Saltstack Official Linux Formula
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

339 lines
10KB

  1. linux:
  2. system:
  3. enabled: true
  4. cluster: default
  5. name: linux
  6. domain: local
  7. environment: prd
  8. hostname: system.pillar.local
  9. purge_repos: true
  10. apparmor:
  11. enabled: false
  12. haveged:
  13. enabled: true
  14. prompt:
  15. default: "linux.ci.local$"
  16. kernel:
  17. isolcpu: 1,2,3,4
  18. motd:
  19. - warning: |
  20. #!/bin/sh
  21. printf "WARNING: This is tcpcloud network.\n"
  22. printf " Unauthorized access is strictly prohibited.\n"
  23. printf "\n"
  24. - info: |
  25. #!/bin/sh
  26. printf -- "--[tcp cloud]---------------------------\n"
  27. printf " Hostname | ${linux:system:name}\n"
  28. printf " Domain | ${linux:system:domain}\n"
  29. printf " System | %s\n" "$(lsb_release -s -d)"
  30. printf " Kernel | %s\n" "$(uname -r)"
  31. printf -- "----------------------------------------\n"
  32. printf "\n"
  33. user:
  34. root:
  35. enabled: true
  36. home: /root
  37. name: root
  38. testuser:
  39. enabled: true
  40. name: testuser
  41. sudo: true
  42. uid: 9999
  43. full_name: Test User
  44. home: /home/test
  45. groups:
  46. - db-ops
  47. - salt-ops
  48. salt_user1:
  49. enabled: true
  50. name: saltuser1
  51. sudo: false
  52. uid: 9991
  53. full_name: Salt User1
  54. home: /home/saltuser1
  55. salt_user2:
  56. enabled: true
  57. name: saltuser2
  58. sudo: false
  59. uid: 9992
  60. full_name: Salt Sudo User2
  61. home: /home/saltuser2
  62. groups:
  63. - sudogroup1
  64. group:
  65. testgroup:
  66. enabled: true
  67. name: testgroup
  68. gid: 9999
  69. system: true
  70. addusers:
  71. - salt_user1
  72. - salt_user2
  73. db-ops:
  74. enabled: true
  75. delusers:
  76. - salt_user1
  77. salt-ops:
  78. enabled: true
  79. name: salt-ops
  80. sudogroup1:
  81. enabled: true
  82. name: sudogroup1
  83. sudogroup2:
  84. enabled: true
  85. name: sudogroup2
  86. sudogroup3:
  87. enabled: false
  88. name: sudogroup3
  89. job:
  90. test:
  91. enabled: true
  92. command: "/bin/sleep 3"
  93. user: testuser
  94. minute: 0
  95. hour: 13
  96. package:
  97. htop:
  98. version: latest
  99. repo:
  100. opencontrail:
  101. source: "deb http://ppa.launchpad.net/tcpcloud/contrail-3.0/ubuntu xenial main"
  102. keyid: E79EE90C
  103. keyserver: keyserver.ubuntu.com
  104. architectures: amd64
  105. proxy:
  106. enabled: true
  107. https: https://127.0.5.1:443
  108. #http: http://127.0.5.2:8080
  109. apt-mk-salt:
  110. source: "deb http://apt-mk.mirantis.com/xenial stable salt"
  111. #key_url: http://apt-mk.mirantis.com/public.gpg
  112. key: |
  113. -----BEGIN PGP PUBLIC KEY BLOCK-----
  114. Version: GnuPG v1
  115. mQINBFWBfCIBEADf6lnsY9v4rf/x0ribkFlnHnsv1/yD+M+YgZoQxYdf6b7M4/PY
  116. zZ/c3uJt4l1vR3Yoocfc1VgtBNfA1ussBqXdmyRBMO1LKdQWnurNxWLW7CwcyNke
  117. xeBfhjOqA6tIIXMfor7uUrwlIxJIxK+jc3C3nhM46QZpWX5d4mlkgxKh1G4ZRj4A
  118. mEo2NduLUgfmF+gM1MmAbU8ekzciKet4TsM64WAtHyYllGKvuFSdBjsewO3McuhR
  119. i1Desb5QdfIU4p3gkIa0EqlkkqX4rowo5qUnl670TNTTZHaz0MxCBoYaGbGhS7gZ
  120. 6/PLm8fJHmU/phst/QmOY76a5efZWbhhnlyYLIB8UjywN+VDqwkNk9jLUSXHTakh
  121. dnL4OuGoNpIzms8juVFlnuOmx+FcfbHMbhAc7aPqFK+6J3YS4kJSfeHWJ6cTGoU1
  122. cLWEhsbU3Gp8am5fnh72RJ7v2sTe/rvCuVtlNufi5SyBPcEUZoxFVWAC/hMeiWzy
  123. drBIVC73raf+A+OjH8op9XfkVj6czxQ/451soe3jvCDGgTXPLlts+P5WhgWNpDPa
  124. fOfTHn/2o7NwoM7Vp+BQYKAQ78phsolvNNhf+g51ntoLUbxAGKZYzQ5RPsKo+Hq6
  125. 96UCFkqhSABk0DvM0LtquzZ+sNoipd02w8EaxQzelDJxvPFGigo1uqGoiQARAQAB
  126. tCx0Y3BjbG91ZCBzaWduaW5nIGtleSA8YXV0b2J1aWxkQHRjcGNsb3VkLmV1PokC
  127. OwQTAQIAJQIbAwYLCQgHAwIGFQgCCQoLBBYCAwECHgECF4AFAlWj4K8CGQEACgkQ
  128. JACFCadogtPm9xAAl1D1RUY1mttjKk+8KI3tUmgtqLaIGUcB4TPbIhQpFy23TJd6
  129. BnnEaGZ+HSCj3lp/dBoq1xxCqHCziKA04IpPaLpGJf8cqaKOpQpW1ErlSxT6nCQW
  130. FrHFxZreBTljKqW3fvRBXNAquj0krJEwv19/3SsQ+CJI2Zkq/HPDw9eJOCu0WcJM
  131. PVtAq2SmaDigh1jtFcFoWZ7uFFMQPIWit/RCPkDfkFaf6lbYZ/nnvWON9OAgzWci
  132. GJjCp5a7vMyCpTRy6bgNPqM61omCe0iQ4yIcqANXhRYS/DBnjKr9YaDKnlKNUgd1
  133. WRE8QzErQznH/plgISQ+df+8Iunp3SBr/jj1604yyM1Wxppn1+dAoTBU1OPFGVd3
  134. mCEYHUe+v0iTZ69C2c1ISmp2MjciGyE/UPbW9ejUIXtFJAJovZjn6P3glyIQB3wq
  135. AW6JE+xEBWH7Ix+Uv6YNAFfj3UO6vNjtuGbTCWYDCEJRkdmeE7QdTYDo7PxgPl1t
  136. 6xMGPLOBdYNJTEojvRYBTt+6iw0eZ+MCUdUFNeaseQh0p1RgqM9/7t75QCNLl1oO
  137. +Cfu4vNef/Tpd3LHcUoQhQ2OViOVFbq1/Yu/natWDPDcXb3peTcNHOjmXAoboWbz
  138. rDkxj5z7vcJ9LMEXviP6Fb/iXDmJh74/o6Agc8efb0WTmFjPFFtMCHrinb+5Ag0E
  139. VYF8IgEQALUVS2GESQ+F1S4b0JIO1M2tVBXiH4N56eUzcDXxXbSZgCgx4aWhk5vJ
  140. Qu7M11gtqIoiRbmuFpUmDOG/kB7DxBZPn8WqcBKpky6GUP/A/emaAZTwNQdcDAhD
  141. foBkJdhVz0D2jnkBffYL055p/r1Ers+iTTNOas/0uc50C32xR823rQ2Nl6/ffIM6
  142. JqfQenhRvqUWPj9oqESHMsqEdceSwS/VC7RN4xQXJXfEWu2q4Ahs62RmvCXnTw1A
  143. sPcpysoBoo8IW+V1MVQEZuAJRn2AGO/Q7uY9TR4guHb3wXRfZ3k0KVUsyqqdusJi
  144. T3DxxBw6GcKdOH6t41Ys3eYgOrc+RcSdcHYSpxaLvEIhwzarZ+mqcp3gz/JkPlXS
  145. 2tx2l6NZHcgReOM7IhqMuxzBbpcrsbBmLBemC+u7hoPTjUdTHKEwvWaeXL4vgsqQ
  146. BbEeKmXep5sZg3kHtpXzY9ZfPQrtGB8vHGrfaZIcCKuXwZWGL5GGWKw3TSP4fAIA
  147. jLxLf5MyyXcsugbai2OY/H4sAuvJHsmGtergGknuR+iFdt5el1wgRKP1r1KdmvMm
  148. wsSayc6eSEKd689x3zsmAtnhYM31oMkPdeYRbnN15gLG7vcsVe4jug0YTqQt2WGn
  149. hwjBA0i2qfTorXemWChsxKllvY9aB3ST8I6RMat0kS08FMD+Ced/ABEBAAGJAh8E
  150. GAECAAkFAlWBfCICGwwACgkQJACFCadogtNicA/9HOM402VGHlmuYPcrvEThHqMK
  151. KOTtNFsrrPp67dGYaT8TGTgy1OG4Oys2y+hrwqnUK6dXJxX2/RBfRuO/gw65RCfC
  152. 9nWeMkqJTjHJCKNTYfXN4O4ag444UZPcOMq+IyiWF3/sh674zCkCm5DQ/FH8IJ8Y
  153. n4jMoxe7G48PCGtgcJKXo8NBzxwXJH4DCdk7rNdrbrnCwObG8h6530WrmzKuyFCJ
  154. QP5JA0MSx23J2OrK2YmVMhTeO0czJ8fRip9We9/qAfZGUEW+sey+nLmT5OJq04al
  155. Va9g2a4nXxzDy84+hRXQNUeCRYn/ys8d8q9HZNv3K36HlILcuWazNTTh0cuWupBd
  156. SlIEuWbIdbknYpGsmS1cPeGi0bdoLZv90BIVmdOS/vXP02fGUblyANciKcBPRhOI
  157. +z6hzwdZ+QvjPbxZUig5XuvqBhIHoRtMBJdf24ysFuf/d4uZzTC8T4rUQO+L29bt
  158. 8riT0dg6cHVwC0VH89FaO1FduvsCtAwdAgxSzOMBECNOmVBThIiWdLnns107Rp4F
  159. ECk+l2UCjl7zwGqJqcd1BQK+UgZwVG2UV11CrhopKU5oGL84n5DaO2n6Rv8wVdrt
  160. MKvqi7EkgvZpY0IHJ7rp0Gzrv0qmwJaUFCWFogITNyijb1JVsUgDTMhAkEgEsIYy
  161. jtcwJrHue5Xn8UPSLkE=
  162. =SWiA
  163. -----END PGP PUBLIC KEY BLOCK-----
  164. architectures: amd64
  165. proxy:
  166. enabled: true
  167. apt-mk-salt-nightly:
  168. source: "deb http://apt-mk.mirantis.com/xenial nightly salt"
  169. key_url: http://apt-mk.mirantis.com/public.gpg
  170. architectures: amd64
  171. proxy:
  172. enabled: false
  173. apt-mk-extra-nightly:
  174. source: "deb http://apt-mk.mirantis.com/xenial nightly extra"
  175. key_url: http://apt-mk.mirantis.com/public.gpg
  176. architectures: amd64
  177. locale:
  178. en_US.UTF-8:
  179. enabled: true
  180. default: true
  181. "cs_CZ.UTF-8 UTF-8":
  182. enabled: true
  183. autoupdates:
  184. enabled: true
  185. sudo:
  186. enabled: true
  187. alias:
  188. runas:
  189. DBA:
  190. - postgres
  191. - mysql
  192. SALT:
  193. - root
  194. host:
  195. LOCAL:
  196. - localhost
  197. PRODUCTION:
  198. - db1
  199. - db2
  200. command:
  201. SUDO_RESTRICTED_SU:
  202. - /bin/vi /etc/sudoers
  203. - /bin/su - root
  204. - /bin/su -
  205. - /bin/su
  206. - /usr/sbin/visudo
  207. SUDO_SHELLS:
  208. - /bin/sh
  209. - /bin/ksh
  210. - /bin/bash
  211. - /bin/rbash
  212. - /bin/dash
  213. - /bin/zsh
  214. - /bin/csh
  215. - /bin/fish
  216. - /bin/tcsh
  217. - /usr/bin/login
  218. - /usr/bin/su
  219. - /usr/su
  220. SUDO_SALT_SAFE:
  221. - /usr/bin/salt state*
  222. - /usr/bin/salt service*
  223. - /usr/bin/salt pillar*
  224. - /usr/bin/salt grains*
  225. - /usr/bin/salt saltutil*
  226. - /usr/bin/salt-call state*
  227. - /usr/bin/salt-call service*
  228. - /usr/bin/salt-call pillar*
  229. - /usr/bin/salt-call grains*
  230. - /usr/bin/salt-call saltutil*
  231. SUDO_SALT_TRUSTED:
  232. - /usr/bin/salt*
  233. users:
  234. saltuser1: {}
  235. saltuser2:
  236. hosts:
  237. - LOCAL
  238. # User Alias:
  239. DBA:
  240. hosts:
  241. - ALL
  242. commands:
  243. - SUDO_SALT_SAFE
  244. groups:
  245. db-ops:
  246. hosts:
  247. - ALL
  248. - '!PRODUCTION'
  249. runas:
  250. - DBA
  251. commands:
  252. - /bin/cat *
  253. - /bin/less *
  254. - /bin/ls *
  255. - SUDO_SALT_SAFE
  256. - '!SUDO_SHELLS'
  257. - '!SUDO_RESTRICTED_SU'
  258. salt-ops:
  259. hosts:
  260. - 'ALL'
  261. runas:
  262. - SALT
  263. commands:
  264. - SUDO_SALT_TRUSTED
  265. salt-ops2:
  266. name: salt-ops
  267. runas:
  268. - DBA
  269. commands:
  270. - SUDO_SHELLS
  271. sudogroup1:
  272. commands:
  273. - ALL
  274. sudogroup2:
  275. commands:
  276. - ALL
  277. hosts:
  278. - localhost
  279. users:
  280. - test
  281. nopasswd: false
  282. sudogroup3:
  283. commands:
  284. - ALL
  285. env:
  286. BOB_VARIABLE: Alice
  287. BOB_PATH:
  288. - /srv/alice/bin
  289. - /srv/bob/bin
  290. HTTPS_PROXY: https://127.0.4.1:443
  291. http_proxy: http://127.0.4.2:80
  292. ftp_proxy: ftp://127.0.4.3:2121
  293. no_proxy:
  294. - 192.168.0.1
  295. - 192.168.0.2
  296. - .saltstack.com
  297. - .ubuntu.com
  298. - .mirantis.com
  299. - .launchpad.net
  300. - .dummy.net
  301. - .local
  302. LANG: C
  303. LC_ALL: C
  304. profile:
  305. vi_flavors.sh: |
  306. export PAGER=view
  307. alias vi=vim
  308. locales: |
  309. export LANG=en_US
  310. export LC_ALL=en_US.UTF-8
  311. # pillar for proxy configuration
  312. proxy:
  313. # for package managers
  314. pkg:
  315. enabled: true
  316. https: https://127.0.2.1:4443
  317. #http: http://127.0.2.2
  318. ftp: none
  319. # fallback, system defaults
  320. https: https://127.0.1.1:443
  321. #http: http://127.0.1.2
  322. ftp: ftp://127.0.1.3
  323. noproxy:
  324. - host1
  325. - host2
  326. - .local
  327. # pillars for netconsole setup
  328. netconsole:
  329. enabled: true
  330. port: 514
  331. loglevel: debug
  332. target:
  333. 192.168.0.1:
  334. mac: "ff:ff:ff:ff:ff:ff"
  335. interface: bond0