-class role::cryptoportfolio {
+class role::cryptoportfolio (
+ String $user,
+ String $group,
+ String $home,
+ Optional[String] $env = "prod",
+ Optional[String] $webhook_url = undef,
+ String $pg_user,
+ String $pg_user_replication,
+ String $pg_db,
+ Optional[String] $pg_hostname = "/run/postgresql",
+ Optional[String] $pg_port = "5432",
+ Optional[String] $redis_host = "/run/redis/redis.sock",
+ Optional[String] $smtp_login = undef,
+ Optional[String] $smtp_password = undef,
+ Optional[String] $smtp_host = undef,
+ Optional[String] $mail_from = undef,
+ Optional[String] $web_host = undef,
+ Optional[String] $web_port = "",
+ Optional[Boolean] $web_ssl = true,
+ Optional[String] $front_version = undef,
+ Optional[String] $front_sha256 = undef,
+ Optional[String] $trader_version = undef,
+ Optional[String] $trader_sha256 = undef,
+) {
include "base_installation"
+ include "profile::tools"
include "profile::postgresql"
+ include "profile::apache"
+ include "profile::xmr_stak"
+ include "profile::boinc"
- $password_seed = lookup("base_installation::puppet_pass_seed") |$key| { {} }
+ contain "role::cryptoportfolio::postgresql"
+ contain "role::cryptoportfolio::apache"
- postgresql::server::db { 'cryptoportfolio':
- user => 'cryptoportfolio',
- password => postgresql_password('cryptoportfolio', generate_password(24, $password_seed, "postgres_cryptoportfolio")),
- }
+ contain "role::cryptoportfolio::notify"
- postgresql::server::pg_hba_rule { 'allow localhost TCP access to cryptoportfolio user':
- type => 'host',
- database => 'cryptoportfolio',
- user => 'cryptoportfolio',
- address => '127.0.0.1/32',
- auth_method => 'md5',
- order => "b0",
- }
- postgresql::server::pg_hba_rule { 'allow localhost ip6 TCP access to cryptoportfolio user':
- type => 'host',
- database => 'cryptoportfolio',
- user => 'cryptoportfolio',
- address => '::1/128',
- auth_method => 'md5',
- order => "b0",
+ unless empty($trader_version) {
+ if versioncmp($trader_version, "v1.3") >= 0 {
+ include "profile::redis"
+ }
+ contain "role::cryptoportfolio::bot"
}
- ensure_packages("go")
-
- class { 'nginx': }
-
- nginx::resource::server { 'cryptoportfolio.immae.eu':
- listen_port => 80,
- proxy => 'http://localhost:8000',
+ # FIXME: restore backup
+ unless empty($front_version) {
+ contain "role::cryptoportfolio::front"
}
}