Saltstack Official Linux Formula
Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.

332 lines
10KB

  1. linux:
  2. system:
  3. enabled: true
  4. cluster: default
  5. name: linux
  6. domain: local
  7. environment: prd
  8. hostname: system.pillar.local
  9. purge_repos: true
  10. apparmor:
  11. enabled: false
  12. haveged:
  13. enabled: true
  14. prompt:
  15. default: "linux.ci.local$"
  16. kernel:
  17. isolcpu: 1,2,3,4
  18. motd:
  19. - warning: |
  20. #!/bin/sh
  21. printf "WARNING: This is tcpcloud network.\n"
  22. printf " Unauthorized access is strictly prohibited.\n"
  23. printf "\n"
  24. - info: |
  25. #!/bin/sh
  26. printf -- "--[tcp cloud]---------------------------\n"
  27. printf " Hostname | ${linux:system:name}\n"
  28. printf " Domain | ${linux:system:domain}\n"
  29. printf " System | %s\n" "$(lsb_release -s -d)"
  30. printf " Kernel | %s\n" "$(uname -r)"
  31. printf -- "----------------------------------------\n"
  32. printf "\n"
  33. user:
  34. root:
  35. enabled: true
  36. home: /root
  37. name: root
  38. test:
  39. enabled: true
  40. name: test
  41. sudo: true
  42. uid: 9999
  43. full_name: Test User
  44. home: /home/test
  45. groups:
  46. - root
  47. salt_user1:
  48. enabled: true
  49. name: saltuser1
  50. sudo: false
  51. uid: 9991
  52. full_name: Salt User1
  53. home: /home/saltuser1
  54. salt_user2:
  55. enabled: true
  56. name: saltuser2
  57. sudo: false
  58. uid: 9992
  59. full_name: Salt Sudo User2
  60. home: /home/saltuser2
  61. group:
  62. testgroup:
  63. enabled: true
  64. name: test
  65. gid: 9999
  66. system: true
  67. db-ops:
  68. enabled: true
  69. name: testgroup
  70. salt-ops:
  71. enabled: true
  72. name: sudogroup0
  73. sudogroup1:
  74. enabled: true
  75. name: sudogroup1
  76. sudogroup2:
  77. enabled: true
  78. name: sudogroup2
  79. sudogroup3:
  80. enabled: false
  81. name: sudogroup3
  82. job:
  83. test:
  84. enabled: true
  85. command: "/bin/sleep 3"
  86. user: test
  87. minute: 0
  88. hour: 13
  89. package:
  90. htop:
  91. version: latest
  92. repo:
  93. opencontrail:
  94. source: "deb http://ppa.launchpad.net/tcpcloud/contrail-3.0/ubuntu xenial main"
  95. keyid: E79EE90C
  96. keyserver: keyserver.ubuntu.com
  97. architectures: amd64
  98. proxy:
  99. enabled: true
  100. https: https://127.0.5.1:443
  101. #http: http://127.0.5.2:8080
  102. apt-mk-salt:
  103. source: "deb http://apt-mk.mirantis.com/xenial stable salt"
  104. #key_url: http://apt-mk.mirantis.com/public.gpg
  105. key: |
  106. -----BEGIN PGP PUBLIC KEY BLOCK-----
  107. Version: GnuPG v1
  108. mQINBFWBfCIBEADf6lnsY9v4rf/x0ribkFlnHnsv1/yD+M+YgZoQxYdf6b7M4/PY
  109. zZ/c3uJt4l1vR3Yoocfc1VgtBNfA1ussBqXdmyRBMO1LKdQWnurNxWLW7CwcyNke
  110. xeBfhjOqA6tIIXMfor7uUrwlIxJIxK+jc3C3nhM46QZpWX5d4mlkgxKh1G4ZRj4A
  111. mEo2NduLUgfmF+gM1MmAbU8ekzciKet4TsM64WAtHyYllGKvuFSdBjsewO3McuhR
  112. i1Desb5QdfIU4p3gkIa0EqlkkqX4rowo5qUnl670TNTTZHaz0MxCBoYaGbGhS7gZ
  113. 6/PLm8fJHmU/phst/QmOY76a5efZWbhhnlyYLIB8UjywN+VDqwkNk9jLUSXHTakh
  114. dnL4OuGoNpIzms8juVFlnuOmx+FcfbHMbhAc7aPqFK+6J3YS4kJSfeHWJ6cTGoU1
  115. cLWEhsbU3Gp8am5fnh72RJ7v2sTe/rvCuVtlNufi5SyBPcEUZoxFVWAC/hMeiWzy
  116. drBIVC73raf+A+OjH8op9XfkVj6czxQ/451soe3jvCDGgTXPLlts+P5WhgWNpDPa
  117. fOfTHn/2o7NwoM7Vp+BQYKAQ78phsolvNNhf+g51ntoLUbxAGKZYzQ5RPsKo+Hq6
  118. 96UCFkqhSABk0DvM0LtquzZ+sNoipd02w8EaxQzelDJxvPFGigo1uqGoiQARAQAB
  119. tCx0Y3BjbG91ZCBzaWduaW5nIGtleSA8YXV0b2J1aWxkQHRjcGNsb3VkLmV1PokC
  120. OwQTAQIAJQIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AFAlWj4K8CGQEACgkQ
  121. JACFCadogtPm9xAAl1D1RUY1mttjKk+8KI3tUmgtqLaIGUcB4TPbIhQpFy23TJd6
  122. BnnEaGZ+HSCj3lp/dBoq1xxCqHCziKA04IpPaLpGJf8cqaKOpQpW1ErlSxT6nCQW
  123. FrHFxZreBTljKqW3fvRBXNAquj0krJEwv19/3SsQ+CJI2Zkq/HPDw9eJOCu0WcJM
  124. PVtAq2SmaDigh1jtFcFoWZ7uFFMQPIWit/RCPkDfkFaf6lbYZ/nnvWON9OAgzWci
  125. GJjCp5a7vMyCpTRy6bgNPqM61omCe0iQ4yIcqANXhRYS/DBnjKr9YaDKnlKNUgd1
  126. WRE8QzErQznH/plgISQ+df+8Iunp3SBr/jj1604yyM1Wxppn1+dAoTBU1OPFGVd3
  127. mCEYHUe+v0iTZ69C2c1ISmp2MjciGyE/UPbW9ejUIXtFJAJovZjn6P3glyIQB3wq
  128. AW6JE+xEBWH7Ix+Uv6YNAFfj3UO6vNjtuGbTCWYDCEJRkdmeE7QdTYDo7PxgPl1t
  129. 6xMGPLOBdYNJTEojvRYBTt+6iw0eZ+MCUdUFNeaseQh0p1RgqM9/7t75QCNLl1oO
  130. +Cfu4vNef/Tpd3LHcUoQhQ2OViOVFbq1/Yu/natWDPDcXb3peTcNHOjmXAoboWbz
  131. rDkxj5z7vcJ9LMEXviP6Fb/iXDmJh74/o6Agc8efb0WTmFjPFFtMCHrinb+5Ag0E
  132. VYF8IgEQALUVS2GESQ+F1S4b0JIO1M2tVBXiH4N56eUzcDXxXbSZgCgx4aWhk5vJ
  133. Qu7M11gtqIoiRbmuFpUmDOG/kB7DxBZPn8WqcBKpky6GUP/A/emaAZTwNQdcDAhD
  134. foBkJdhVz0D2jnkBffYL055p/r1Ers+iTTNOas/0uc50C32xR823rQ2Nl6/ffIM6
  135. JqfQenhRvqUWPj9oqESHMsqEdceSwS/VC7RN4xQXJXfEWu2q4Ahs62RmvCXnTw1A
  136. sPcpysoBoo8IW+V1MVQEZuAJRn2AGO/Q7uY9TR4guHb3wXRfZ3k0KVUsyqqdusJi
  137. T3DxxBw6GcKdOH6t41Ys3eYgOrc+RcSdcHYSpxaLvEIhwzarZ+mqcp3gz/JkPlXS
  138. 2tx2l6NZHcgReOM7IhqMuxzBbpcrsbBmLBemC+u7hoPTjUdTHKEwvWaeXL4vgsqQ
  139. BbEeKmXep5sZg3kHtpXzY9ZfPQrtGB8vHGrfaZIcCKuXwZWGL5GGWKw3TSP4fAIA
  140. jLxLf5MyyXcsugbai2OY/H4sAuvJHsmGtergGknuR+iFdt5el1wgRKP1r1KdmvMm
  141. wsSayc6eSEKd689x3zsmAtnhYM31oMkPdeYRbnN15gLG7vcsVe4jug0YTqQt2WGn
  142. hwjBA0i2qfTorXemWChsxKllvY9aB3ST8I6RMat0kS08FMD+Ced/ABEBAAGJAh8E
  143. GAECAAkFAlWBfCICGwwACgkQJACFCadogtNicA/9HOM402VGHlmuYPcrvEThHqMK
  144. KOTtNFsrrPp67dGYaT8TGTgy1OG4Oys2y+hrwqnUK6dXJxX2/RBfRuO/gw65RCfC
  145. 9nWeMkqJTjHJCKNTYfXN4O4ag444UZPcOMq+IyiWF3/sh674zCkCm5DQ/FH8IJ8Y
  146. n4jMoxe7G48PCGtgcJKXo8NBzxwXJH4DCdk7rNdrbrnCwObG8h6530WrmzKuyFCJ
  147. QP5JA0MSx23J2OrK2YmVMhTeO0czJ8fRip9We9/qAfZGUEW+sey+nLmT5OJq04al
  148. Va9g2a4nXxzDy84+hRXQNUeCRYn/ys8d8q9HZNv3K36HlILcuWazNTTh0cuWupBd
  149. SlIEuWbIdbknYpGsmS1cPeGi0bdoLZv90BIVmdOS/vXP02fGUblyANciKcBPRhOI
  150. +z6hzwdZ+QvjPbxZUig5XuvqBhIHoRtMBJdf24ysFuf/d4uZzTC8T4rUQO+L29bt
  151. 8riT0dg6cHVwC0VH89FaO1FduvsCtAwdAgxSzOMBECNOmVBThIiWdLnns107Rp4F
  152. ECk+l2UCjl7zwGqJqcd1BQK+UgZwVG2UV11CrhopKU5oGL84n5DaO2n6Rv8wVdrt
  153. MKvqi7EkgvZpY0IHJ7rp0Gzrv0qmwJaUFCWFogITNyijb1JVsUgDTMhAkEgEsIYy
  154. jtcwJrHue5Xn8UPSLkE=
  155. =SWiA
  156. -----END PGP PUBLIC KEY BLOCK-----
  157. architectures: amd64
  158. proxy:
  159. enabled: true
  160. apt-mk-salt-nightly:
  161. source: "deb http://apt-mk.mirantis.com/xenial nightly salt"
  162. key_url: http://apt-mk.mirantis.com/public.gpg
  163. architectures: amd64
  164. proxy:
  165. enabled: false
  166. apt-mk-extra-nightly:
  167. source: "deb http://apt-mk.mirantis.com/xenial nightly extra"
  168. key_url: http://apt-mk.mirantis.com/public.gpg
  169. architectures: amd64
  170. locale:
  171. en_US.UTF-8:
  172. enabled: true
  173. default: true
  174. "cs_CZ.UTF-8 UTF-8":
  175. enabled: true
  176. autoupdates:
  177. enabled: true
  178. sudo:
  179. enabled: true
  180. alias:
  181. runas:
  182. DBA:
  183. - postgres
  184. - mysql
  185. SALT:
  186. - root
  187. host:
  188. LOCAL:
  189. - localhost
  190. PRODUCTION:
  191. - db1
  192. - db2
  193. command:
  194. SUDO_RESTRICTED_SU:
  195. - /bin/vi /etc/sudoers
  196. - /bin/su - root
  197. - /bin/su -
  198. - /bin/su
  199. - /usr/sbin/visudo
  200. SUDO_SHELLS:
  201. - /bin/sh
  202. - /bin/ksh
  203. - /bin/bash
  204. - /bin/rbash
  205. - /bin/dash
  206. - /bin/zsh
  207. - /bin/csh
  208. - /bin/fish
  209. - /bin/tcsh
  210. - /usr/bin/login
  211. - /usr/bin/su
  212. - /usr/su
  213. SUDO_SALT_SAFE:
  214. - /usr/bin/salt state*
  215. - /usr/bin/salt service*
  216. - /usr/bin/salt pillar*
  217. - /usr/bin/salt grains*
  218. - /usr/bin/salt saltutil*
  219. - /usr/bin/salt-call state*
  220. - /usr/bin/salt-call service*
  221. - /usr/bin/salt-call pillar*
  222. - /usr/bin/salt-call grains*
  223. - /usr/bin/salt-call saltutil*
  224. SUDO_SALT_TRUSTED:
  225. - /usr/bin/salt*
  226. users:
  227. saltuser1: {}
  228. saltuser2:
  229. hosts:
  230. - LOCAL
  231. # User Alias:
  232. DBA:
  233. hosts:
  234. - ALL
  235. commands:
  236. - SUDO_SALT_SAFE
  237. groups:
  238. db-ops:
  239. hosts:
  240. - ALL
  241. - '!PRODUCTION'
  242. runas:
  243. - DBA
  244. commands:
  245. - /bin/cat *
  246. - /bin/less *
  247. - /bin/ls *
  248. - SUDO_SALT_SAFE
  249. - '!SUDO_SHELLS'
  250. - '!SUDO_RESTRICTED_SU'
  251. salt-ops:
  252. hosts:
  253. - 'ALL'
  254. runas:
  255. - SALT
  256. commands:
  257. - SUDO_SALT_TRUSTED
  258. salt-ops2:
  259. name: salt-ops
  260. runas:
  261. - DBA
  262. commands:
  263. - SUDO_SHELLS
  264. sudogroup1:
  265. commands:
  266. - ALL
  267. sudogroup2:
  268. commands:
  269. - ALL
  270. hosts:
  271. - localhost
  272. users:
  273. - test
  274. nopasswd: false
  275. sudogroup3:
  276. commands:
  277. - ALL
  278. env:
  279. BOB_VARIABLE: Alice
  280. BOB_PATH:
  281. - /srv/alice/bin
  282. - /srv/bob/bin
  283. HTTPS_PROXY: https://127.0.4.1:443
  284. http_proxy: http://127.0.4.2:80
  285. ftp_proxy: ftp://127.0.4.3:2121
  286. no_proxy:
  287. - 192.168.0.1
  288. - 192.168.0.2
  289. - .saltstack.com
  290. - .ubuntu.com
  291. - .mirantis.com
  292. - .launchpad.net
  293. - .dummy.net
  294. - .local
  295. LANG: C
  296. LC_ALL: C
  297. profile:
  298. vi_flavors.sh: |
  299. export PAGER=view
  300. alias vi=vim
  301. locales: |
  302. export LANG=en_US
  303. export LC_ALL=en_US.UTF-8
  304. # pillar for proxy configuration
  305. proxy:
  306. # for package managers
  307. pkg:
  308. enabled: true
  309. https: https://127.0.2.1:4443
  310. #http: http://127.0.2.2
  311. ftp: none
  312. # fallback, system defaults
  313. https: https://127.0.1.1:443
  314. #http: http://127.0.1.2
  315. ftp: ftp://127.0.1.3
  316. noproxy:
  317. - host1
  318. - host2
  319. - .local
  320. # pillars for netconsole setup
  321. netconsole:
  322. enabled: true
  323. port: 514
  324. loglevel: debug
  325. target:
  326. 192.168.0.1:
  327. mac: "ff:ff:ff:ff:ff:ff"
  328. interface: bond0