Defined Type: postgresql::server::instance::config

Defined in:
manifests/server/instance/config.pp

Summary

Manages the config for a postgresql::server instance

Overview

Parameters:

  • ip_mask_deny_postgres_user (String[1]) (defaults to: $postgresql::server::ip_mask_deny_postgres_user)

    Specifies the IP mask from which remote connections should be denied for the postgres superuser. Default value: ‘0.0.0.0/0’, which denies any remote connection.

  • ip_mask_allow_all_users (String[1]) (defaults to: $postgresql::server::ip_mask_allow_all_users)

    Overrides PostgreSQL defaults for remote connections. By default, PostgreSQL does not allow database user accounts to connect via TCP from remote machines. If you’d like to allow this, you can override this setting. Set to ‘0.0.0.0/0’ to allow database users to connect from any remote machine, or ‘192.168.0.0/1’ to allow connections from any machine on your local ‘192.168’ subnet. Default value: ‘127.0.0.1/32’.

  • listen_addresses (Optional[Variant[String[1], Array[String[1]]]]) (defaults to: $postgresql::server::listen_addresses)

    Address list on which the PostgreSQL service will listen

  • port (Stdlib::Port) (defaults to: $postgresql::server::port)

    Specifies the port for the PostgreSQL server to listen on. Note: The same port number is used for all IP addresses the server listens on. Also, for Red Hat systems and early Debian systems, changing the port causes the server to come to a full stop before being able to make the change. Default value: 5432. Meaning the Postgres server listens on TCP port 5432.

  • ipv4acls (Array[String[1]]) (defaults to: $postgresql::server::ipv4acls)

    Lists strings for access control for connection method, users, databases, IPv4 addresses.

  • ipv6acls (Array[String[1]]) (defaults to: $postgresql::server::ipv6acls)

    Lists strings for access control for connection method, users, databases, IPv6 addresses.

  • pg_hba_conf_path (Stdlib::Absolutepath) (defaults to: $postgresql::server::pg_hba_conf_path)

    Specifies the path to your pg_hba.conf file.

  • pg_ident_conf_path (Stdlib::Absolutepath) (defaults to: $postgresql::server::pg_ident_conf_path)

    Specifies the path to your pg_ident.conf file.

  • postgresql_conf_path (Stdlib::Absolutepath) (defaults to: $postgresql::server::postgresql_conf_path)

    Specifies the path to your postgresql.conf file.

  • postgresql_conf_mode (Optional[Stdlib::Filemode]) (defaults to: $postgresql::server::postgresql_conf_mode)

    Sets the mode of your postgresql.conf file. Only relevant if manage_postgresql_conf_perms is true.

  • recovery_conf_path (Stdlib::Absolutepath) (defaults to: $postgresql::server::recovery_conf_path)

    Specifies the path to your recovery.conf file.

  • pg_hba_conf_defaults (Boolean) (defaults to: $postgresql::server::pg_hba_conf_defaults)

    If false, disables the defaults supplied with the module for pg_hba.conf. This is useful if you disagree with the defaults and wish to override them yourself. Be sure that your changes of course align with the rest of the module, as some access is required to perform basic psql operations for example.

  • user (String[1]) (defaults to: $postgresql::server::user)

    Overrides the default PostgreSQL super user and owner of PostgreSQL related files in the file system.

  • group (String[1]) (defaults to: $postgresql::server::group)

    Overrides the default postgres user group to be used for related files in the file system.

  • version (Optional[String[1]]) (defaults to: $postgresql::server::_version)

    Sets PostgreSQL version

  • manage_pg_hba_conf (Boolean) (defaults to: $postgresql::server::manage_pg_hba_conf)

    Boolean. Whether to manage the pg_hba.conf.

  • manage_pg_ident_conf (Boolean) (defaults to: $postgresql::server::manage_pg_ident_conf)

    Boolean. Overwrites the pg_ident.conf file.

  • manage_recovery_conf (Boolean) (defaults to: $postgresql::server::manage_recovery_conf)

    Boolean. Specifies whether or not manage the recovery.conf.

  • manage_postgresql_conf_perms (Boolean) (defaults to: $postgresql::server::manage_postgresql_conf_perms)

    Whether to manage the postgresql conf file permissions. This means owner, group and mode. Contents are not managed but should be managed through postgresql::server::config_entry.

  • datadir (Stdlib::Absolutepath) (defaults to: $postgresql::server::datadir)

    PostgreSQL data directory

  • logdir (Optional[Stdlib::Absolutepath]) (defaults to: $postgresql::server::logdir)

    PostgreSQL log directory

  • service_name (String[1]) (defaults to: $postgresql::server::service_name)

    Overrides the default PostgreSQL service name.

  • service_enable (Boolean) (defaults to: $postgresql::server::service_enable)

    Enable the PostgreSQL service

  • log_line_prefix (Optional[String[1]]) (defaults to: $postgresql::server::log_line_prefix)

    PostgreSQL log line prefix

  • timezone (Optional[String[1]]) (defaults to: $postgresql::server::timezone)

    Set timezone for the PostgreSQL instance

  • password_encryption (Postgresql::Pg_password_encryption) (defaults to: $postgresql::server::password_encryption)

    Specify the type of encryption set for the password.

  • pg_hba_auth_password_encryption (Optional[Postgresql::Pg_password_encryption]) (defaults to: $postgresql::server::pg_hba_auth_password_encryption)

    Specify the type of encryption set for the password in pg_hba_conf, this value is usefull if you want to start enforcing scram-sha-256, but give users transition time.

  • extra_systemd_config (Optional[String]) (defaults to: $postgresql::server::extra_systemd_config)

    Adds extra config to systemd config file, can for instance be used to add extra openfiles. This can be a multi line string

  • manage_selinux (Boolean) (defaults to: $postgresql::server::manage_selinux)

    Specifies whether or not manage the conf file for selinux.



51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
# File 'manifests/server/instance/config.pp', line 51

define postgresql::server::instance::config (
  String[1]                                      $ip_mask_deny_postgres_user   = $postgresql::server::ip_mask_deny_postgres_user,
  String[1]                                      $ip_mask_allow_all_users      = $postgresql::server::ip_mask_allow_all_users,
  Optional[Variant[String[1], Array[String[1]]]] $listen_addresses             = $postgresql::server::listen_addresses,
  Stdlib::Port                                   $port                         = $postgresql::server::port,
  Array[String[1]]                               $ipv4acls                     = $postgresql::server::ipv4acls,
  Array[String[1]]                               $ipv6acls                     = $postgresql::server::ipv6acls,
  Stdlib::Absolutepath                           $pg_hba_conf_path             = $postgresql::server::pg_hba_conf_path,
  Stdlib::Absolutepath                           $pg_ident_conf_path           = $postgresql::server::pg_ident_conf_path,
  Stdlib::Absolutepath                           $postgresql_conf_path         = $postgresql::server::postgresql_conf_path,
  Optional[Stdlib::Filemode]                     $postgresql_conf_mode         = $postgresql::server::postgresql_conf_mode,
  Stdlib::Absolutepath                           $recovery_conf_path           = $postgresql::server::recovery_conf_path,
  Boolean                                        $pg_hba_conf_defaults         = $postgresql::server::pg_hba_conf_defaults,
  String[1]                                      $user                         = $postgresql::server::user,
  String[1]                                      $group                        = $postgresql::server::group,
  Optional[String[1]]                            $version                      = $postgresql::server::_version,
  Boolean                                        $manage_pg_hba_conf           = $postgresql::server::manage_pg_hba_conf,
  Boolean                                        $manage_pg_ident_conf         = $postgresql::server::manage_pg_ident_conf,
  Boolean                                        $manage_recovery_conf         = $postgresql::server::manage_recovery_conf,
  Boolean                                        $manage_postgresql_conf_perms = $postgresql::server::manage_postgresql_conf_perms,
  Stdlib::Absolutepath                           $datadir                      = $postgresql::server::datadir,
  Optional[Stdlib::Absolutepath]                 $logdir                       = $postgresql::server::logdir,
  String[1]                                      $service_name                 = $postgresql::server::service_name,
  Boolean                                        $service_enable               = $postgresql::server::service_enable,
  Optional[String[1]]                            $log_line_prefix              = $postgresql::server::log_line_prefix,
  Optional[String[1]]                            $timezone                     = $postgresql::server::timezone,
  Postgresql::Pg_password_encryption             $password_encryption          = $postgresql::server::password_encryption,
  Optional[Postgresql::Pg_password_encryption]   $pg_hba_auth_password_encryption = $postgresql::server::pg_hba_auth_password_encryption,
  Optional[String]                               $extra_systemd_config         = $postgresql::server::extra_systemd_config,
  Boolean                                        $manage_selinux               = $postgresql::server::manage_selinux,
) {
  $_pg_hba_auth_password_encryption = pick($pg_hba_auth_password_encryption,$password_encryption)

  if ($manage_pg_hba_conf == true) {
    # Prepare the main pg_hba file
    concat { $pg_hba_conf_path:
      owner  => $user,
      group  => $group,
      mode   => '0640',
      warn   => true,
      notify => Class['postgresql::server::reload'],
    }

    if $pg_hba_conf_defaults {
      Postgresql::Server::Pg_hba_rule {
        database => 'all',
        target   => $pg_hba_conf_path,
        user     => 'all',
      }

      postgresql::server::pg_hba_rule {
        "local access as postgres user for instance ${name}":
          type        => 'local',
          user        => $user,
          auth_method => 'ident',
          order       => 1;

        "local access to database with same name for instance ${name}":
          type        => 'local',
          auth_method => 'ident',
          order       => 2;

        "allow localhost TCP access to postgresql user for instance ${name}":
          type        => 'host',
          user        => $user,
          address     => '127.0.0.1/32',
          auth_method => $_pg_hba_auth_password_encryption,
          order       => 3;

        "deny access to postgresql user for instance ${name}":
          type        => 'host',
          user        => $user,
          address     => $ip_mask_deny_postgres_user,
          auth_method => 'reject',
          order       => 4;

        "allow access to all users for instance ${name}":
          type        => 'host',
          address     => $ip_mask_allow_all_users,
          auth_method => $_pg_hba_auth_password_encryption,
          order       => 100;

        "allow access to ipv6 localhost for instance ${name}":
          type        => 'host',
          address     => '::1/128',
          auth_method => $_pg_hba_auth_password_encryption,
          order       => 101;
      }
    } else {
      Postgresql::Server::Pg_hba_rule {
        target   => $pg_hba_conf_path,
      }
    }

    # $ipv4acls and $ipv6acls are arrays of rule strings
    # They are converted into hashes we can iterate over to create postgresql::server::pg_hba_rule resources.
    (
      postgresql::postgresql_acls_to_resources_hash($ipv4acls, 'ipv4acls', 10) +
      postgresql::postgresql_acls_to_resources_hash($ipv6acls, 'ipv6acls', 102)
    ).each | String $key, Hash $attrs| {
      postgresql::server::pg_hba_rule { $key:
        * => $attrs,
      }
    }
  }
  # set default postgresql_conf_path here so the path is configurable in instances for
  # default values like port or listen_address
  Postgresql::Server::Config_entry {
    path => $postgresql_conf_path,
  }

  if $manage_postgresql_conf_perms {
    file { $postgresql_conf_path:
      ensure => file,
      owner  => $user,
      group  => $group,
      mode   => $postgresql_conf_mode,
    }
  }

  if $listen_addresses {
    postgresql::server::config_entry { "listen_addresses_for_instance_${name}":
      key   => 'listen_addresses',
      value => $listen_addresses,
    }
  }

  # ensure that SELinux has a proper label for the port defined
  if $manage_selinux and $facts['os']['selinux']['enabled'] {
    case $facts['os']['family'] {
      'RedHat', 'Linux': {
        if $facts['os']['name'] == 'Amazon' {
          $package_name = 'policycoreutils'
        }
        else {
          $package_name = $facts['os']['release']['major'] ? {
            '6'     => 'policycoreutils-python',
            '7'     => 'policycoreutils-python',
            default => 'policycoreutils-python-utils',
          }
        }
      }
      default: {
        $package_name = 'policycoreutils'
      }
    }

    stdlib::ensure_packages([$package_name])

    $exec_command = ['/usr/sbin/semanage', 'port', '-a', '-t', 'postgresql_port_t', '-p', 'tcp', $port]
    $exec_unless = "/usr/sbin/semanage port -l | grep -qw ${port}"
    exec { "/usr/sbin/semanage port -a -t postgresql_port_t -p tcp ${port}":
      command => $exec_command,
      unless  => $exec_unless,
      before  => Postgresql::Server::Config_entry["port_for_instance_${name}"],
      require => Package[$package_name],
    }
  }

  postgresql::server::config_entry { "port_for_instance_${name}":
    key   => 'port',
    value => $port,
  }

  if ($password_encryption) and (versioncmp($version, '10') >= 0) {
    postgresql::server::config_entry { "password_encryption_for_instance_${name}":
      key   => 'password_encryption',
      value => $password_encryption,
    }
  }

  postgresql::server::config_entry { "data_directory_for_instance_${name}":
    key   => 'data_directory',
    value => $datadir,
  }
  if $timezone {
    postgresql::server::config_entry { "timezone_for_instance_${name}":
      key   => 'timezone',
      value => $timezone,
    }
  }
  if $logdir {
    postgresql::server::config_entry { "log_directory_for_instance_${name}":
      key   => 'log_directory',
      value => $logdir,
    }
  }
  # Allow timestamps in log by default
  if $log_line_prefix {
    postgresql::server::config_entry { "log_line_prefix_for_instance_${name}":
      key   => 'log_line_prefix',
      value => $log_line_prefix,
    }
  }

  if ($manage_pg_ident_conf == true) {
    concat { $pg_ident_conf_path:
      owner  => $user,
      group  => $group,
      mode   => '0640',
      warn   => true,
      notify => Class['postgresql::server::reload'],
    }
  }

  postgresql::server::instance::systemd { $name:
    port                 => $port,
    datadir              => $datadir,
    extra_systemd_config => $extra_systemd_config,
    service_name         => $service_name,
  }
}