Skip to content
Snippets Groups Projects
Commit ca7e6f7d authored by Klas Arvidsson's avatar Klas Arvidsson
Browse files

Adaptions for RHEL9, corrections, cleanup

parent f7f3d9bb
No related branches found
No related tags found
2 merge requests!50Fix: Puppet Defining "data_provider": "hiera" in metadata.json is deprecated....,!40Merge from devel. Commits related to RHEL9 upgrade and pdk cleanup.
Pipeline #105342 passed
...@@ -131,8 +131,8 @@ always_direct allow all ...@@ -131,8 +131,8 @@ always_direct allow all
ssl_bump server-first all ssl_bump server-first all
# Inititate with: # Inititate with:
# /usr/lib64/squid/ssl_crtd -c -s /var/lib/ssl_db # /usr/lib64/squid/security_file_certgen -c -s /var/lib/ssl_db
sslcrtd_program /usr/lib64/squid/ssl_crtd -s /var/lib/squid/ssl_db -M 4MB sslcrtd_program /usr/lib64/squid/security_file_certgen -s /var/lib/squid/ssl_db -M 4MB
sslcrtd_children 32 startup=5 idle=1 sslcrtd_children 32 startup=5 idle=1
# the following two options are unsafe and not always necessary: # the following two options are unsafe and not always necessary:
......
...@@ -76,6 +76,8 @@ class aes::broker { ...@@ -76,6 +76,8 @@ class aes::broker {
$server_type = 'production' $server_type = 'production'
} elsif $facts[networking][fqdn] == 'aes-devel.edu.liu.se' { } elsif $facts[networking][fqdn] == 'aes-devel.edu.liu.se' {
$server_type = 'devel' $server_type = 'devel'
} elsif $facts[networking][fqdn] == 'aes-sbox.it.liu.se' {
$server_type = 'devel'
} else { } else {
$server_type = undef $server_type = undef
} }
......
...@@ -66,38 +66,17 @@ class aes { ...@@ -66,38 +66,17 @@ class aes {
content => file("${module_name}/anacrontab"), content => file("${module_name}/anacrontab"),
} }
# File for updating repositories. # 2023-10-03: Is this used for anything? What breaks?
# file { '/opt/utils': #
# ensure => directory, # # File containing which environment is used.
# mode => '0755', # file { '/var/puppet_environment' :
# owner => root,
# group => root,
# }
# file { '/opt/utils/update_repo.sh':
# ensure => file, # ensure => file,
# mode => '0755', # mode => '0644',
# owner => root, # owner => root,
# group => root, # group => root,
# content => file("${module_name}/update_repo.sh"), # content => $environment,
# }
# File to easily see when Puppet was last executed.
# Ideally, we would like to know if it is devel or production as well.
# exec { '/usr/bin/touch /var/last_puppet_run' :
# cwd => '/var',
# user => root,
# group => root,
# } # }
# File containing which environment is used.
file { '/var/puppet_environment' :
ensure => file,
mode => '0644',
owner => root,
group => root,
content => $environment,
}
::users::liu_user { 'klaar36': ::users::liu_user { 'klaar36':
commonname => 'Klas Arvidsson', commonname => 'Klas Arvidsson',
shell => '/bin/bash', shell => '/bin/bash',
......
...@@ -13,7 +13,7 @@ class aes::latex { ...@@ -13,7 +13,7 @@ class aes::latex {
'texlive-collection-xetex', 'texlive-collection-xetex',
'texlive-collection-latex', 'texlive-collection-latex',
'texlive-collection-latexrecommended', 'texlive-collection-latexrecommended',
'texlive-xetex-def', # 'texlive-xetex-def', # Not in RHEL9, why is this required? What breaks?
'texlive-tcolorbox', 'texlive-tcolorbox',
'texlive-booktabs', 'texlive-booktabs',
'latexmk', 'latexmk',
......
...@@ -2,6 +2,7 @@ ...@@ -2,6 +2,7 @@
# Describe what this class do! # Describe what this class do!
# #
# Detailed summary info if suitable # Detailed summary info if suitable
# TODO: certificat generation and management
# #
# #
class aes::squid_filter { class aes::squid_filter {
...@@ -28,12 +29,6 @@ class aes::squid_filter { ...@@ -28,12 +29,6 @@ class aes::squid_filter {
family => 'ipv6', family => 'ipv6',
action => 'accept'; action => 'accept';
} }
exec { '/usr/lib64/squid/security_file_certgen -c -s /var/lib/squid/ssl_db -M 4MB':
user => 'squid',
group => 'squid',
creates => '/var/lib/squid/ssl_db',
}
} }
'CentOS': { 'CentOS': {
::server_firewall::rules_file { '45-permit_squid.rules': ::server_firewall::rules_file { '45-permit_squid.rules':
...@@ -48,10 +43,12 @@ class aes::squid_filter { ...@@ -48,10 +43,12 @@ class aes::squid_filter {
# lint:endignore:strict_indent # lint:endignore:strict_indent
} }
exec { '/usr/lib64/squid/ssl_crtd -c -s /var/lib/squid/ssl_db' : # ensure new name exist to match new config file
user => 'squid', file { '/usr/lib64/squid/security_file_certgen':
group => 'squid', ensure => link,
creates => '/var/lib/squid/ssl_db', owner => root,
group => root,
target => '/usr/lib64/squid/ssl_crtd',
} }
} }
default: { default: {
...@@ -113,6 +110,12 @@ class aes::squid_filter { ...@@ -113,6 +110,12 @@ class aes::squid_filter {
group => squid, group => squid,
} }
exec { '/usr/lib64/squid/security_file_certgen -c -s /var/lib/squid/ssl_db -M 4MB' :
user => 'squid',
group => 'squid',
creates => '/var/lib/squid/ssl_db',
}
# todo: logrotate # todo: logrotate
service { 'squid' : service { 'squid' :
ensure => 'running', ensure => 'running',
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment