Skip to content

Commit

Permalink
Allow crafternodes db access
Browse files Browse the repository at this point in the history
  • Loading branch information
storax committed Jul 31, 2015
1 parent 6ee9986 commit 046957c
Show file tree
Hide file tree
Showing 4 changed files with 747 additions and 12 deletions.
25 changes: 14 additions & 11 deletions masterserver.yml
Original file line number Diff line number Diff line change
@@ -1,7 +1,10 @@
---

# Add crafternodes to hosts but disable all roles
# This is necessary for gathering facts
# So we can set allow crafternodes to access the db
- name: Create RayCrafter master server
hosts: masterservers
hosts: [crafternodes, masterservers]
sudo: yes
sudo_user: root
remote_user: vagrant
Expand All @@ -10,13 +13,13 @@
- env_vars/base.yml
- env_vars/masterserver.yml
roles:
- supervisor
- jdauphant.ssl-certs
- jdauphant.nginx
- f500.elasticsearch
- graylog2.graylog
- db
- rabbitmq
- gunicorn
- web
- graylog
- {role: supervisor, when: "'masterservers' in group_names"}
- {role: jdauphant.ssl-certs, when: "'masterservers' in group_names"}
- {role: jdauphant.nginx, when: "'masterservers' in group_names"}
- {role: f500.elasticsearch, when: "'masterservers' in group_names"}
- {role: graylog2.graylog, when: "'masterservers' in group_names"}
- {role: db, when: "'masterservers' in group_names"}
- {role: rabbitmq, when: "'masterservers' in group_names"}
- {role: gunicorn, when: "'masterservers' in group_names"}
- {role: web, when: "'masterservers' in group_names"}
- {role: graylog, when: "'masterservers' in group_names"}
32 changes: 31 additions & 1 deletion roles/db/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -40,4 +40,34 @@
postgresql_user: name={{ db_user }}
role_attr_flags=NOSUPERUSER,NOCREATEDB
state=present
tags: postgres
tags: postgres

- name: Get pg_hba.conf path
command: psql -t -P format=unaligned -c 'show hba_file'
register: hba_file
sudo_user: postgres
tags:
- postgres
changed_when: False

- name: Get config file path
command: psql -t -P format=unaligned -c 'show config_file'
register: config_file
sudo_user: postgres
tags:
- postgres
changed_when: False

- name: Allow crafternodes access in hba config
template: src=pg_hba.conf.j2
dest="{{ hba_file['stdout'] }}"
notify: restart postgresql
tags:
- postgres

- name: Listen to crafternodes adresses
template: src=postgresql.conf.j2
dest="{{ config_file['stdout'] }}"
notify: restart postgresql
tags:
- postgres
105 changes: 105 additions & 0 deletions roles/db/templates/pg_hba.conf.j2
Original file line number Diff line number Diff line change
@@ -0,0 +1,105 @@
# PostgreSQL Client Authentication Configuration File
# ===================================================
#
# Refer to the "Client Authentication" section in the PostgreSQL
# documentation for a complete description of this file. A short
# synopsis follows.
#
# This file controls: which hosts are allowed to connect, how clients
# are authenticated, which PostgreSQL user names they can use, which
# databases they can access. Records take one of these forms:
#
# local DATABASE USER METHOD [OPTIONS]
# host DATABASE USER ADDRESS METHOD [OPTIONS]
# hostssl DATABASE USER ADDRESS METHOD [OPTIONS]
# hostnossl DATABASE USER ADDRESS METHOD [OPTIONS]
#
# (The uppercase items must be replaced by actual values.)
#
# The first field is the connection type: "local" is a Unix-domain
# socket, "host" is either a plain or SSL-encrypted TCP/IP socket,
# "hostssl" is an SSL-encrypted TCP/IP socket, and "hostnossl" is a
# plain TCP/IP socket.
#
# DATABASE can be "all", "sameuser", "samerole", "replication", a
# database name, or a comma-separated list thereof. The "all"
# keyword does not match "replication". Access to replication
# must be enabled in a separate record (see example below).
#
# USER can be "all", a user name, a group name prefixed with "+", or a
# comma-separated list thereof. In both the DATABASE and USER fields
# you can also write a file name prefixed with "@" to include names
# from a separate file.
#
# ADDRESS specifies the set of hosts the record matches. It can be a
# host name, or it is made up of an IP address and a CIDR mask that is
# an integer (between 0 and 32 (IPv4) or 128 (IPv6) inclusive) that
# specifies the number of significant bits in the mask. A host name
# that starts with a dot (.) matches a suffix of the actual host name.
# Alternatively, you can write an IP address and netmask in separate
# columns to specify the set of hosts. Instead of a CIDR-address, you
# can write "samehost" to match any of the server's own IP addresses,
# or "samenet" to match any address in any subnet that the server is
# directly connected to.
#
# METHOD can be "trust", "reject", "md5", "password", "gss", "sspi",
# "krb5", "ident", "peer", "pam", "ldap", "radius" or "cert". Note that
# "password" sends passwords in clear text; "md5" is preferred since
# it sends encrypted passwords.
#
# OPTIONS are a set of options for the authentication in the format
# NAME=VALUE. The available options depend on the different
# authentication methods -- refer to the "Client Authentication"
# section in the documentation for a list of which options are
# available for which authentication methods.
#
# Database and user names containing spaces, commas, quotes and other
# special characters must be quoted. Quoting one of the keywords
# "all", "sameuser", "samerole" or "replication" makes the name lose
# its special character, and just match a database or username with
# that name.
#
# This file is read on server startup and when the postmaster receives
# a SIGHUP signal. If you edit the file on a running system, you have
# to SIGHUP the postmaster for the changes to take effect. You can
# use "pg_ctl reload" to do that.

# Put your actual configuration here
# ----------------------------------
#
# If you want to allow non-local connections, you need to add more
# "host" records. In that case you will also need to make PostgreSQL
# listen on a non-local interface via the listen_addresses
# configuration parameter, or via the -i or -h command line switches.




# DO NOT DISABLE!
# If you change this first entry you will need to make sure that the
# database superuser can access the database using some other method.
# Noninteractive access to all databases is required during automatic
# maintenance (custom daily cronjobs, replication, and similar tasks).
#
# Database administrative login by Unix domain socket
local all postgres peer

# TYPE DATABASE USER ADDRESS METHOD

# "local" is for Unix domain socket connections only
local all all peer
# IPv4 local connections:
host all all 127.0.0.1/32 md5
# IPv6 local connections:
host all all ::1/128 md5
# Allow replication connections from localhost, by a user with the
# replication privilege.
#local replication postgres peer
#host replication postgres 127.0.0.1/32 md5
#host replication postgres ::1/128 md5

# {{ ansible_managed }}
# Crafternodes
{% for name in groups['crafternodes']%}
host all all {{ hostvars[name].get('ansible_eth1', hostvars[name]['ansible_eth0'])['ipv4']['address'] }}/32 md5
{% endfor %}
Loading

0 comments on commit 046957c

Please sign in to comment.