X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;ds=sidebyside;f=modules%2Frole%2Fmanifests%2Fcryptoportfolio.pp;h=1738685825e397f5c81c4472ad2e40982eb95ad3;hb=da0f686b366140aab3d01c95f37eb655f07f81ef;hp=4643f9e03f2989e3f4a2cfba75659c8927d6a1ee;hpb=f67c5285ae3847366129228576a1b41aad7cf05d;p=perso%2FImmae%2FProjets%2FPuppet.git diff --git a/modules/role/manifests/cryptoportfolio.pp b/modules/role/manifests/cryptoportfolio.pp index 4643f9e..1738685 100644 --- a/modules/role/manifests/cryptoportfolio.pp +++ b/modules/role/manifests/cryptoportfolio.pp @@ -1,38 +1,48 @@ -class role::cryptoportfolio { +class role::cryptoportfolio ( + String $user, + String $group, + String $home, + Optional[String] $env = "prod", + Optional[String] $webhook_url = undef, + String $pg_user, + String $pg_db, + Optional[String] $pg_hostname = "/run/postgresql", + Optional[String] $pg_port = "5432", + Optional[String] $redis_host = "/run/redis/redis.sock", + Optional[String] $smtp_login = undef, + Optional[String] $smtp_password = undef, + Optional[String] $smtp_host = undef, + Optional[String] $mail_from = undef, + Optional[String] $web_host = undef, + Optional[String] $web_port = "", + Optional[Boolean] $web_ssl = true, + Optional[String] $front_version = undef, + Optional[String] $front_sha256 = undef, + Optional[String] $trader_version = undef, + Optional[String] $trader_sha256 = undef, +) { include "base_installation" + include "profile::tools" include "profile::postgresql" + include "profile::apache" + include "profile::xmr_stak" + include "profile::boinc" + include "profile::monitoring" - $password_seed = lookup("base_installation::puppet_pass_seed") |$key| { {} } + contain "role::cryptoportfolio::postgresql" + contain "role::cryptoportfolio::apache" - postgresql::server::db { 'cryptoportfolio': - user => 'cryptoportfolio', - password => postgresql_password('cryptoportfolio', generate_password(24, $password_seed, "postgres_cryptoportfolio")), - } + contain "role::cryptoportfolio::notify" - postgresql::server::pg_hba_rule { 'allow localhost TCP access to cryptoportfolio user': - type => 'host', - database => 'cryptoportfolio', - user => 'cryptoportfolio', - address => '127.0.0.1/32', - auth_method => 'md5', - order => "b0", - } - postgresql::server::pg_hba_rule { 'allow localhost ip6 TCP access to cryptoportfolio user': - type => 'host', - database => 'cryptoportfolio', - user => 'cryptoportfolio', - address => '::1/128', - auth_method => 'md5', - order => "b0", + unless empty($trader_version) { + if versioncmp($trader_version, "v1.3") >= 0 { + include "profile::redis" + } + contain "role::cryptoportfolio::bot" } - class { 'nginx': } - - nginx::resource::server { 'cryptoportfolio.immae.eu': - listen_port => 80, - proxy => 'http://localhost:8000', + unless empty($front_version) { + contain "role::cryptoportfolio::front" } - - ensure_packages(["go", "npm", "nodejs", "yarn"]) }