Commit graph

793 commits

Author SHA1 Message Date
Kevin Fenzi
ee49c53f08 base / iptables: Adjust iptables on all vpn hosts to drop less secure traffic
Most of our vpn hosts are on a 192.168.1.0/24 network.
However we have a small number on a 'less secure' 'less trusted' subnet:
192.168.100.0/24. This change adds in logic to:
* on log01, allow rsyslog from 192.168.100.x hosts
* on ipa servers, allow ipa ports for 192.168.100.x hosts
* then reject everything else.
This will make sure 192.168.100.x hosts can only hit ssh and the two
above items, otherwise all vpn hosts will reject their traffic. This
should add a bit of security to having those hosts on the vpn.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-05-04 21:15:05 +00:00
Kevin Fenzi
6a2bff7af9 base / ifcfg: make sure and set staging to use stg.iad2.fedoraproject.org domain
This should only affect stg hosts.
We had set all of iad2 the same, prod and stg both.
We need to make sure stg resolves to stg hosts first.
This worked somewhat until now because we replace the resolv.conf on stg
hosts, but without this they are borken right after boot and until we
replace the resolv.conf and restart httpd or other services.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-04-21 12:13:06 -07:00
Kevin Fenzi
dc201cf3d6 linux system roles: add tag
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-03-31 11:35:25 -07:00
Kevin Fenzi
fc2db16120 iptables / kojibuilder: add some more ports needed by ipa-clients
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-03-29 15:20:00 -07:00
Kevin Fenzi
6bf8552e7f base / iptables / kojibuilder: add ipa ports for koji builder ipa clients
Note that this will not yet work, it needs the RHIT firewall between
vlans opened on these ports first, but after that this is needed to
allow them to use those ports.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-03-25 10:10:55 -07:00
Kevin Fenzi
55cc28c3b1 base / iptables: Add rules to block staging networks on prod hosts
In IAD2 the prod and stg hosts are on different VLANs, so we thought we
didn't need this. However, we are still seeing some odd mixing of prod
and stg fedmsgs, so likely some fedmsg port has become enabled accross
all the VLANS. In any case this should do no harm, it just adds 2
subnets on all prod hosts to block staging, except for a small number of
staging_friendly hosts (in the staging_friendly ansible group).

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-03-19 20:08:05 +00:00
Stephen Smoogen
ec8c05f116 Fix tasks/postfix.yaml and roles/basic/tasks/postfix.yaml to match
Found the reason that the definitions I had put were not
working. There were two different ones and i was looking at the wrong
one. Put the two tasks with the same logic so things should work no
matter which one is run.
2021-02-17 19:17:50 -05:00
Aurélien Bompard
00e8e4eb25
Don't get a keytab on IPA itself
Signed-off-by: Aurélien Bompard <aurelien@bompard.org>
2021-02-11 12:34:22 +01:00
Kevin Fenzi
acbf9e21f7 base / crypto-policy: always run, even in check mode
We need to always run these even in check mode, because they register
things used in the last one of them. So, this could change this in check
mode if we modify it. Be careful!

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2021-02-10 15:13:19 -08:00
Pavel Raiskup
a2d65ff508 Move devel servers to elastic IPs, too 2021-01-18 14:58:58 +01:00
Mark O'Brien
8c00c6840b iptables change wasnt needed 2020-11-24 17:35:33 +00:00
Mark O'Brien
a426b0e240 no iptables on Centos 8 2020-11-24 17:26:29 +00:00
Pavel Raiskup
f14b897b1f copr: point playbooks to new set of (elastic) IPs 2020-11-13 10:05:21 +01:00
Jakub Kadlcik
e043b62c5a reprovisioning copr-fe-dev from a new instance 2020-11-11 14:12:15 +01:00
Kevin Fenzi
e5606578de base: try changing f33 crypto-policies to a less open version to get 2fa working
LEGACY allows all kinds of old junk, lets try and just
enable the things that FEDORA32 allowed.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-11-03 14:10:39 -08:00
Adam Williamson
e14052db33 ok debug stuff did its job goodbye
Signed-off-by: Adam Williamson <awilliam@redhat.com>
2020-10-30 13:14:54 -07:00
Adam Williamson
ea70d16680 gah stupid tags
Signed-off-by: Adam Williamson <awilliam@redhat.com>
2020-10-30 13:12:33 -07:00
Adam Williamson
a4deb8dbaa try and fix this debug stuff why is ansible so hard
Signed-off-by: Adam Williamson <awilliam@redhat.com>
2020-10-30 13:11:51 -07:00
Adam Williamson
c60897306c sigh yaml
Signed-off-by: Adam Williamson <awilliam@redhat.com>
2020-10-30 13:06:42 -07:00
Adam Williamson
e02baf2149 Add a bit of debugging to crypto-policies
aka why isn't it working on a64 worker02

Signed-off-by: Adam Williamson <awilliam@redhat.com>
2020-10-30 13:05:29 -07:00
Adam Williamson
fd292f9aa7 Try and fix syntax in that last commit
Signed-off-by: Adam Williamson <awilliam@redhat.com>
2020-10-29 11:14:45 -07:00
Adam Williamson
bb286d8099 Enhance the crypto-policy stuff to actually set the policy
Just writing a config file isn't enough, apparently. We need to
really call update-crypto-policies. This attempts to do so, but
only if it's really necessary, by using some handy check args.

Signed-off-by: Adam Williamson <awilliam@redhat.com>
2020-10-29 11:12:01 -07:00
Kevin Fenzi
4e63bbb7b2 Add a crypto-policies to set to LEGACY on fedora 33 hosts
This is needed to get our 2fa working.
We should drop this once we are moved to sssd.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-10-29 10:17:04 -07:00
Aurélien Bompard
fa6eaf9f42
get rid of phx2 in krb5.conf
Signed-off-by: Aurélien Bompard <aurelien@bompard.org>
2020-10-07 14:14:06 +02:00
Stephen Smoogen
522c62c273 try to make the postfix milter part better searched and some debugging to opendkim and turn off the sending of reports 2020-10-06 12:20:09 -04:00
Kevin Fenzi
c5f4e27746 roles/base/postfix: add a rdu-cc postfix main.cf
This one just uses the vpn endpoint for bastion to avoid dns and ipv6
issues.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-10-05 16:03:55 -07:00
Pierre-Yves Chibon
8a13932c66 postfix: Drop the main.cf for pagure02 - never worked
Signed-off-by: Pierre-Yves Chibon <pingou@pingoured.fr>
2020-10-02 09:50:42 +02:00
Kevin Fenzi
71d475085b iptables / koji_builder: update ip address for pagure.io
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-10-01 16:55:00 -07:00
Pierre-Yves Chibon
5383f87f30 pagure: adjust pagure's postfix configuration to rhel8
Signed-off-by: Pierre-Yves Chibon <pingou@pingoured.fr>
2020-10-01 11:06:52 +02:00
Pierre-Yves Chibon
200282de8d pagure: add a dedicated postfix configuration file for pagure02
Signed-off-by: Pierre-Yves Chibon <pingou@pingoured.fr>
2020-09-25 12:10:31 +02:00
Silvie Chlupova
3ded4aae28 Fix DKIM signing 2020-09-24 10:58:17 +00:00
Stephen Smoogen
8d58708305 remove 10.5.126 ips from nrpe to try and figure out why host was not connecting 2020-09-23 17:08:17 -04:00
Mark O'Brien
1b787aef8b add proxy39/40 to http log sync 2020-09-22 11:08:31 +01:00
Mark O'Brien
e4e6ede45b [proxies] add proxy37/38 2020-09-01 15:45:29 +01:00
Stephen Smoogen
fede1317e7 proxy*.stg.iad2.fedoraproject.org is not on the vpn 2020-08-31 11:09:14 -04:00
Stephen Smoogen
15348981f8 try to fix part of ticket #9273 by increasing the number of open files allowed on log servers and people as they have a large number of files to deal with. 2020-08-28 08:26:19 -04:00
Mark O'Brien
5f114a7c98 [proxies] setup for proxy35/36 2020-08-24 17:21:00 +01:00
Stephen Smoogen
25d3faff49 put in a relay host for copr 2020-08-13 14:55:18 -04:00
Stephen Smoogen
17965d6ea7 merge and remove duplicate gateway file that bastion.iad2 had. add in copr addresses to allow for relay 2020-08-13 14:53:33 -04:00
Kevin Fenzi
f551e07637 base: use linux system roles network role for hosts that define network_connections
This is VASTLY better than the hack we have in base now to try and setup
ifcfg files. It uses a standard role that has lots of options and does
the right thing with NetworkManager. Ideally we would switch everything
to this, but lets try it here first to see. It should work with bridges,
etc as well.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-08-13 10:37:12 -07:00
Stephen Smoogen
04efbcf732 add in correct main.cf also 2020-08-12 20:45:14 -04:00
Stephen Smoogen
c9cb4a5d5f fix postfix entries so that they use 10.3.160.0/19 network versus phx2 networks 2020-08-12 20:42:57 -04:00
Mark O'Brien
f7ba779b61 [proxies] add proxy34 2020-08-04 15:41:04 +01:00
Kevin Fenzi
c96131045d base / iptables / kojibuilder: allow port 80 on new s390x cache instance
Moving the local to s390x cache from 07 (a zvm instance) to 24 (a kvm
instance) needs to adjust the firewalls for those builders to know that
they can use port 80 on the new one. After that we will update dns to
point it to the new location.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-08-03 12:40:54 -07:00
Mark O'Brien
6994fef4f8 [proxies] new proxy33 in aws capetown 2020-07-28 15:34:59 +01:00
Kevin Fenzi
7825d7664b base keytab: try and just use --force here
We made this change for other keytabs, so just do it here too.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-07-27 15:35:00 -07:00
Kevin Fenzi
461fbcf0aa Revert "base / keytab: Try and throttle task to 1"
Didn't help. ;(

This reverts commit 37db5af9f0.
2020-07-27 15:30:48 -07:00
Kevin Fenzi
37db5af9f0 base / keytab: Try and throttle task to 1
This task seems to fail with a nameserver failed to answer message when
you provision a bunch of hosts at once. Try running just one at a time
and see if it helps any.

Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-07-27 15:27:21 -07:00
Kevin Fenzi
e1d77f58d6 base / iptables / staging: drop nat section in iptables
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-07-18 16:25:45 -07:00
Kevin Fenzi
3c340cf69b base / resolv.conf: fix staging to adjust for iad2
Signed-off-by: Kevin Fenzi <kevin@scrye.com>
2020-07-18 15:46:37 -07:00