mirror of
https://github.com/zulip/zulip.git
synced 2025-11-11 17:36:27 +00:00
The old "zulip_internal" name was from back when Zulip, Inc. had two distributions of Zulip, the enterprise distribution in puppet/zulip/ and the "internal" SAAS distribution in puppet/zulip_internal. I think the name is a bit confusing in the new fully open-source Zulip work, so we're replacing it with "zulip_ops". I don't think the new name is perfect, but it's better. In the following commits, we'll delete a bunch of pieces of Zulip, Inc.'s infrastructure that don't exist anymore and thus are no longer useful (e.g. the old Trac configuration), with the goal of cleaning the repository of as much unnecessary content as possible.
127 lines
5.9 KiB
Plaintext
127 lines
5.9 KiB
Plaintext
# PostgreSQL Client Authentication Configuration File
|
|
# ===================================================
|
|
#
|
|
# Refer to the "Client Authentication" section in the PostgreSQL
|
|
# documentation for a complete description of this file. A short
|
|
# synopsis follows.
|
|
#
|
|
# This file controls: which hosts are allowed to connect, how clients
|
|
# are authenticated, which PostgreSQL user names they can use, which
|
|
# databases they can access. Records take one of these forms:
|
|
#
|
|
# local DATABASE USER METHOD [OPTIONS]
|
|
# host DATABASE USER ADDRESS METHOD [OPTIONS]
|
|
# hostssl DATABASE USER ADDRESS METHOD [OPTIONS]
|
|
# hostnossl DATABASE USER ADDRESS METHOD [OPTIONS]
|
|
#
|
|
# (The uppercase items must be replaced by actual values.)
|
|
#
|
|
# The first field is the connection type: "local" is a Unix-domain
|
|
# socket, "host" is either a plain or SSL-encrypted TCP/IP socket,
|
|
# "hostssl" is an SSL-encrypted TCP/IP socket, and "hostnossl" is a
|
|
# plain TCP/IP socket.
|
|
#
|
|
# DATABASE can be "all", "sameuser", "samerole", "replication", a
|
|
# database name, or a comma-separated list thereof. The "all"
|
|
# keyword does not match "replication". Access to replication
|
|
# must be enabled in a separate record (see example below).
|
|
#
|
|
# USER can be "all", a user name, a group name prefixed with "+", or a
|
|
# comma-separated list thereof. In both the DATABASE and USER fields
|
|
# you can also write a file name prefixed with "@" to include names
|
|
# from a separate file.
|
|
#
|
|
# ADDRESS specifies the set of hosts the record matches. It can be a
|
|
# host name, or it is made up of an IP address and a CIDR mask that is
|
|
# an integer (between 0 and 32 (IPv4) or 128 (IPv6) inclusive) that
|
|
# specifies the number of significant bits in the mask. A host name
|
|
# that starts with a dot (.) matches a suffix of the actual host name.
|
|
# Alternatively, you can write an IP address and netmask in separate
|
|
# columns to specify the set of hosts. Instead of a CIDR-address, you
|
|
# can write "samehost" to match any of the server's own IP addresses,
|
|
# or "samenet" to match any address in any subnet that the server is
|
|
# directly connected to.
|
|
#
|
|
# METHOD can be "trust", "reject", "md5", "password", "gss", "sspi",
|
|
# "krb5", "ident", "peer", "pam", "ldap", "radius" or "cert". Note that
|
|
# "password" sends passwords in clear text; "md5" is preferred since
|
|
# it sends encrypted passwords.
|
|
#
|
|
# OPTIONS are a set of options for the authentication in the format
|
|
# NAME=VALUE. The available options depend on the different
|
|
# authentication methods -- refer to the "Client Authentication"
|
|
# section in the documentation for a list of which options are
|
|
# available for which authentication methods.
|
|
#
|
|
# Database and user names containing spaces, commas, quotes and other
|
|
# special characters must be quoted. Quoting one of the keywords
|
|
# "all", "sameuser", "samerole" or "replication" makes the name lose
|
|
# its special character, and just match a database or username with
|
|
# that name.
|
|
#
|
|
# This file is read on server startup and when the postmaster receives
|
|
# a SIGHUP signal. If you edit the file on a running system, you have
|
|
# to SIGHUP the postmaster for the changes to take effect. You can
|
|
# use "pg_ctl reload" to do that.
|
|
|
|
# Put your actual configuration here
|
|
# ----------------------------------
|
|
#
|
|
# If you want to allow non-local connections, you need to add more
|
|
# "host" records. In that case you will also need to make PostgreSQL
|
|
# listen on a non-local interface via the listen_addresses
|
|
# configuration parameter, or via the -i or -h command line switches.
|
|
|
|
|
|
|
|
|
|
# DO NOT DISABLE!
|
|
# If you change this first entry you will need to make sure that the
|
|
# database superuser can access the database using some other method.
|
|
# Noninteractive access to all databases is required during automatic
|
|
# maintenance (custom daily cronjobs, replication, and similar tasks).
|
|
#
|
|
# Database administrative login by Unix domain socket
|
|
local all postgres peer
|
|
|
|
# TYPE DATABASE USER ADDRESS METHOD
|
|
|
|
# "local" is for Unix domain socket connections only
|
|
local all all peer
|
|
# IPv4 local connections:
|
|
host all all 127.0.0.1/32 md5
|
|
# IPv6 local connections:
|
|
host all all ::1/128 md5
|
|
# Allow replication connections from localhost, by a user with the
|
|
# replication privilege.
|
|
#local replication postgres peer
|
|
#host replication postgres 127.0.0.1/32 md5
|
|
#host replication postgres ::1/128 md5
|
|
|
|
# App frontends
|
|
hostssl zulip zulip 10.0.8.0/24 cert # us-west-2b
|
|
hostssl zulip zulip 10.0.108.0/24 cert # us-west-2a
|
|
hostssl zulip zulip 10.0.208.0/24 cert # us-west-2c
|
|
|
|
# Test servers with DB access
|
|
hostssl zulip zulip 10.0.28.0/24 cert # us-west-2b
|
|
hostssl zulip zulip 10.0.128.0/24 cert # us-west-2a
|
|
hostssl zulip zulip 10.0.228.0/24 cert # us-west-2c
|
|
|
|
# Databases
|
|
# TODO: use certs
|
|
hostssl replication replicator 10.0.16.0/24 md5 # us-west-2b
|
|
hostssl replication replicator 10.0.116.0/24 md5 # us-west-2a
|
|
hostssl replication replicator 10.0.216.0/24 md5 # us-west-2c
|
|
|
|
# non-VPC entries
|
|
hostssl zulip zulip 10.254.4.7/32 cert # prod0
|
|
hostssl zulip zulip 10.226.168.170/32 cert # test1
|
|
hostssl zulip zulip 54.201.95.104/32 cert # staging public IP
|
|
hostssl zulip zulip 54.200.19.65/32 cert # prod0 public IP
|
|
|
|
|
|
# TODO: use certs
|
|
hostssl replication replicator 10.244.48.12/32 md5 # postgres1
|
|
hostssl replication replicator 54.201.105.241/32 md5 # postgres3 public IP
|