Saltstack Official Linux Formula
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

340 lines
10KB

  1. linux:
  2. system:
  3. enabled: true
  4. cluster: default
  5. name: linux
  6. domain: local
  7. environment: prd
  8. hostname: system.pillar.local
  9. purge_repos: true
  10. apparmor:
  11. enabled: false
  12. haveged:
  13. enabled: true
  14. prompt:
  15. default: "linux.ci.local$"
  16. kernel:
  17. isolcpu: 1,2,3,4
  18. motd:
  19. - warning: |
  20. #!/bin/sh
  21. printf "WARNING: This is tcpcloud network.\n"
  22. printf " Unauthorized access is strictly prohibited.\n"
  23. printf "\n"
  24. - info: |
  25. #!/bin/sh
  26. printf -- "--[tcp cloud]---------------------------\n"
  27. printf " Hostname | ${linux:system:name}\n"
  28. printf " Domain | ${linux:system:domain}\n"
  29. printf " System | %s\n" "$(lsb_release -s -d)"
  30. printf " Kernel | %s\n" "$(uname -r)"
  31. printf -- "----------------------------------------\n"
  32. printf "\n"
  33. user:
  34. root:
  35. enabled: true
  36. home: /root
  37. name: root
  38. testuser:
  39. enabled: true
  40. name: testuser
  41. sudo: true
  42. uid: 9999
  43. full_name: Test User
  44. home: /home/test
  45. groups:
  46. - db-ops
  47. - salt-ops
  48. salt_user1:
  49. enabled: true
  50. name: saltuser1
  51. sudo: false
  52. uid: 9991
  53. full_name: Salt User1
  54. home: /home/saltuser1
  55. salt_user2:
  56. enabled: true
  57. name: saltuser2
  58. sudo: false
  59. uid: 9992
  60. full_name: Salt Sudo User2
  61. home: /home/saltuser2
  62. groups:
  63. - sudogroup1
  64. group:
  65. testgroup:
  66. enabled: true
  67. name: testgroup
  68. gid: 9999
  69. system: true
  70. addusers:
  71. - salt_user1
  72. - salt_user2
  73. db-ops:
  74. enabled: true
  75. delusers:
  76. - salt_user1
  77. - dontexistatall
  78. salt-ops:
  79. enabled: true
  80. name: salt-ops
  81. sudogroup1:
  82. enabled: true
  83. name: sudogroup1
  84. sudogroup2:
  85. enabled: true
  86. name: sudogroup2
  87. sudogroup3:
  88. enabled: false
  89. name: sudogroup3
  90. job:
  91. test:
  92. enabled: true
  93. command: "/bin/sleep 3"
  94. user: testuser
  95. minute: 0
  96. hour: 13
  97. package:
  98. htop:
  99. version: latest
  100. repo:
  101. opencontrail:
  102. source: "deb http://ppa.launchpad.net/tcpcloud/contrail-3.0/ubuntu xenial main"
  103. keyid: E79EE90C
  104. keyserver: keyserver.ubuntu.com
  105. architectures: amd64
  106. proxy:
  107. enabled: true
  108. https: https://127.0.5.1:443
  109. #http: http://127.0.5.2:8080
  110. apt-mk-salt:
  111. source: "deb http://apt-mk.mirantis.com/xenial stable salt"
  112. #key_url: http://apt-mk.mirantis.com/public.gpg
  113. key: |
  114. -----BEGIN PGP PUBLIC KEY BLOCK-----
  115. Version: GnuPG v1
  116. mQINBFWBfCIBEADf6lnsY9v4rf/x0ribkFlnHnsv1/yD+M+YgZoQxYdf6b7M4/PY
  117. zZ/c3uJt4l1vR3Yoocfc1VgtBNfA1ussBqXdmyRBMO1LKdQWnurNxWLW7CwcyNke
  118. xeBfhjOqA6tIIXMfor7uUrwlIxJIxK+jc3C3nhM46QZpWX5d4mlkgxKh1G4ZRj4A
  119. mEo2NduLUgfmF+gM1MmAbU8ekzciKet4TsM64WAtHyYllGKvuFSdBjsewO3McuhR
  120. i1Desb5QdfIU4p3gkIa0EqlkkqX4rowo5qUnl670TNTTZHaz0MxCBoYaGbGhS7gZ
  121. 6/PLm8fJHmU/phst/QmOY76a5efZWbhhnlyYLIB8UjywN+VDqwkNk9jLUSXHTakh
  122. dnL4OuGoNpIzms8juVFlnuOmx+FcfbHMbhAc7aPqFK+6J3YS4kJSfeHWJ6cTGoU1
  123. cLWEhsbU3Gp8am5fnh72RJ7v2sTe/rvCuVtlNufi5SyBPcEUZoxFVWAC/hMeiWzy
  124. drBIVC73raf+A+OjH8op9XfkVj6czxQ/451soe3jvCDGgTXPLlts+P5WhgWNpDPa
  125. fOfTHn/2o7NwoM7Vp+BQYKAQ78phsolvNNhf+g51ntoLUbxAGKZYzQ5RPsKo+Hq6
  126. 96UCFkqhSABk0DvM0LtquzZ+sNoipd02w8EaxQzelDJxvPFGigo1uqGoiQARAQAB
  127. tCx0Y3BjbG91ZCBzaWduaW5nIGtleSA8YXV0b2J1aWxkQHRjcGNsb3VkLmV1PokC
  128. OwQTAQIAJQIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AFAlWj4K8CGQEACgkQ
  129. JACFCadogtPm9xAAl1D1RUY1mttjKk+8KI3tUmgtqLaIGUcB4TPbIhQpFy23TJd6
  130. BnnEaGZ+HSCj3lp/dBoq1xxCqHCziKA04IpPaLpGJf8cqaKOpQpW1ErlSxT6nCQW
  131. FrHFxZreBTljKqW3fvRBXNAquj0krJEwv19/3SsQ+CJI2Zkq/HPDw9eJOCu0WcJM
  132. PVtAq2SmaDigh1jtFcFoWZ7uFFMQPIWit/RCPkDfkFaf6lbYZ/nnvWON9OAgzWci
  133. GJjCp5a7vMyCpTRy6bgNPqM61omCe0iQ4yIcqANXhRYS/DBnjKr9YaDKnlKNUgd1
  134. WRE8QzErQznH/plgISQ+df+8Iunp3SBr/jj1604yyM1Wxppn1+dAoTBU1OPFGVd3
  135. mCEYHUe+v0iTZ69C2c1ISmp2MjciGyE/UPbW9ejUIXtFJAJovZjn6P3glyIQB3wq
  136. AW6JE+xEBWH7Ix+Uv6YNAFfj3UO6vNjtuGbTCWYDCEJRkdmeE7QdTYDo7PxgPl1t
  137. 6xMGPLOBdYNJTEojvRYBTt+6iw0eZ+MCUdUFNeaseQh0p1RgqM9/7t75QCNLl1oO
  138. +Cfu4vNef/Tpd3LHcUoQhQ2OViOVFbq1/Yu/natWDPDcXb3peTcNHOjmXAoboWbz
  139. rDkxj5z7vcJ9LMEXviP6Fb/iXDmJh74/o6Agc8efb0WTmFjPFFtMCHrinb+5Ag0E
  140. VYF8IgEQALUVS2GESQ+F1S4b0JIO1M2tVBXiH4N56eUzcDXxXbSZgCgx4aWhk5vJ
  141. Qu7M11gtqIoiRbmuFpUmDOG/kB7DxBZPn8WqcBKpky6GUP/A/emaAZTwNQdcDAhD
  142. foBkJdhVz0D2jnkBffYL055p/r1Ers+iTTNOas/0uc50C32xR823rQ2Nl6/ffIM6
  143. JqfQenhRvqUWPj9oqESHMsqEdceSwS/VC7RN4xQXJXfEWu2q4Ahs62RmvCXnTw1A
  144. sPcpysoBoo8IW+V1MVQEZuAJRn2AGO/Q7uY9TR4guHb3wXRfZ3k0KVUsyqqdusJi
  145. T3DxxBw6GcKdOH6t41Ys3eYgOrc+RcSdcHYSpxaLvEIhwzarZ+mqcp3gz/JkPlXS
  146. 2tx2l6NZHcgReOM7IhqMuxzBbpcrsbBmLBemC+u7hoPTjUdTHKEwvWaeXL4vgsqQ
  147. BbEeKmXep5sZg3kHtpXzY9ZfPQrtGB8vHGrfaZIcCKuXwZWGL5GGWKw3TSP4fAIA
  148. jLxLf5MyyXcsugbai2OY/H4sAuvJHsmGtergGknuR+iFdt5el1wgRKP1r1KdmvMm
  149. wsSayc6eSEKd689x3zsmAtnhYM31oMkPdeYRbnN15gLG7vcsVe4jug0YTqQt2WGn
  150. hwjBA0i2qfTorXemWChsxKllvY9aB3ST8I6RMat0kS08FMD+Ced/ABEBAAGJAh8E
  151. GAECAAkFAlWBfCICGwwACgkQJACFCadogtNicA/9HOM402VGHlmuYPcrvEThHqMK
  152. KOTtNFsrrPp67dGYaT8TGTgy1OG4Oys2y+hrwqnUK6dXJxX2/RBfRuO/gw65RCfC
  153. 9nWeMkqJTjHJCKNTYfXN4O4ag444UZPcOMq+IyiWF3/sh674zCkCm5DQ/FH8IJ8Y
  154. n4jMoxe7G48PCGtgcJKXo8NBzxwXJH4DCdk7rNdrbrnCwObG8h6530WrmzKuyFCJ
  155. QP5JA0MSx23J2OrK2YmVMhTeO0czJ8fRip9We9/qAfZGUEW+sey+nLmT5OJq04al
  156. Va9g2a4nXxzDy84+hRXQNUeCRYn/ys8d8q9HZNv3K36HlILcuWazNTTh0cuWupBd
  157. SlIEuWbIdbknYpGsmS1cPeGi0bdoLZv90BIVmdOS/vXP02fGUblyANciKcBPRhOI
  158. +z6hzwdZ+QvjPbxZUig5XuvqBhIHoRtMBJdf24ysFuf/d4uZzTC8T4rUQO+L29bt
  159. 8riT0dg6cHVwC0VH89FaO1FduvsCtAwdAgxSzOMBECNOmVBThIiWdLnns107Rp4F
  160. ECk+l2UCjl7zwGqJqcd1BQK+UgZwVG2UV11CrhopKU5oGL84n5DaO2n6Rv8wVdrt
  161. MKvqi7EkgvZpY0IHJ7rp0Gzrv0qmwJaUFCWFogITNyijb1JVsUgDTMhAkEgEsIYy
  162. jtcwJrHue5Xn8UPSLkE=
  163. =SWiA
  164. -----END PGP PUBLIC KEY BLOCK-----
  165. architectures: amd64
  166. proxy:
  167. enabled: true
  168. apt-mk-salt-nightly:
  169. source: "deb http://apt-mk.mirantis.com/xenial nightly salt"
  170. key_url: http://apt-mk.mirantis.com/public.gpg
  171. architectures: amd64
  172. proxy:
  173. enabled: false
  174. apt-mk-extra-nightly:
  175. source: "deb http://apt-mk.mirantis.com/xenial nightly extra"
  176. key_url: http://apt-mk.mirantis.com/public.gpg
  177. architectures: amd64
  178. locale:
  179. en_US.UTF-8:
  180. enabled: true
  181. default: true
  182. "cs_CZ.UTF-8 UTF-8":
  183. enabled: true
  184. autoupdates:
  185. enabled: true
  186. sudo:
  187. enabled: true
  188. alias:
  189. runas:
  190. DBA:
  191. - postgres
  192. - mysql
  193. SALT:
  194. - root
  195. host:
  196. LOCAL:
  197. - localhost
  198. PRODUCTION:
  199. - db1
  200. - db2
  201. command:
  202. SUDO_RESTRICTED_SU:
  203. - /bin/vi /etc/sudoers
  204. - /bin/su - root
  205. - /bin/su -
  206. - /bin/su
  207. - /usr/sbin/visudo
  208. SUDO_SHELLS:
  209. - /bin/sh
  210. - /bin/ksh
  211. - /bin/bash
  212. - /bin/rbash
  213. - /bin/dash
  214. - /bin/zsh
  215. - /bin/csh
  216. - /bin/fish
  217. - /bin/tcsh
  218. - /usr/bin/login
  219. - /usr/bin/su
  220. - /usr/su
  221. SUDO_SALT_SAFE:
  222. - /usr/bin/salt state*
  223. - /usr/bin/salt service*
  224. - /usr/bin/salt pillar*
  225. - /usr/bin/salt grains*
  226. - /usr/bin/salt saltutil*
  227. - /usr/bin/salt-call state*
  228. - /usr/bin/salt-call service*
  229. - /usr/bin/salt-call pillar*
  230. - /usr/bin/salt-call grains*
  231. - /usr/bin/salt-call saltutil*
  232. SUDO_SALT_TRUSTED:
  233. - /usr/bin/salt*
  234. users:
  235. saltuser1: {}
  236. saltuser2:
  237. hosts:
  238. - LOCAL
  239. # User Alias:
  240. DBA:
  241. hosts:
  242. - ALL
  243. commands:
  244. - SUDO_SALT_SAFE
  245. groups:
  246. db-ops:
  247. hosts:
  248. - ALL
  249. - '!PRODUCTION'
  250. runas:
  251. - DBA
  252. commands:
  253. - /bin/cat *
  254. - /bin/less *
  255. - /bin/ls *
  256. - SUDO_SALT_SAFE
  257. - '!SUDO_SHELLS'
  258. - '!SUDO_RESTRICTED_SU'
  259. salt-ops:
  260. hosts:
  261. - 'ALL'
  262. runas:
  263. - SALT
  264. commands:
  265. - SUDO_SALT_TRUSTED
  266. salt-ops2:
  267. name: salt-ops
  268. runas:
  269. - DBA
  270. commands:
  271. - SUDO_SHELLS
  272. sudogroup1:
  273. commands:
  274. - ALL
  275. sudogroup2:
  276. commands:
  277. - ALL
  278. hosts:
  279. - localhost
  280. users:
  281. - test
  282. nopasswd: false
  283. sudogroup3:
  284. commands:
  285. - ALL
  286. env:
  287. BOB_VARIABLE: Alice
  288. BOB_PATH:
  289. - /srv/alice/bin
  290. - /srv/bob/bin
  291. HTTPS_PROXY: https://127.0.4.1:443
  292. http_proxy: http://127.0.4.2:80
  293. ftp_proxy: ftp://127.0.4.3:2121
  294. no_proxy:
  295. - 192.168.0.1
  296. - 192.168.0.2
  297. - .saltstack.com
  298. - .ubuntu.com
  299. - .mirantis.com
  300. - .launchpad.net
  301. - .dummy.net
  302. - .local
  303. LANG: C
  304. LC_ALL: C
  305. profile:
  306. vi_flavors.sh: |
  307. export PAGER=view
  308. alias vi=vim
  309. locales: |
  310. export LANG=en_US
  311. export LC_ALL=en_US.UTF-8
  312. # pillar for proxy configuration
  313. proxy:
  314. # for package managers
  315. pkg:
  316. enabled: true
  317. https: https://127.0.2.1:4443
  318. #http: http://127.0.2.2
  319. ftp: none
  320. # fallback, system defaults
  321. https: https://127.0.1.1:443
  322. #http: http://127.0.1.2
  323. ftp: ftp://127.0.1.3
  324. noproxy:
  325. - host1
  326. - host2
  327. - .local
  328. # pillars for netconsole setup
  329. netconsole:
  330. enabled: true
  331. port: 514
  332. loglevel: debug
  333. target:
  334. 192.168.0.1:
  335. mac: "ff:ff:ff:ff:ff:ff"
  336. interface: bond0