Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
57 changes: 28 additions & 29 deletions Puppetfile
Original file line number Diff line number Diff line change
Expand Up @@ -3,39 +3,38 @@
forge "https://forgeapi.puppetlabs.com"

mod 'cmdntrf-consul_template', '2.3.8'
mod 'derdanne-nfs', '2.1.11'
mod 'heini-wait_for', '2.2.0'
mod 'puppet-augeasproviders_core', '4.0.1'
mod 'heini-wait_for', '3.0.0'
mod 'puppet-augeasproviders_core', '4.1.0'
mod 'puppet-augeasproviders_pam', '4.0.0'
mod 'puppet-augeasproviders_shellvar', '6.0.0'
mod 'puppet-augeasproviders_ssh', '6.0.0'
mod 'puppet-augeasproviders_sysctl', '3.1.0'
mod 'petems-swap_file', '4.0.2'
mod 'puppet-archive', '4.6.0'
mod 'puppet-consul', '7.3.1'
mod 'puppet-augeasproviders_shellvar', '6.0.1'
mod 'puppet-augeasproviders_ssh', '7.0.0'
mod 'puppet-augeasproviders_sysctl', '3.2.0'
mod 'puppet-swap_file', '5.0.0'
mod 'puppet-archive', '7.1.0'
mod 'puppet-consul', '9.0.0'
mod 'puppet-epel', '5.0.0'
mod 'puppet-extlib', '7.0.0'
mod 'puppet-fail2ban', '4.2.0'
mod 'puppet-healthcheck', '1.0.1'
mod 'puppet-kmod', '4.0.0'
mod 'puppet-logrotate', '5.0.0'
mod 'puppet-prometheus', '12.5.0'
mod 'puppet-extlib', '7.2.0'
mod 'puppet-fail2ban', '5.0.2'
mod 'puppet-healthcheck', '2.1.0'
mod 'puppet-kmod', '4.0.1'
mod 'puppet-logrotate', '7.1.0'
mod 'puppet-nfs', '3.0.0'
mod 'puppet-nftables', '4.0.0'
mod 'puppet-prometheus', '15.0.0'
mod 'puppet-rsyslog', '7.1.0'
mod 'puppet-selinux', '3.4.1'
mod 'puppet-squid', '3.0.0'
mod 'puppet-systemd', '3.10.0'
mod 'puppet-yum', '6.2.0'
mod 'puppetlabs-concat', '7.4.0'
mod 'puppetlabs-firewall', '5.0.0'
mod 'puppetlabs-inifile', '6.1.0'
mod 'puppetlabs-lvm', '1.4.0'
mod 'puppet-selinux', '5.0.0'
mod 'puppet-squid', '5.1.0'
mod 'puppet-systemd', '7.1.0'
mod 'puppet-yum', '7.1.0'
mod 'puppetlabs-concat', '9.0.2'
mod 'puppetlabs-inifile', '6.1.1'
mod 'puppetlabs-lvm', '2.3.0'
mod 'puppetlabs-motd', '7.1.0'
mod 'puppetlabs-mount_core', '1.0.4'
mod 'puppetlabs-mysql', '13.3.0'
mod 'puppetlabs-stdlib', '5.2.0'
mod 'puppetlabs-transition', '0.1.3'
mod 'treydock-globus', '9.0.0'
mod 'saz-limits', '3.0.4'
mod 'puppetlabs-mount_core', '1.3.0'
mod 'puppetlabs-mysql', '16.0.0'
mod 'puppetlabs-stdlib', '9.6.0'
mod 'puppetlabs-transition', '2.0.0'
mod 'saz-limits', '5.0.0'

mod 'computecanada-jupyterhub',
:git => 'https://github.com/ComputeCanada/puppet-jupyterhub.git',
Expand Down
3 changes: 3 additions & 0 deletions data/site.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -10,6 +10,7 @@ lookup_options:
magic_castle::site::all:
- profile::base
- profile::consul
- profile::firewall
- profile::freeipa
- profile::users::local
- profile::sssd::client
Expand Down Expand Up @@ -58,5 +59,7 @@ magic_castle::site::tags:
- profile::jupyterhub::hub
- profile::jupyterhub::hub::keytab
- profile::reverse_proxy
puppet:
- profile::puppetserver
efa:
- profile::efa
27 changes: 1 addition & 26 deletions site/profile/manifests/base.pp
Original file line number Diff line number Diff line change
Expand Up @@ -56,31 +56,6 @@
ensure => 'installed',
}

package { 'firewalld':
ensure => 'absent',
}

class { 'firewall':
tag => 'mc_bootstrap',
}

firewall { '001 accept all from local network':
chain => 'INPUT',
proto => 'all',
source => profile::getcidr(),
action => 'accept',
tag => 'mc_bootstrap',
}

firewall { '001 drop access to metadata server':
chain => 'OUTPUT',
proto => 'tcp',
destination => '169.254.169.254',
action => 'drop',
uid => '! root',
tag => 'mc_bootstrap',
}

package { 'haveged':
ensure => 'installed',
require => Yumrepo['epel'],
Expand All @@ -97,7 +72,7 @@
require => Package['haveged'],
}

ensure_packages($packages, { ensure => 'installed', require => Yumrepo['epel'] })
stdlib::ensure_packages($packages, { ensure => 'installed', require => Yumrepo['epel'] })

if $::facts.dig('cloud', 'provider') == 'azure' {
include profile::base::azure
Expand Down
9 changes: 8 additions & 1 deletion site/profile/manifests/consul.pp
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,13 @@
$retry_join = $servers
}

nftables::rule { 'default_in-consul_tcp':
content => 'tcp dport {8300,8301,8302,8500,8501,8502,8503,8600} accept comment "Accept consul"',
}
nftables::rule { 'default_in-consul_udp':
content => 'udp dport {8301,8302,8600} accept comment "Accept consul"',
}

class { 'consul':
config_mode => '0640',
acl_api_token => lookup('profile::consul::acl_api_token'),
Expand Down Expand Up @@ -66,7 +73,7 @@
# consul config file like this:
# jq -r .acl_agent_token /etc/consul/config.json
include epel
ensure_packages(['jq'], { ensure => 'present', require => Yumrepo['epel'] })
stdlib::ensure_packages(['jq'], { ensure => 'present', require => Yumrepo['epel'] })

# Ensure consul can read the state of agent_catalog_run.lock
file { '/opt/puppetlabs/puppet/cache':
Expand Down
4 changes: 3 additions & 1 deletion site/profile/manifests/fail2ban.pp
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,9 @@
include epel

class { 'fail2ban' :
whitelist => ['127.0.0.1/8', profile::getcidr()] + $ignoreip,
banaction => 'nftables-multiport',
iptables_chain => 'input',
whitelist => ['127.0.0.1/8', lookup('terraform.network.cidr')] + $ignoreip,
}

file_line { 'fail2ban_sshd_recv_disconnect':
Expand Down
14 changes: 14 additions & 0 deletions site/profile/manifests/firewall.pp
Original file line number Diff line number Diff line change
@@ -0,0 +1,14 @@
class profile::firewall {
tag 'mc_bootstrap'
class { 'nftables':
out_all => true,
noflush_tables => ['inet-f2b-table'],
}

# Do not let user get access to cloud-init metadata server as it could
# include sensitive information.
nftables::rule { 'default_out-drop_metadata':
content => 'ip daddr 169.254.169.254 skuid != 0 drop comment "Drop metadata server"',
order => '89',
}
}
40 changes: 36 additions & 4 deletions site/profile/manifests/freeipa.pp
Original file line number Diff line number Diff line change
Expand Up @@ -197,6 +197,28 @@
include profile::freeipa::base
include profile::sssd::client

include nftables::rules::dns
include nftables::rules::http
include nftables::rules::https
include nftables::rules::ldap
include nftables::rules::ssdp

nftables::rule { 'default_in-kerberos_tcp':
content => 'tcp dport 88 accept comment "Accept kerberos"',
}
nftables::rule { 'default_in-kerberos_udp':
content => 'udp dport 88 accept comment "Accept kerberos"',
}
nftables::rule { 'default_in-kpasswd_tcp':
content => 'tcp dport 464 accept comment "Accept kpasswd"',
}
nftables::rule { 'default_in-kpasswd_udp':
content => 'udp dport 464 accept comment "Accept kpasswd"',
}
nftables::rule { 'default_in-kadmind':
content => 'tcp dport 749 accept comment "Accept kadmind"',
}

file { 'kinit_wrapper':
path => '/usr/bin/kinit_wrapper',
source => 'puppet:///modules/profile/freeipa/kinit_wrapper',
Expand All @@ -215,7 +237,7 @@
# https://pagure.io/freeipa/issue/9358
# TODO: remove this patch once FreeIPA >= 4.10 is made available
# in RHEL 8.
ensure_packages(['patch'], { ensure => 'present' })
stdlib::ensure_packages(['patch'], { ensure => 'present' })
$python_version = lookup('os::redhat::python3::version')
file { 'freeipa_27e9181bdc.patch':
path => "/usr/lib/python${python_version}/site-packages/freeipa_27e9181bdc.patch",
Expand All @@ -236,7 +258,7 @@

$realm = upcase($ipa_domain)
$fqdn = "${facts['networking']['hostname']}.${ipa_domain}"
$reverse_zone = profile::getreversezone()
$reverse_zone = lookup('terraform.network.reverse_zone')
$ipaddress = lookup('terraform.self.local_ip')

$ipa_server_install_cmd = @("IPASERVERINSTALL"/L)
Expand Down Expand Up @@ -269,6 +291,10 @@
require => [
Package['ipa-server-dns'],
File['/etc/hosts'],
Class['nftables::rules::dns'],
Class['nftables::rules::https'],
Class['nftables::rules::ldap'],
Class['nftables::rules::ssdp'],
],
notify => [
Service['systemd-logind'],
Expand Down Expand Up @@ -454,6 +480,10 @@
) {
include mysql::server

nftables::rule { 'default_in-mokey_tcp':
content => 'tcp dport 12345 accept comment "Accept mokey"',
}

yumrepo { 'mokey-copr-repo':
enabled => true,
descr => 'Copr repo for mokey owned by cmdntrf',
Expand All @@ -480,6 +510,8 @@
password => $password,
host => 'localhost',
grant => ['ALL'],
charset => 'utf8mb4',
collate => 'utf8mb4_unicode_ci',
}

exec { 'mysql_mokey_schema':
Expand Down Expand Up @@ -567,8 +599,8 @@
'password' => $password,
'dbname' => 'mokey',
'port' => $port,
'auth_key' => seeded_rand_string(64, "${password}+auth_key", 'ABCDEF0123456789'),
'enc_key' => seeded_rand_string(64, "${password}+enc_key", 'ABCEDF0123456789'),
'auth_key' => stdlib::seeded_rand_string(64, "${password}+auth_key", 'ABCDEF0123456789'),
'enc_key' => stdlib::seeded_rand_string(64, "${password}+enc_key", 'ABCEDF0123456789'),
'enable_user_signup' => $enable_user_signup,
'require_verify_admin' => $require_verify_admin,
'email_link_base' => "https://${lookup('terraform.data.domain_name')}/",
Expand Down
10 changes: 5 additions & 5 deletions site/profile/manifests/gpu.pp
Original file line number Diff line number Diff line change
Expand Up @@ -11,10 +11,10 @@
Optional[String] $lib_symlink_path = undef
) {
$restrict_profiling = lookup('profile::gpu::restrict_profiling')
ensure_resource('file', '/etc/nvidia', { 'ensure' => 'directory' })
ensure_packages(['kernel-devel'], { 'name' => "kernel-devel-${facts['kernelrelease']}" })
ensure_packages(['kernel-headers'], { 'name' => "kernel-headers-${facts['kernelrelease']}" })
ensure_packages(['dkms'], { 'require' => [Package['kernel-devel'], Yumrepo['epel']] })
stdlib::ensure_resource('file', '/etc/nvidia', { 'ensure' => 'directory' })
stdlib::ensure_packages(['kernel-devel'], { 'name' => "kernel-devel-${facts['kernelrelease']}" })
stdlib::ensure_packages(['kernel-headers'], { 'name' => "kernel-headers-${facts['kernelrelease']}" })
stdlib::ensure_packages(['dkms'], { 'require' => [Package['kernel-devel'], Yumrepo['epel']] })
$nvidia_kmod = ['nvidia', 'nvidia_modeset', 'nvidia_drm', 'nvidia_uvm']

selinux::module { 'nvidia-gpu':
Expand Down Expand Up @@ -245,7 +245,7 @@

# Used by slurm-job-exporter to export GPU metrics
# DCGM does not work with GRID VGPU, most of the stats are missing
ensure_packages(['python3', 'python3-pip'], { ensure => 'present' })
stdlib::ensure_packages(['python3', 'python3-pip'], { ensure => 'present' })
$py3_version = lookup('os::redhat::python3::version')

exec { 'pip install nvidia-ml-py':
Expand Down
6 changes: 6 additions & 0 deletions site/profile/manifests/jupyterhub.pp
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,9 @@
}
include profile::slurm::submitter

nftables::rule { 'default_in-jupyterhub_tcp':
content => 'tcp dport 8081 accept comment "Accept jupyterhub"',
}
consul::service { 'jupyterhub':
port => 8081,
tags => ['jupyterhub'],
Expand All @@ -40,6 +43,9 @@
Class['profile::software_stack'] -> Class['jupyterhub::kernel::venv']
}
}
nftables::rule { 'default_in-jupyter_server':
content => 'tcp dport 32768-60999 accept comment "Accept jupyter_server"',
}
}

class profile::jupyterhub::hub::keytab {
Expand Down
2 changes: 1 addition & 1 deletion site/profile/manifests/mail.pp
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
class profile::mail::server {
ensure_packages(['postfix'], { ensure => 'present' })
stdlib::ensure_packages(['postfix'], { ensure => 'present' })

service { 'postfix':
ensure => running,
Expand Down
3 changes: 3 additions & 0 deletions site/profile/manifests/metrics.pp
Original file line number Diff line number Diff line change
Expand Up @@ -5,6 +5,7 @@
class profile::metrics::node_exporter {
include profile::consul
include prometheus::node_exporter
include nftables::rules::node_exporter
consul::service { 'node-exporter':
port => 9100,
tags => ['node-exporter'],
Expand Down Expand Up @@ -89,6 +90,8 @@
require => [
Package['prometheus-slurm-exporter'],
File['/etc/systemd/system/prometheus-slurm-exporter.service'],
User['slurm'],
Group['slurm'],
],
}
}
1 change: 1 addition & 0 deletions site/profile/manifests/nfs.pp
Original file line number Diff line number Diff line change
Expand Up @@ -48,6 +48,7 @@
Array[String] $no_root_squash_tags = ['mgmt']
) {
include profile::volumes
include nftables::rules::nfs

$nfs_domain = lookup('profile::nfs::domain')
class { 'nfs':
Expand Down
5 changes: 5 additions & 0 deletions site/profile/manifests/puppetserver.pp
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
class profile::puppetserver {
tag 'mc_bootstrap'
include profile::firewall
include nftables::rules::puppet
}
11 changes: 4 additions & 7 deletions site/profile/manifests/reverse_proxy.pp
Original file line number Diff line number Diff line change
Expand Up @@ -4,20 +4,17 @@
Hash[String, Array[String]] $remote_ips = {},
String $main2sub_redir = 'jupyter',
) {
include profile::firewall

selinux::boolean { 'httpd_can_network_connect': }

selinux::module { 'caddy':
ensure => 'present',
source_pp => 'puppet:///modules/profile/reverse_proxy/caddy.pp',
}

firewall { '200 httpd public':
chain => 'INPUT',
dport => [80, 443],
proto => 'tcp',
source => '0.0.0.0/0',
action => 'accept',
}
include nftables::rules::http
include nftables::rules::https

yumrepo { 'caddy-copr-repo':
enabled => true,
Expand Down
Loading