Skip to content
Snippets Groups Projects
Commit cb5b4345 authored by Mika Perälä's avatar Mika Perälä
Browse files

Merge branch 'devel' into 'test'

Devel

See merge request !38
parents f4890694 e1924de3
No related branches found
No related tags found
2 merge requests!39Test,!38Devel
Pipeline #85073 passed
...@@ -13,14 +13,18 @@ https://github.com/microsoft/vscode-dev-containers/tree/v0.140.1/containers/pupp ...@@ -13,14 +13,18 @@ https://github.com/microsoft/vscode-dev-containers/tree/v0.140.1/containers/pupp
// Set *default* container specific settings.json values on container create. // Set *default* container specific settings.json values on container create.
"settings": { "settings": {
"terminal.integrated.shell.linux": "/bin/bash" "terminal.integrated.profiles.linux": {
"bash": {
"path": "bash",
}
}
}, },
// Add the IDs of extensions you want installed when the container is created. // Add the IDs of extensions you want installed when the container is created.
"extensions": [ "extensions": [
"puppet.puppet-vscode", "puppet.puppet-vscode",
"rebornix.Ruby" "rebornix.Ruby"
] ],
// Use 'forwardPorts' to make a list of ports inside the container available locally. // Use 'forwardPorts' to make a list of ports inside the container available locally.
"forwardPorts": [], "forwardPorts": [],
......
...@@ -4,7 +4,7 @@ require: ...@@ -4,7 +4,7 @@ require:
- rubocop-rspec - rubocop-rspec
AllCops: AllCops:
DisplayCopNames: true DisplayCopNames: true
TargetRubyVersion: '2.4' TargetRubyVersion: '2.5'
Include: Include:
- "**/*.rb" - "**/*.rb"
Exclude: Exclude:
......
...@@ -24,13 +24,14 @@ group :development do ...@@ -24,13 +24,14 @@ group :development do
gem "puppet-module-posix-dev-r#{minor_version}", '~> 1.0', require: false, platforms: [:ruby] gem "puppet-module-posix-dev-r#{minor_version}", '~> 1.0', require: false, platforms: [:ruby]
gem "puppet-module-win-default-r#{minor_version}", '~> 1.0', require: false, platforms: [:mswin, :mingw, :x64_mingw] gem "puppet-module-win-default-r#{minor_version}", '~> 1.0', require: false, platforms: [:mswin, :mingw, :x64_mingw]
gem "puppet-module-win-dev-r#{minor_version}", '~> 1.0', require: false, platforms: [:mswin, :mingw, :x64_mingw] gem "puppet-module-win-dev-r#{minor_version}", '~> 1.0', require: false, platforms: [:mswin, :mingw, :x64_mingw]
gem "puppet-lint-absolute_classname-check", '3.0.1', require: false gem "voxpupuli-puppet-lint-plugins", '>= 3.0', require: false
gem "puppet-lint-absolute_template_path", '1.0.1', require: false gem "puppet-lint-absolute_classname-check", '>= 3.0.1', require: false
gem "puppet-lint-empty_trailing_lines", '0.0.1', require: false gem "puppet-lint-absolute_template_path", '>= 1.0.1', require: false
gem "puppet-lint-file_ensure-check", '1.0.0', require: false gem "puppet-lint-empty_trailing_lines", '>= 0.0.1', require: false
gem "puppet-lint-strict_indent-check", '2.0.8', require: false gem "puppet-lint-file_ensure-check", '>= 1.0.0', require: false
gem "puppet-lint-trailing_comma-check", '0.4.2', require: false gem "puppet-lint-strict_indent-check", '>= 2.0.8', require: false
gem "puppet-lint-unquoted_string-check", '2.1.0', require: false gem "puppet-lint-trailing_comma-check", '>= 0.4.3', require: false
gem "puppet-lint-unquoted_string-check", '>= 2.1.0', require: false
end end
group :system_tests do group :system_tests do
gem "puppet-module-posix-system-r#{minor_version}", '~> 1.0', require: false, platforms: [:ruby] gem "puppet-module-posix-system-r#{minor_version}", '~> 1.0', require: false, platforms: [:ruby]
......
# Class for skadereg firewall
class aim_control::firewall { class aim_control::firewall {
::server_firewall::constricto_chain{ 'skadereg': } ::server_firewall::constricto_chain { 'skadereg': }
::server_firewall::rules_file { '55-permit-skadereg.rules': ::server_firewall::rules_file { '55-permit-skadereg.rules':
content => template("${module_name}/55-permit-skadereg.rules.erb"), content => template("${module_name}/55-permit-skadereg.rules.erb"),
require => ::Server_firewall::Constricto_chain['skadereg'], require => ::Server_firewall::Constricto_chain['skadereg'],
......
...@@ -27,25 +27,24 @@ ...@@ -27,25 +27,24 @@
# #
# Copyright © Linköpings Universitet # Copyright © Linköpings Universitet
# #
class aim_control( class aim_control (
String $mysql_password, String $mysql_password,
String $mysql_backup_password, String $mysql_backup_password,
String $skadereg_ro_password, String $skadereg_ro_password,
String $skadereg_ro_user = 'skadereg_ro', String $skadereg_ro_user = 'skadereg_ro',
){ ) {
users::liu_user { users::liu_user {
'samla949': 'samla949':
commonname => 'Samuel Larsson', commonname => 'Samuel Larsson',
shell => '/bin/bash', shell => '/bin/bash',
sshkey => 'AAAAB3NzaC1yc2EAAAADAQABAAACAQCsWZkkOYsZhOu0Eir+VxajCzWbZ238lrA8w6sbcB2RLJOftfseH4GRHfJaif4g21L4JGuyy7bbJ9JfjUpCG7YTXvo4s7lx0kvp+7+uIhdeugvPsCuMkflih1EkKw2n05OVyhEKU+MPHSaL7QAlSqGewLfLdZpYs9fm6S+Uj/WZRs3I4H77KirA9kSgTnw/3MjoZpU/+0MLD8Uly60D1tCGrgE9qx4SKB0f3zWv+7zw5ZPzDDVO+Sr2X6dvl639S7OE+Hygwkkz03shVrC3STJX/Q/c5f6RZ6/wIMnrEBt3vACR3RGigNO7GLY9uh0tA7/xg62RXdIsoz3Zl1QIn0m25G8GJdE6lWR1zRF/IOXZBjvKJjxYtbIrbWyDfjFq8YmM5KokIEqy2v3bW7hYb4YPrXpLjwaZi8FxgKSn+gHBRMB+vFJaR8fuUNXJdnQXxNl9ohyGec5Hzy5kIVE41Xn8gnvg5XAILCL9X3qVVk70hJ28scNdRkiQbkM11mz0h5s9mEzd74eAPlljzFkNBLAWzO0g4xdsr8QiSo3VQ15dzPyBcndl3yNwhPoGAJ7UApdIq3AZqSouykwGBHovNyHBm2F+orhMl35hBydRy0t/9rJ9czfkUfHT7Wolal0cihi8AvvGS7w3jDjxW//nZ724UcBsJh2ODSBMh0hU7Gx5Cw==', sshkey => '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', # lint:ignore:140chars
client => [ '92.34.191.128' ]; client => ['92.34.191.128'];
'tomla035': 'tomla035':
commonname => 'Tom Larsson', commonname => 'Tom Larsson',
shell => '/bin/bash', shell => '/bin/bash',
sshkey => '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', sshkey => 'AAAAB3NzaC1yc2EAAAADAQABAAACAQDGB+/wkuPKTSY6pGSnuJNWt2vDq0hqwZrcuhtrHRz06gjzk2YbmJ7qxkDrwpicskreaqVzcWAP6VqUbhYREiCr7BB2X3AOSW6pyKH2nqTThfZ58IyfXv0SqJowUDRju+jzPTXxrl78YsoYGY108mYa3HeoG3N1QM6PSpuHskMctFyKa3DB1MkQGeywVx2Nen5dTE3MvU8jnnEDyqLe9FfHHOTGNGoToP6GcMfCxSwPI6PrAbzQcptdLTSDEs7tz8iMXtNaDGP/BgGxKwGWWeuOC1XvLMD0iGTIY/PVPH5owqX2UNT4AulyqRO+K3T2i2+sBg42QtqSBrg1Ih7/1C4yrjvqKqWcc/LQw6t+bu1Gjplahv/aW6QWX95R2eO7tdFfr4fAiOhh7rKOJY95xa8/9yEgO69P2rSf/BSpOP8wwYX8nLg7m8VKOcUfNCFdU6lEbnoGwKjkdn8xmDbswivzW7td0NOHKkUU+kIvMmvEbpDsYBuaJ4xrr3YTSBz7CGmaVaanTB8hxL7J+cN5uMix0My9mVo6iaWAIyDPGGlAZ/vZxAel6rDcOcEBwJXbLxTkI494Vtd0wF6DIvs9jDbGrd0+rnjLtOiyWGVIhI4YusnEj0P6mv7dEDF0kLoxbUHBZpYRK+iypRqp9/WxCGQVCnDJJfRHRowbsFl8Withyw==', # lint:ignore:140chars
client => [ '192.168.0.32' ]; client => ['192.168.0.32'];
} }
file { '/etc/sudoers.d/02-serious_sam' : file { '/etc/sudoers.d/02-serious_sam' :
...@@ -95,11 +94,11 @@ class aim_control( ...@@ -95,11 +94,11 @@ class aim_control(
# before => Service['httpd'], # before => Service['httpd'],
# } # }
include certdist include profiles::letsencrypt
$cert = "/etc/pki/tls/certs/cert-${facts['networking']['fqdn']}.pem" $cert = fact("letsencrypt_certs.\"${fact('networking.fqdn')}\".files.cert")
$chain = "/etc/pki/tls/certs/chain-${facts['networking']['fqdn']}.pem" $chain = fact("letsencrypt_certs.\"${fact('networking.fqdn')}\".files.chain")
$key = "/etc/pki/tls/private/${facts['networking']['fqdn']}.key" $key = fact("letsencrypt_certs.\"${fact('networking.fqdn')}\".files.key")
# apache::vhost { 'default:80': # apache::vhost { 'default:80':
# servername => $facts['networking']['fqdn'], # servername => $facts['networking']['fqdn'],
......
...@@ -61,7 +61,7 @@ ...@@ -61,7 +61,7 @@
"version_requirement": ">= 6.21.0 < 8.0.0" "version_requirement": ">= 6.21.0 < 8.0.0"
} }
], ],
"pdk-version": "2.3.0", "pdk-version": "2.5.0",
"template-url": "https://gitlab.it.liu.se/puppet-infra/pdk-templates.git#liu", "template-url": "https://gitlab.it.liu.se/puppet-infra/pdk-templates.git#liu",
"template-ref": "heads/liu-0-g76c91ed" "template-ref": "heads/liu-0-g3298fb5"
} }
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment