]> git.donarmstrong.com Git - dsa-puppet.git/blob - manifests/site.pp
add zee,zelenka
[dsa-puppet.git] / manifests / site.pp
1 Package {
2     require => File["/etc/apt/apt.conf.d/local-recommends"]
3 }
4
5 File {
6     owner   => root,
7     group   => root,
8     mode    => 444,
9     ensure  => file,
10 }
11
12 Exec {
13     path => "/usr/bin:/usr/sbin:/bin:/sbin"
14 }
15
16 node default {
17     $localinfo = yamlinfo('*', "/etc/puppet/modules/debian-org/misc/local.yaml")
18     $nodeinfo  = nodeinfo($fqdn, "/etc/puppet/modules/debian-org/misc/local.yaml")
19     $hoster    = whohosts($nodeinfo, "/etc/puppet/modules/debian-org/misc/hoster.yaml")
20     $keyinfo   = allnodeinfo("sshRSAHostKey", "ipHostNumber")
21     notice("hoster for ${fqdn} is ${hoster}")
22
23     $mxinfo   = allnodeinfo("mXRecord")
24
25     include munin-node
26     include sudo
27     include ssh
28     include debian-org
29     include monit
30     include apt-keys
31     include ntp
32     include ssl
33
34     include motd
35
36     case $hostname {
37         finzi,fano,fasch,field:    { include kfreebsd }
38     }
39
40     case $smartarraycontroller {
41         "true":    { include debian-proliant }
42     }
43     case $kvmdomain {
44         "true":    { package { acpid: ensure => installed } }
45     }
46     case $mptraid {
47         "true":    { include "raidmpt" }
48     }
49
50     case $mta {
51         "exim4":   {
52              case extractnodeinfo($nodeinfo, 'heavy_exim') {
53                   'true':  { include exim::mx }
54                   default: { include exim }
55              }
56         }
57     }
58
59     case extractnodeinfo($nodeinfo, 'muninmaster') {
60         true: { include munin-node::master }
61     }
62
63     case extractnodeinfo($nodeinfo, 'nagiosmaster') {
64         true:    { include nagios::server }
65         default: { include nagios::client }
66     }
67
68     case $apache2 {
69          "true":  {
70               case extractnodeinfo($nodeinfo, 'apache2_security_mirror') {
71                      true:    { include apache2::security_mirror }
72                      default: { include apache2 }
73               }
74          }
75     }
76
77     case extractnodeinfo($nodeinfo, 'buildd') {
78          'true':  {
79              include buildd
80              case $kernel {
81                  Linux: {
82                      include ferm
83                  }
84              }
85          }
86     }
87
88     case $hostname {
89         klecker,ravel,senfl,orff: { include named::secondary }
90         geo1,geo2,geo3:           { include named::geodns }
91         bartok,schein,steffani,franck:   { include named::recursor }
92     }
93
94     case $hostname {
95         franck,powell,logtest01,geo1,geo2,geo3,bartok,senfl,beethoven,piatti,saens,villa,lobos,raff,gluck,schein,wieck,steffani,ball,handel,tchaikovsky,heininen,nielsen,kokkonen,kaufmann: { include ferm }
96     }
97
98     case $hostname {agricola,albeniz,gabrielli,zee,zelenka}
99
100     case $hostname {
101         zandonai,zelenka: {
102            @ferm::rule { "dsa-zivit-rrdcollect":
103                description  => "port 6666 for rrdcollect for zivit",
104                rule         => "&SERVICE_RANGE(tcp, 6666, ( 10.130.18.71 ))"
105            }
106            @ferm::rule { "dsa-zivit-zabbix":
107                description  => "port 10050 for zabbix for zivit",
108                rule         => "&SERVICE_RANGE(tcp, 10050, ( 10.130.18.76 ))"
109            }
110         }
111         piatti: {
112            @ferm::rule { "dsa-udd-stunnel":
113                description  => "port 8080 for udd stunnel",
114                rule         => "&SERVICE_RANGE(tcp, http-alt, ( 192.25.206.16 70.103.162.29 217.196.43.134 ))"
115            }
116         }
117         senfl: {
118            @ferm::rule { "dsa-rsync":
119                     domain          => "(ip ip6)",
120                     description     => "Allow rsync access",
121                     rule            => "&SERVICE(tcp, 873)"
122            }
123         }
124         saens,villa,lobos,raff,gluck,schein,wieck,steffani,franck: {
125            @ferm::rule { "dsa-ftp":
126                     domain          => "(ip ip6)",
127                     description     => "Allow ftp access",
128                     rule            => "&SERVICE(tcp, 21)"
129            }
130            @ferm::rule { "dsa-rsync":
131                     domain          => "(ip ip6)",
132                     description     => "Allow rsync access",
133                     rule            => "&SERVICE(tcp, 873)"
134            }
135         }
136         ancina,zelenka: {
137            @ferm::rule { "dsa-time":
138                     description     => "Allow time access",
139                     rule            => "&SERVICE_RANGE(tcp, time, \$HOST_NAGIOS_V4)"
140            }
141         }
142         handel: {
143            @ferm::rule { "dsa-puppet":
144                     description     => "Allow puppet access",
145                     rule            => "&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V4)"
146            }
147            @ferm::rule { "dsa-puppet-v6":
148                     domain          => 'ip6',
149                     description     => "Allow puppet access",
150                     rule            => "&SERVICE_RANGE(tcp, 8140, \$HOST_DEBIAN_V6)"
151            }
152         }
153         powell: {
154            @ferm::rule { "dsa-powell-v6-tunnel":
155                     description     => "Allow powell to use V6 tunnel broker",
156                     rule            => "proto ipv6 saddr 212.227.117.6 jump ACCEPT"
157            }
158            @ferm::rule { "dsa-powell-btseed":
159                     domain          => "(ip ip6)",
160                     description     => "Allow powell to seed BT",
161                     rule            => "proto tcp dport 8000:8100 jump ACCEPT"
162            }
163            @ferm::rule { "dsa-powell-rsync":
164                     description     => "Hoster wants to sync from here, and why not",
165                     rule            => "&SERVICE_RANGE(tcp, rsync, ( 195.20.242.90 192.25.206.33 82.195.75.106 206.12.19.118 ))"
166            }
167         }
168         beethoven: {
169            @ferm::rule { "dsa-merikanto-beethoven":
170                     description     => "Allow merikanto",  # for nfs, and that uses all kind of ports by default.
171                     rule            => "source 172.22.127.147 interface bond0 jump ACCEPT",
172            }
173         }
174         heininen: {
175            @ferm::rule { "dsa-syslog":
176                     description     => "Allow syslog access",
177                     rule            => "&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V4)"
178            }
179            @ferm::rule { "dsa-syslog-v6":
180                     domain          => 'ip6',
181                     description     => "Allow syslog access",
182                     rule            => "&SERVICE_RANGE(tcp, 5140, \$HOST_DEBIAN_V6)"
183            }
184         }
185         kaufmann: {
186            @ferm::rule { "dsa-hkp":
187                     domain          => "(ip ip6)",
188                     description     => "Allow hkp access",
189                     rule            => "&SERVICE(tcp, 11371)"
190            }
191            @ferm::rule { "dsa-rsync":
192                     domain          => "(ip ip6)",
193                     description     => "Allow rsync access",
194                     rule            => "&SERVICE(tcp, 873)"
195            }
196         }
197     }
198     case $brokenhosts {
199         "true":    { include hosts }
200     }
201     case $hoster {
202         "ubcece", "darmstadt", "ftcollins", "grnet":  { include resolv }
203     }
204     case $portforwarder_user_exists {
205         "true":    { include portforwarder }
206     }
207     include samhain
208 }