description     => "Allow syslog access",
184                     rule            => "&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V6)"
185            }
186         }
187         kaufmann: {
188            @ferm::rule { "dsa-hkp":
189                     domain          => "(ip ip6)",
190                     description     => "Allow hkp access",
191                     rule            => "&SERVICE(tcp, 11371)"
192            }
193            @ferm::rule { "dsa-rsync":
194                     domain          => "(ip ip6)",
195                     description     => "Allow rsync access",
196                     rule            => "&SERVICE(tcp, 873)"
197            }
198         }
199     }
200     case $brokenhosts {
201         "true":    { include hosts }
202     }
203     case $hoster {
204         "ubcece", "darmstadt", "ftcollins", "grnet":  { include resolv }
205     }
206     case $portforwarder_user_exists {
207         "true":    { include portforwarder }
208     }
209     include samhain
210 }