feat(postgresql): added new role to install pgsql server

This commit is contained in:
NaeiKinDus 2024-07-21 00:00:00 +00:00
parent 068a2e2790
commit 7d6155f97e
Signed by: WoodSmellParticle
GPG key ID: 8E52ADFF7CA8AE56
13 changed files with 281 additions and 0 deletions

View file

@ -0,0 +1,14 @@
---
postgresql_install_server: true
postgresql_install_client: true
postgresql_nft_filter_input: true
postgresql_nft_filter_output: false
postgresql_nft_allowed_ingress_list: ['127.0.0.1/32']
postgresql_nft_allowed_egress_list: []
postgresql_server_port: 5432
postgresql_server_run_init_sql: false
postgresql_server_run_custom_sql: false
postgresql_server_custom_sql: ""
postgresql_server_bind_addresses: false
postgresql_server_accounts_list: {}
postgresql_server_encryption_scheme: scram-sha-256

View file

@ -0,0 +1,18 @@
---
- name: reload postgresql service
become: true
systemd_service:
name: postgresql.service
enabled: true
state: reloaded
- name: restart postgresql service
become: true
ansible.builtin.systemd_service:
name: postgresql.service
enabled: true
state: restarted
- name: load firewall rules
become: true
ansible.builtin.command: /usr/sbin/nft -f /etc/nftables.d/postgresql.nft

View file

@ -0,0 +1,20 @@
---
galaxy_info:
author: Florian L.
namespace: nullified
description: Install PostgreSQL and configure it, along with firewall rules
license: MIT
min_ansible_version: 2.15
# https://galaxy.ansible.com/api/v1/platforms/
platforms:
- name: Debian
versions:
- bookworm
galaxy_tags:
- database
- postgresql
- sql
dependencies: []

View file

@ -0,0 +1,9 @@
---
- name: install client packages
become: true
ansible.builtin.apt:
update_cache: true
cache_valid_time: 3600
force_apt_get: true
pkg:
- postgresql-client

View file

@ -0,0 +1,17 @@
---
- name: setup server
include_tasks: server.yml
when: postgresql_install_server is truthy
- name: setup client
include_tasks: client.yml
when: postgresql_install_client is truthy
- name: install firewall rules
become: true
template:
src: ../templates/nftables.d/postgresql.nft.j2
dest: /etc/nftables.d/postgresql.nft
mode: '0600'
notify:
- 'postgresql : load firewall rules'

View file

@ -0,0 +1,132 @@
---
- name: install server packages
become: true
ansible.builtin.apt:
update_cache: true
cache_valid_time: 3600
force_apt_get: true
pkg:
- postgresql
- python3-pexpect
- name: gather information
become: true
block:
- name: pg_hba.conf path
ansible.builtin.shell: >
su {{ postgresql_default_user }} -c 'psql -t --csv -c "SHOW hba_file"'
register: hba_file_query
changed_when: false
failed_when: hba_file_query.rc != 0 or hba_file_query.stdout is falsy
- name: postgresql.conf path
ansible.builtin.shell: >
su {{ postgresql_default_user }} -c 'psql -t --csv -c "SHOW config_file"'
register: psql_conf_query
changed_when: false
failed_when: psql_conf_query.rc != 0 or psql_conf_query.stdout is falsy
- name: register facts
ansible.builtin.set_fact:
postgresql_hba_file: '{{ hba_file_query.stdout }}'
postgresql_conf_file: '{{ psql_conf_query.stdout }}'
- name: update postgresql.conf values
become: true
block:
- name: update listen addresses
ansible.builtin.lineinfile:
path: '{{ postgresql_conf_file }}'
regexp: '^#?listen_addresses\b.+'
line: "listen_addresses = '{{ postgresql_server_bind_addresses|join(',') }}'"
state: present
when: postgresql_server_bind_addresses is truthy
notify:
- 'postgresql : restart postgresql service'
- name: update listen port
ansible.builtin.lineinfile:
path: '{{ postgresql_conf_file }}'
regexp: '^#?port\b.+'
line: 'port = {{ postgresql_server_port }}'
state: present
notify:
- 'postgresql : restart postgresql service'
- name: update default encryption
ansible.builtin.lineinfile:
path: '{{ postgresql_conf_file }}'
regexp: '^#?password_encryption\b.+'
line: "password_encryption = '{{ postgresql_server_encryption_scheme }}'"
state: present
notify:
- 'postgresql : restart postgresql service'
- name: flush handlers
ansible.builtin.meta: flush_handlers
- name: create databases
become: true
ansible.builtin.command: >
su {{ postgresql_default_user }} -c 'createdb{% if 'tablespace' in item %} -D "{{ item.tablespace }}"{% endif %}{% if 'encoding' in item %} -E "{{ item.encoding }}"{% endif %}{% if 'locale' in item %} -l "{{ item.locale }}"{% endif %}{% if 'owner' in item %} -O "{{ item.owner }}"{% endif %} "{{ item.name }}"'
loop: '{{ postgresql_server_databases_list }}'
loop_control:
label: '{{ item.name }}'
register: create_db_exec
failed_when: create_db_exec.rc != 0 and not " already exists" in create_db_exec.stderr
changed_when: not " already exists" in create_db_exec.stderr
- name: create accesses
become: true
block:
- name: create roles
ansible.builtin.expect:
command: >
su {{ postgresql_default_user }} -c 'createuser --{{ 'no-' if item.get('nologin', False) is truthy }}login "{{ item.name }}" --pwprompt'
responses:
'Enter password for new role: ':
- '{{ item.password }}'
'Enter it again: ':
- '{{ item.password }}'
loop: '{{ postgresql_server_accounts_list }}'
loop_control:
label: '{{ item.name }}'
register: create_user_exec
failed_when: create_user_exec.rc != 0 and not " already exists" in create_user_exec.stdout
changed_when: not " already exists" in create_user_exec.stdout
no_log: true
- name: add HBA accesses
ansible.builtin.lineinfile:
path: '{{ postgresql_hba_file }}'
regexp: '^#?(?P<contype>{{ item.contype }}+)\s+(?P<databases>{{ item.databases }})\s+(?P<users>{{ item.users }})\s+(?P<addr>{{ item.address }})\s+(?P<method>{{ item.method }})$'
line: "{{ item.contype }}\t{{ item.databases | join(',') }}\t{{ item.users | join(',') }}\t{{ item.address }}\t{{ item.method }}"
group: '{{ postgresql_default_user }}'
owner: '{{ postgresql_default_user }}'
mode: '0600'
state: present
loop: '{{ postgresql_server_hba_conf_list }}'
loop_control:
label: '{{ item.contype }}:{{ item.method }}:: {{ item.users }}-{{ item.address }} @ {{ item.databases }}'
notify:
- 'postgresql : reload postgresql service'
- name: run custom initialization queries
become: true
block:
- name: create temporary file
ansible.builtin.tempfile:
state: file
register: tmp_file
changed_when: false
- name: export initialization SQL file
ansible.builtin.template:
src: ../templates/postgresql_init.sql.j2
dest: '{{ tmp_file.path }}'
mode: '0600'
force: true
owner: '{{ postgresql_default_user }}'
group: '{{ postgresql_default_user }}'
changed_when: false
- name: run initialization file
ansible.builtin.shell: "su {{ postgresql_default_user }} -c 'psql < {{ tmp_file.path }}'"
- name: cleanup
ansible.builtin.file:
path: '{{ tmp_file.path }}'
state: absent
when: postgresql_server_run_init_sql is truthy or postgresql_server_run_custom_sql is truthy

View file

@ -0,0 +1,26 @@
{%- set allowed_ingress_list4 = postgresql_nft_allowed_ingress_list | ansible.utils.ipv4 -%}
{%- set allowed_ingress_list6 = postgresql_nft_allowed_ingress_list | ansible.utils.ipv6 -%}
{%- set allowed_egress_list4 = postgresql_nft_allowed_egress_list | ansible.utils.ipv4 | default([], true) -%}
{%- set allowed_egress_list6 = postgresql_nft_allowed_egress_list | ansible.utils.ipv6 | default([], true) -%}
table inet filter {
{% if postgresql_install_server %}
chain input {
{% if postgresql_nft_filter_input %}
{%+ if allowed_ingress_list4 %}ip saddr { {{ allowed_ingress_list4 | join(', ') }} } tcp dport {{ postgresql_server_port }} accept{% endif +%}
{%+ if allowed_ingress_list6 %}ip6 saddr { {{ allowed_ingress_list6 | join(', ') }} } tcp dport {{ postgresql_server_port }} accept{% endif +%}
{% else %}
tcp dport {{ postgresql_server_port }} accept
{% endif %}
}
{% endif %}
{% if postgresql_install_client %}
chain output {
{% if postgresql_nft_filter_output %}
{%+ if allowed_egress_list4 %}ip daddr { {{ allowed_egress_list4 | join(', ') }} } tcp sport {{ postgresql_server_port }} accept{% endif +%}
{%+ if allowed_egress_list6 %}ip daddr { {{ allowed_egress_list6 | join(', ') }} } tcp sport {{ postgresql_server_port }} accept{% endif +%}
{% else %}
tcp sport {{ postgresql_server_port }} accept
{% endif %}
}
{% endif %}
}

View file

@ -0,0 +1,5 @@
{% if postgresql_server_run_init_sql %}
{% endif %}
{% if postgresql_server_run_custom_sql %}
{{ postgresql_server_custom_sql }}
{% endif %}

View file

@ -0,0 +1,5 @@
---
- hosts: localhost
remote_user: root
roles:
- postgresql

View file

@ -0,0 +1,2 @@
---
postgresql_default_user: postgres

View file

@ -11,9 +11,29 @@ k3s_cluster_role: server
k3s_cluster_ip: "{{ vault_cluster_ip }}"
mariadb_server_root_password: "{{ vault_mariadb_server_root_password }}"
mariadb_server_run_custom_sql: true
mariadb_server_custom_sql: "{{ vault_mariadb_server_custom_sql }}"
mariadb_server_bind_addresses: "{{ vault_mariadb_server_bind_addresses }}"
postgresql_server_run_custom_sql: false
postgresql_nft_allowed_ingress_list: ['127.0.0.1/32', '10.42.0.0/16']
postgresql_server_custom_sql: "{{ vault_postgresql_server_custom_sql }}"
postgresql_server_bind_addresses: "{{ vault_postgresql_server_bind_addresses }}"
postgresql_server_databases_list:
- name: '{{ vault_invidious_pg_dbname }}'
postgresql_server_accounts_list:
- name: '{{ vault_invidious_pg_user }}'
db: '{{ vault_invidious_pg_dbname }}'
password: '{{ vault_invidious_pg_password }}'
postgresql_server_hba_conf_list:
- address: '10.42.0.0/16'
databases:
- invidious
contype: hostssl
method: scram-sha-256
users:
- invidious
k3s_cluster_additional_helm_charts:
- release_name: redis
release_namespace: default
@ -22,6 +42,7 @@ k3s_cluster_additional_helm_charts:
values:
replica:
replicaCount: 1
k3s_cluster_additional_tf_resources:
- name: Invoice Ninja
git_repository: 'https://gitlab.0x2a.ninja/flowtech/oss/invoice-ninja.git'

View file

@ -69,6 +69,16 @@
tags: [mariadb]
tags: [mariadb]
- name: setup postgresql servers
hosts: internal:&postgresql
tasks:
- name: include postgresql role
ansible.builtin.include_role:
name: nullified.infrastructure.postgresql
apply:
tags: [postgresql]
tags: [postgresql]
- name: setup workstations
hosts: internal:&workstation
tasks: