forked from puppetlabs/puppetlabs-postgresql
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathconfig.pp
262 lines (243 loc) · 12.7 KB
/
config.pp
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
# @summary Manages the config for a postgresql::server instance
#
# @param ip_mask_deny_postgres_user Specifies the IP mask from which remote connections should be denied for the postgres superuser.
# Default value: '0.0.0.0/0', which denies any remote connection.
# @param ip_mask_allow_all_users
# Overrides PostgreSQL defaults for remote connections. By default, PostgreSQL does not allow database user accounts to connect via TCP
# from remote machines. If you'd like to allow this, you can override this setting.
# Set to '0.0.0.0/0' to allow database users to connect from any remote machine, or '192.168.0.0/1' to allow connections from any machine
# on your local '192.168' subnet.
# Default value: '127.0.0.1/32'.
# @param listen_addresses Address list on which the PostgreSQL service will listen
# @param port
# Specifies the port for the PostgreSQL server to listen on.
# Note: The same port number is used for all IP addresses the server listens on. Also, for Red Hat systems and early Debian systems,
# changing the port causes the server to come to a full stop before being able to make the change.
# Default value: 5432. Meaning the Postgres server listens on TCP port 5432.
# @param ipv4acls Lists strings for access control for connection method, users, databases, IPv4 addresses.
# @param ipv6acls Lists strings for access control for connection method, users, databases, IPv6 addresses.
# @param pg_hba_conf_path Specifies the path to your pg_hba.conf file.
# @param pg_ident_conf_path Specifies the path to your pg_ident.conf file.
# @param postgresql_conf_path Specifies the path to your postgresql.conf file.
# @param postgresql_conf_mode Sets the mode of your postgresql.conf file. Only relevant if manage_postgresql_conf_perms is true.
# @param recovery_conf_path Specifies the path to your recovery.conf file.
# @param pg_hba_conf_defaults
# If false, disables the defaults supplied with the module for pg_hba.conf. This is useful if you disagree with the defaults and wish to
# override them yourself. Be sure that your changes of course align with the rest of the module, as some access is required to perform
# basic psql operations for example.
# @param user Overrides the default PostgreSQL super user and owner of PostgreSQL related files in the file system.
# @param group Overrides the default postgres user group to be used for related files in the file system.
# @param version Sets PostgreSQL version
# @param manage_pg_hba_conf Boolean. Whether to manage the pg_hba.conf.
# @param manage_pg_ident_conf Boolean. Overwrites the pg_ident.conf file.
# @param manage_recovery_conf Boolean. Specifies whether or not manage the recovery.conf.
# @param manage_postgresql_conf_perms
# Whether to manage the postgresql conf file permissions. This means owner,
# group and mode. Contents are not managed but should be managed through
# postgresql::server::config_entry.
# @param datadir PostgreSQL data directory
# @param logdir PostgreSQL log directory
# @param service_name Overrides the default PostgreSQL service name.
# @param service_enable Enable the PostgreSQL service
# @param log_line_prefix PostgreSQL log line prefix
# @param timezone Set timezone for the PostgreSQL instance
# @param password_encryption Specify the type of encryption set for the password.
# @param pg_hba_auth_password_encryption
# Specify the type of encryption set for the password in pg_hba_conf,
# this value is usefull if you want to start enforcing scram-sha-256, but give users transition time.
# @param extra_systemd_config
# Adds extra config to systemd config file, can for instance be used to add extra openfiles. This can be a multi line string
# @param manage_selinux Specifies whether or not manage the conf file for selinux.
define postgresql::server::instance::config (
String[1] $ip_mask_deny_postgres_user = $postgresql::server::ip_mask_deny_postgres_user,
String[1] $ip_mask_allow_all_users = $postgresql::server::ip_mask_allow_all_users,
Optional[Variant[String[1], Array[String[1]]]] $listen_addresses = $postgresql::server::listen_addresses,
Stdlib::Port $port = $postgresql::server::port,
Array[String[1]] $ipv4acls = $postgresql::server::ipv4acls,
Array[String[1]] $ipv6acls = $postgresql::server::ipv6acls,
Stdlib::Absolutepath $pg_hba_conf_path = $postgresql::server::pg_hba_conf_path,
Stdlib::Absolutepath $pg_ident_conf_path = $postgresql::server::pg_ident_conf_path,
Stdlib::Absolutepath $postgresql_conf_path = $postgresql::server::postgresql_conf_path,
Optional[Stdlib::Filemode] $postgresql_conf_mode = $postgresql::server::postgresql_conf_mode,
Stdlib::Absolutepath $recovery_conf_path = $postgresql::server::recovery_conf_path,
Boolean $pg_hba_conf_defaults = $postgresql::server::pg_hba_conf_defaults,
String[1] $user = $postgresql::server::user,
String[1] $group = $postgresql::server::group,
Optional[String[1]] $version = $postgresql::server::_version,
Boolean $manage_pg_hba_conf = $postgresql::server::manage_pg_hba_conf,
Boolean $manage_pg_ident_conf = $postgresql::server::manage_pg_ident_conf,
Boolean $manage_recovery_conf = $postgresql::server::manage_recovery_conf,
Boolean $manage_postgresql_conf_perms = $postgresql::server::manage_postgresql_conf_perms,
Stdlib::Absolutepath $datadir = $postgresql::server::datadir,
Optional[Stdlib::Absolutepath] $logdir = $postgresql::server::logdir,
String[1] $service_name = $postgresql::server::service_name,
Boolean $service_enable = $postgresql::server::service_enable,
Optional[String[1]] $log_line_prefix = $postgresql::server::log_line_prefix,
Optional[String[1]] $timezone = $postgresql::server::timezone,
Postgresql::Pg_password_encryption $password_encryption = $postgresql::server::password_encryption,
Optional[Postgresql::Pg_password_encryption] $pg_hba_auth_password_encryption = $postgresql::server::pg_hba_auth_password_encryption,
Optional[String] $extra_systemd_config = $postgresql::server::extra_systemd_config,
Boolean $manage_selinux = $postgresql::server::manage_selinux,
) {
$_pg_hba_auth_password_encryption = pick($pg_hba_auth_password_encryption,$password_encryption)
if ($manage_pg_hba_conf == true) {
# Prepare the main pg_hba file
concat { $pg_hba_conf_path:
owner => $user,
group => $group,
mode => '0640',
warn => true,
notify => Postgresql::Server::Instance::Reload[$name],
}
if $pg_hba_conf_defaults {
Postgresql::Server::Pg_hba_rule {
database => 'all',
target => $pg_hba_conf_path,
user => 'all',
}
postgresql::server::pg_hba_rule {
"local access as postgres user for instance ${name}":
type => 'local',
user => $user,
auth_method => 'ident',
order => 1;
"local access to database with same name for instance ${name}":
type => 'local',
auth_method => 'ident',
order => 2;
"allow localhost TCP access to postgresql user for instance ${name}":
type => 'host',
user => $user,
address => '127.0.0.1/32',
auth_method => $_pg_hba_auth_password_encryption,
order => 3;
"deny access to postgresql user for instance ${name}":
type => 'host',
user => $user,
address => $ip_mask_deny_postgres_user,
auth_method => 'reject',
order => 4;
"allow access to all users for instance ${name}":
type => 'host',
address => $ip_mask_allow_all_users,
auth_method => $_pg_hba_auth_password_encryption,
order => 100;
"allow access to ipv6 localhost for instance ${name}":
type => 'host',
address => '::1/128',
auth_method => $_pg_hba_auth_password_encryption,
order => 101;
}
} else {
Postgresql::Server::Pg_hba_rule {
target => $pg_hba_conf_path,
}
}
# $ipv4acls and $ipv6acls are arrays of rule strings
# They are converted into hashes we can iterate over to create postgresql::server::pg_hba_rule resources.
(
postgresql::postgresql_acls_to_resources_hash($ipv4acls, 'ipv4acls', 10) +
postgresql::postgresql_acls_to_resources_hash($ipv6acls, 'ipv6acls', 102)
).each | String $key, Hash $attrs| {
postgresql::server::pg_hba_rule { $key:
* => $attrs,
}
}
}
# set default postgresql_conf_path here so the path is configurable in instances for
# default values like port or listen_address
Postgresql::Server::Config_entry {
path => $postgresql_conf_path,
}
if $manage_postgresql_conf_perms {
file { $postgresql_conf_path:
ensure => file,
owner => $user,
group => $group,
mode => $postgresql_conf_mode,
}
}
if $listen_addresses {
postgresql::server::config_entry { "listen_addresses_for_instance_${name}":
key => 'listen_addresses',
value => $listen_addresses,
}
}
# ensure that SELinux has a proper label for the port defined
if $manage_selinux and $facts['os']['selinux']['enabled'] {
case $facts['os']['family'] {
'RedHat', 'Linux': {
if $facts['os']['name'] == 'Amazon' {
$package_name = 'policycoreutils'
}
else {
$package_name = $facts['os']['release']['major'] ? {
'6' => 'policycoreutils-python',
'7' => 'policycoreutils-python',
default => 'policycoreutils-python-utils',
}
}
}
default: {
$package_name = 'policycoreutils'
}
}
stdlib::ensure_packages([$package_name])
$exec_command = ['/usr/sbin/semanage', 'port', '-a', '-t', 'postgresql_port_t', '-p', 'tcp', $port]
$exec_unless = "/usr/sbin/semanage port -l | grep -qw ${port}"
exec { "/usr/sbin/semanage port -a -t postgresql_port_t -p tcp ${port}":
command => $exec_command,
unless => $exec_unless,
before => Postgresql::Server::Config_entry["port_for_instance_${name}"],
require => Package[$package_name],
}
}
postgresql::server::config_entry { "port_for_instance_${name}":
key => 'port',
value => $port,
}
if ($password_encryption) and (versioncmp($version, '10') >= 0) {
postgresql::server::config_entry { "password_encryption_for_instance_${name}":
key => 'password_encryption',
value => $password_encryption,
}
}
postgresql::server::config_entry { "data_directory_for_instance_${name}":
key => 'data_directory',
value => $datadir,
}
if $timezone {
postgresql::server::config_entry { "timezone_for_instance_${name}":
key => 'timezone',
value => $timezone,
}
}
if $logdir {
postgresql::server::config_entry { "log_directory_for_instance_${name}":
key => 'log_directory',
value => $logdir,
}
}
# Allow timestamps in log by default
if $log_line_prefix {
postgresql::server::config_entry { "log_line_prefix_for_instance_${name}":
key => 'log_line_prefix',
value => $log_line_prefix,
}
}
if ($manage_pg_ident_conf == true) {
concat { $pg_ident_conf_path:
owner => $user,
group => $group,
mode => '0640',
warn => true,
notify => Postgresql::Server::Instance::Reload[$name],
}
}
postgresql::server::instance::systemd { $name:
port => $port,
datadir => $datadir,
extra_systemd_config => $extra_systemd_config,
service_name => $service_name,
}
}