Saltstack Official Linux Formula
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

334 lines
10KB

  1. linux:
  2. system:
  3. enabled: true
  4. cluster: default
  5. name: linux
  6. domain: local
  7. environment: prd
  8. hostname: system.pillar.local
  9. purge_repos: true
  10. apparmor:
  11. enabled: false
  12. haveged:
  13. enabled: true
  14. prompt:
  15. default: "linux.ci.local$"
  16. kernel:
  17. isolcpu: 1,2,3,4
  18. motd:
  19. - warning: |
  20. #!/bin/sh
  21. printf "WARNING: This is tcpcloud network.\n"
  22. printf " Unauthorized access is strictly prohibited.\n"
  23. printf "\n"
  24. - info: |
  25. #!/bin/sh
  26. printf -- "--[tcp cloud]---------------------------\n"
  27. printf " Hostname | ${linux:system:name}\n"
  28. printf " Domain | ${linux:system:domain}\n"
  29. printf " System | %s\n" "$(lsb_release -s -d)"
  30. printf " Kernel | %s\n" "$(uname -r)"
  31. printf -- "----------------------------------------\n"
  32. printf "\n"
  33. user:
  34. root:
  35. enabled: true
  36. home: /root
  37. name: root
  38. test:
  39. enabled: true
  40. name: test
  41. sudo: true
  42. uid: 9999
  43. full_name: Test User
  44. home: /home/test
  45. groups:
  46. - db-ops
  47. - salt-ops
  48. salt_user1:
  49. enabled: true
  50. name: saltuser1
  51. sudo: false
  52. uid: 9991
  53. full_name: Salt User1
  54. home: /home/saltuser1
  55. salt_user2:
  56. enabled: true
  57. name: saltuser2
  58. sudo: false
  59. uid: 9992
  60. full_name: Salt Sudo User2
  61. home: /home/saltuser2
  62. groups:
  63. - sudogroup1
  64. group:
  65. test:
  66. enabled: true
  67. name: test
  68. gid: 9999
  69. system: true
  70. db-ops:
  71. enabled: true
  72. salt-ops:
  73. enabled: true
  74. name: salt-ops
  75. sudogroup1:
  76. enabled: true
  77. name: sudogroup1
  78. sudogroup2:
  79. enabled: true
  80. name: sudogroup2
  81. sudogroup3:
  82. enabled: false
  83. name: sudogroup3
  84. job:
  85. test:
  86. enabled: true
  87. command: "/bin/sleep 3"
  88. user: test
  89. minute: 0
  90. hour: 13
  91. package:
  92. htop:
  93. version: latest
  94. repo:
  95. opencontrail:
  96. source: "deb http://ppa.launchpad.net/tcpcloud/contrail-3.0/ubuntu xenial main"
  97. keyid: E79EE90C
  98. keyserver: keyserver.ubuntu.com
  99. architectures: amd64
  100. proxy:
  101. enabled: true
  102. https: https://127.0.5.1:443
  103. #http: http://127.0.5.2:8080
  104. apt-mk-salt:
  105. source: "deb http://apt-mk.mirantis.com/xenial stable salt"
  106. #key_url: http://apt-mk.mirantis.com/public.gpg
  107. key: |
  108. -----BEGIN PGP PUBLIC KEY BLOCK-----
  109. Version: GnuPG v1
  110. mQINBFWBfCIBEADf6lnsY9v4rf/x0ribkFlnHnsv1/yD+M+YgZoQxYdf6b7M4/PY
  111. zZ/c3uJt4l1vR3Yoocfc1VgtBNfA1ussBqXdmyRBMO1LKdQWnurNxWLW7CwcyNke
  112. xeBfhjOqA6tIIXMfor7uUrwlIxJIxK+jc3C3nhM46QZpWX5d4mlkgxKh1G4ZRj4A
  113. mEo2NduLUgfmF+gM1MmAbU8ekzciKet4TsM64WAtHyYllGKvuFSdBjsewO3McuhR
  114. i1Desb5QdfIU4p3gkIa0EqlkkqX4rowo5qUnl670TNTTZHaz0MxCBoYaGbGhS7gZ
  115. 6/PLm8fJHmU/phst/QmOY76a5efZWbhhnlyYLIB8UjywN+VDqwkNk9jLUSXHTakh
  116. dnL4OuGoNpIzms8juVFlnuOmx+FcfbHMbhAc7aPqFK+6J3YS4kJSfeHWJ6cTGoU1
  117. cLWEhsbU3Gp8am5fnh72RJ7v2sTe/rvCuVtlNufi5SyBPcEUZoxFVWAC/hMeiWzy
  118. drBIVC73raf+A+OjH8op9XfkVj6czxQ/451soe3jvCDGgTXPLlts+P5WhgWNpDPa
  119. fOfTHn/2o7NwoM7Vp+BQYKAQ78phsolvNNhf+g51ntoLUbxAGKZYzQ5RPsKo+Hq6
  120. 96UCFkqhSABk0DvM0LtquzZ+sNoipd02w8EaxQzelDJxvPFGigo1uqGoiQARAQAB
  121. tCx0Y3BjbG91ZCBzaWduaW5nIGtleSA8YXV0b2J1aWxkQHRjcGNsb3VkLmV1PokC
  122. OwQTAQIAJQIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AFAlWj4K8CGQEACgkQ
  123. JACFCadogtPm9xAAl1D1RUY1mttjKk+8KI3tUmgtqLaIGUcB4TPbIhQpFy23TJd6
  124. BnnEaGZ+HSCj3lp/dBoq1xxCqHCziKA04IpPaLpGJf8cqaKOpQpW1ErlSxT6nCQW
  125. FrHFxZreBTljKqW3fvRBXNAquj0krJEwv19/3SsQ+CJI2Zkq/HPDw9eJOCu0WcJM
  126. PVtAq2SmaDigh1jtFcFoWZ7uFFMQPIWit/RCPkDfkFaf6lbYZ/nnvWON9OAgzWci
  127. GJjCp5a7vMyCpTRy6bgNPqM61omCe0iQ4yIcqANXhRYS/DBnjKr9YaDKnlKNUgd1
  128. WRE8QzErQznH/plgISQ+df+8Iunp3SBr/jj1604yyM1Wxppn1+dAoTBU1OPFGVd3
  129. mCEYHUe+v0iTZ69C2c1ISmp2MjciGyE/UPbW9ejUIXtFJAJovZjn6P3glyIQB3wq
  130. AW6JE+xEBWH7Ix+Uv6YNAFfj3UO6vNjtuGbTCWYDCEJRkdmeE7QdTYDo7PxgPl1t
  131. 6xMGPLOBdYNJTEojvRYBTt+6iw0eZ+MCUdUFNeaseQh0p1RgqM9/7t75QCNLl1oO
  132. +Cfu4vNef/Tpd3LHcUoQhQ2OViOVFbq1/Yu/natWDPDcXb3peTcNHOjmXAoboWbz
  133. rDkxj5z7vcJ9LMEXviP6Fb/iXDmJh74/o6Agc8efb0WTmFjPFFtMCHrinb+5Ag0E
  134. VYF8IgEQALUVS2GESQ+F1S4b0JIO1M2tVBXiH4N56eUzcDXxXbSZgCgx4aWhk5vJ
  135. Qu7M11gtqIoiRbmuFpUmDOG/kB7DxBZPn8WqcBKpky6GUP/A/emaAZTwNQdcDAhD
  136. foBkJdhVz0D2jnkBffYL055p/r1Ers+iTTNOas/0uc50C32xR823rQ2Nl6/ffIM6
  137. JqfQenhRvqUWPj9oqESHMsqEdceSwS/VC7RN4xQXJXfEWu2q4Ahs62RmvCXnTw1A
  138. sPcpysoBoo8IW+V1MVQEZuAJRn2AGO/Q7uY9TR4guHb3wXRfZ3k0KVUsyqqdusJi
  139. T3DxxBw6GcKdOH6t41Ys3eYgOrc+RcSdcHYSpxaLvEIhwzarZ+mqcp3gz/JkPlXS
  140. 2tx2l6NZHcgReOM7IhqMuxzBbpcrsbBmLBemC+u7hoPTjUdTHKEwvWaeXL4vgsqQ
  141. BbEeKmXep5sZg3kHtpXzY9ZfPQrtGB8vHGrfaZIcCKuXwZWGL5GGWKw3TSP4fAIA
  142. jLxLf5MyyXcsugbai2OY/H4sAuvJHsmGtergGknuR+iFdt5el1wgRKP1r1KdmvMm
  143. wsSayc6eSEKd689x3zsmAtnhYM31oMkPdeYRbnN15gLG7vcsVe4jug0YTqQt2WGn
  144. hwjBA0i2qfTorXemWChsxKllvY9aB3ST8I6RMat0kS08FMD+Ced/ABEBAAGJAh8E
  145. GAECAAkFAlWBfCICGwwACgkQJACFCadogtNicA/9HOM402VGHlmuYPcrvEThHqMK
  146. KOTtNFsrrPp67dGYaT8TGTgy1OG4Oys2y+hrwqnUK6dXJxX2/RBfRuO/gw65RCfC
  147. 9nWeMkqJTjHJCKNTYfXN4O4ag444UZPcOMq+IyiWF3/sh674zCkCm5DQ/FH8IJ8Y
  148. n4jMoxe7G48PCGtgcJKXo8NBzxwXJH4DCdk7rNdrbrnCwObG8h6530WrmzKuyFCJ
  149. QP5JA0MSx23J2OrK2YmVMhTeO0czJ8fRip9We9/qAfZGUEW+sey+nLmT5OJq04al
  150. Va9g2a4nXxzDy84+hRXQNUeCRYn/ys8d8q9HZNv3K36HlILcuWazNTTh0cuWupBd
  151. SlIEuWbIdbknYpGsmS1cPeGi0bdoLZv90BIVmdOS/vXP02fGUblyANciKcBPRhOI
  152. +z6hzwdZ+QvjPbxZUig5XuvqBhIHoRtMBJdf24ysFuf/d4uZzTC8T4rUQO+L29bt
  153. 8riT0dg6cHVwC0VH89FaO1FduvsCtAwdAgxSzOMBECNOmVBThIiWdLnns107Rp4F
  154. ECk+l2UCjl7zwGqJqcd1BQK+UgZwVG2UV11CrhopKU5oGL84n5DaO2n6Rv8wVdrt
  155. MKvqi7EkgvZpY0IHJ7rp0Gzrv0qmwJaUFCWFogITNyijb1JVsUgDTMhAkEgEsIYy
  156. jtcwJrHue5Xn8UPSLkE=
  157. =SWiA
  158. -----END PGP PUBLIC KEY BLOCK-----
  159. architectures: amd64
  160. proxy:
  161. enabled: true
  162. apt-mk-salt-nightly:
  163. source: "deb http://apt-mk.mirantis.com/xenial nightly salt"
  164. key_url: http://apt-mk.mirantis.com/public.gpg
  165. architectures: amd64
  166. proxy:
  167. enabled: false
  168. apt-mk-extra-nightly:
  169. source: "deb http://apt-mk.mirantis.com/xenial nightly extra"
  170. key_url: http://apt-mk.mirantis.com/public.gpg
  171. architectures: amd64
  172. locale:
  173. en_US.UTF-8:
  174. enabled: true
  175. default: true
  176. "cs_CZ.UTF-8 UTF-8":
  177. enabled: true
  178. autoupdates:
  179. enabled: true
  180. sudo:
  181. enabled: true
  182. alias:
  183. runas:
  184. DBA:
  185. - postgres
  186. - mysql
  187. SALT:
  188. - root
  189. host:
  190. LOCAL:
  191. - localhost
  192. PRODUCTION:
  193. - db1
  194. - db2
  195. command:
  196. SUDO_RESTRICTED_SU:
  197. - /bin/vi /etc/sudoers
  198. - /bin/su - root
  199. - /bin/su -
  200. - /bin/su
  201. - /usr/sbin/visudo
  202. SUDO_SHELLS:
  203. - /bin/sh
  204. - /bin/ksh
  205. - /bin/bash
  206. - /bin/rbash
  207. - /bin/dash
  208. - /bin/zsh
  209. - /bin/csh
  210. - /bin/fish
  211. - /bin/tcsh
  212. - /usr/bin/login
  213. - /usr/bin/su
  214. - /usr/su
  215. SUDO_SALT_SAFE:
  216. - /usr/bin/salt state*
  217. - /usr/bin/salt service*
  218. - /usr/bin/salt pillar*
  219. - /usr/bin/salt grains*
  220. - /usr/bin/salt saltutil*
  221. - /usr/bin/salt-call state*
  222. - /usr/bin/salt-call service*
  223. - /usr/bin/salt-call pillar*
  224. - /usr/bin/salt-call grains*
  225. - /usr/bin/salt-call saltutil*
  226. SUDO_SALT_TRUSTED:
  227. - /usr/bin/salt*
  228. users:
  229. saltuser1: {}
  230. saltuser2:
  231. hosts:
  232. - LOCAL
  233. # User Alias:
  234. DBA:
  235. hosts:
  236. - ALL
  237. commands:
  238. - SUDO_SALT_SAFE
  239. groups:
  240. db-ops:
  241. hosts:
  242. - ALL
  243. - '!PRODUCTION'
  244. runas:
  245. - DBA
  246. commands:
  247. - /bin/cat *
  248. - /bin/less *
  249. - /bin/ls *
  250. - SUDO_SALT_SAFE
  251. - '!SUDO_SHELLS'
  252. - '!SUDO_RESTRICTED_SU'
  253. salt-ops:
  254. hosts:
  255. - 'ALL'
  256. runas:
  257. - SALT
  258. commands:
  259. - SUDO_SALT_TRUSTED
  260. salt-ops2:
  261. name: salt-ops
  262. runas:
  263. - DBA
  264. commands:
  265. - SUDO_SHELLS
  266. sudogroup1:
  267. commands:
  268. - ALL
  269. sudogroup2:
  270. commands:
  271. - ALL
  272. hosts:
  273. - localhost
  274. users:
  275. - test
  276. nopasswd: false
  277. sudogroup3:
  278. commands:
  279. - ALL
  280. env:
  281. BOB_VARIABLE: Alice
  282. BOB_PATH:
  283. - /srv/alice/bin
  284. - /srv/bob/bin
  285. HTTPS_PROXY: https://127.0.4.1:443
  286. http_proxy: http://127.0.4.2:80
  287. ftp_proxy: ftp://127.0.4.3:2121
  288. no_proxy:
  289. - 192.168.0.1
  290. - 192.168.0.2
  291. - .saltstack.com
  292. - .ubuntu.com
  293. - .mirantis.com
  294. - .launchpad.net
  295. - .dummy.net
  296. - .local
  297. LANG: C
  298. LC_ALL: C
  299. profile:
  300. vi_flavors.sh: |
  301. export PAGER=view
  302. alias vi=vim
  303. locales: |
  304. export LANG=en_US
  305. export LC_ALL=en_US.UTF-8
  306. # pillar for proxy configuration
  307. proxy:
  308. # for package managers
  309. pkg:
  310. enabled: true
  311. https: https://127.0.2.1:4443
  312. #http: http://127.0.2.2
  313. ftp: none
  314. # fallback, system defaults
  315. https: https://127.0.1.1:443
  316. #http: http://127.0.1.2
  317. ftp: ftp://127.0.1.3
  318. noproxy:
  319. - host1
  320. - host2
  321. - .local
  322. # pillars for netconsole setup
  323. netconsole:
  324. enabled: true
  325. port: 514
  326. loglevel: debug
  327. target:
  328. 192.168.0.1:
  329. mac: "ff:ff:ff:ff:ff:ff"
  330. interface: bond0