Final steps to make Code Manager work
- Moved ssh key generation and git deploy key out of the puppetmaster profile and into zack_r10k and code_manager - Swapped code manager into the all_in_one role - Made a 2015.2 all_in_one role if users prefer to use it - Conditionally move all existing code out of environmentpath to allow file sync to sync files - Update the README to compliment the new puppet code
This commit is contained in:
parent
1b0f63be83
commit
cc34e25fd5
73
README.md
73
README.md
@ -1,4 +1,4 @@
|
|||||||
# Before Starting:
|
# Before Starting:
|
||||||
|
|
||||||
This control repo and the steps below are intended to be used during a new installation of PE.
|
This control repo and the steps below are intended to be used during a new installation of PE.
|
||||||
|
|
||||||
@ -17,15 +17,15 @@ extension_requests:
|
|||||||
1.3.6.1.4.1.34380.1.1.13: 'all_in_one_pe'
|
1.3.6.1.4.1.34380.1.1.13: 'all_in_one_pe'
|
||||||
```
|
```
|
||||||
|
|
||||||
### If You Have Not Installed PE
|
### If You Have Not Installed PE
|
||||||
|
|
||||||
Good then you can proceed forward and the trusted fact will be used when you get to the install step.
|
Good then you can proceed forward and the trusted fact will be used when you get to the install step.
|
||||||
|
|
||||||
### If You Have Already Installed PE
|
### If You Have Already Installed PE
|
||||||
|
|
||||||
Trusted facts are created at the time a CSR is generated. So, we need to regenerate the certificate on the master for the above trusted fact to be created.
|
Trusted facts are created at the time a CSR is generated. So, we need to regenerate the certificate on the master for the above trusted fact to be created.
|
||||||
|
|
||||||
Follow this document to regenerate the certificate on your master.
|
Follow this document to regenerate the certificate on your master.
|
||||||
|
|
||||||
http://docs.puppetlabs.com/pe/latest/regenerate_certs_master.html
|
http://docs.puppetlabs.com/pe/latest/regenerate_certs_master.html
|
||||||
|
|
||||||
@ -53,20 +53,20 @@ http://docs.puppetlabs.com/pe/latest/regenerate_certs_master.html
|
|||||||
- In the left hand pane, select memembers
|
- In the left hand pane, select memembers
|
||||||
- Add the `r10k_api_user` with `master` permissions
|
- Add the `r10k_api_user` with `master` permissions
|
||||||
|
|
||||||
7. Add your user to the `puppet` group as well
|
7. Add your user to the `puppet` group as well
|
||||||
|
|
||||||
8. Create a project called `control-repo` and set the Namespace to be the `puppet` group
|
8. Create a project called `control-repo` and set the Namespace to be the `puppet` group
|
||||||
|
|
||||||
9. Logout of root and login as the `r10k_api_user`
|
9. Logout of root and login as the `r10k_api_user`
|
||||||
- Go to profile settings -> account ( https://<your_gitlab_server>/profile/account )
|
- Go to profile settings -> account ( https://<your_gitlab_server>/profile/account )
|
||||||
- Copy the api token
|
- Copy the api token
|
||||||
|
|
||||||
10. Clone this control repository to your laptop/workstation
|
10. Clone this control repository to your laptop/workstation
|
||||||
- `git clone <repository url>`
|
- `git clone <repository url>`
|
||||||
- `cd control-repo`
|
- `cd control-repo`
|
||||||
|
|
||||||
11. `git mv hieradata/nodes/example-puppet-master.yaml hieradata/nodes/<fqdn_of_your_puppet_master>.yaml`
|
11. `git mv hieradata/nodes/example-puppet-master.yaml hieradata/nodes/<fqdn_of_your_puppet_master>.yaml`
|
||||||
- Open `hieradata/nodes/<fqdn_of_your_puppet_master>.yaml`
|
- Open `hieradata/nodes/<fqdn_of_your_puppet_master>.yaml`
|
||||||
- edit `gms_api_token` to be your api token
|
- edit `gms_api_token` to be your api token
|
||||||
- edit `git_management_system` to be 'gitlab'
|
- edit `git_management_system` to be 'gitlab'
|
||||||
- edit the `gms_server_url`
|
- edit the `gms_server_url`
|
||||||
@ -99,7 +99,7 @@ Coming soon!
|
|||||||
###Install PE
|
###Install PE
|
||||||
|
|
||||||
1. Download the latest version of the PE installer for your platform and copy it to your master
|
1. Download the latest version of the PE installer for your platform and copy it to your master
|
||||||
- https://puppetlabs.com/download-puppet-enterprise
|
- https://puppetlabs.com/download-puppet-enterprise
|
||||||
2. Expand the tarball and `cd` into the directory
|
2. Expand the tarball and `cd` into the directory
|
||||||
3. Run `puppet-enterprise-installer` to install
|
3. Run `puppet-enterprise-installer` to install
|
||||||
|
|
||||||
@ -109,34 +109,50 @@ http://docs.puppetlabs.com/pe/latest/install_basic.html
|
|||||||
|
|
||||||
###Get the Control-Repo Deployed On Your Master
|
###Get the Control-Repo Deployed On Your Master
|
||||||
|
|
||||||
At this point you have my control-repo code deployed into your git server. However, we have one final challenge getting that code onto your puppet master. In the end state the master will pull code from the git server via r10k, however, at this moment your puppet master doesn't have credentials to get code from the git server.
|
At this point you have our control-repo code deployed into your git server. However, we have one final challenge: getting that code onto your puppet master. In the end state the master will pull code from the git server via r10k, however, at this moment your puppet master doesn't have credentials to get code from the git server.
|
||||||
|
|
||||||
So, we'll set up a deploy key in the git server that will allow a ssh-key we make to deploy the code and configure everything else.
|
So, we'll set up a deploy key in the git server that will allow a ssh-key we make to deploy the code and configure everything else.
|
||||||
|
|
||||||
1. On your puppet master, make an ssh key for r10k to connect to gitlab
|
1. On your puppet master, make an ssh key for r10k to connect to gitlab
|
||||||
- `/usr/bin/ssh-keygen -t rsa -b 2048 -C 'r10k' -f /root/.ssh/r10k_rsa -q -N ''`
|
- `/usr/bin/ssh-keygen -t rsa -b 2048 -C 'code_manager' -f /etc/puppetlabs/puppetserver/code_manager.key -q -N ''`
|
||||||
- http://doc.gitlab.com/ce/ssh/README.html
|
- http://doc.gitlab.com/ce/ssh/README.html
|
||||||
- https://help.github.com/articles/generating-ssh-keys/
|
- https://help.github.com/articles/generating-ssh-keys/
|
||||||
2. Create a deploy key on the `control-repo` project in Gitlab
|
2. Create a deploy key on the `control-repo` project in Gitlab
|
||||||
- Paste in the public key from above
|
- Paste in the public key from above
|
||||||
- `cat /root/.ssh/r10k_rsa.pub`
|
- `cat /etc/puppetlabs/puppetserver/code_manager.key.pub`
|
||||||
3. Follow https://docs.puppetlabs.com/pe/latest/r10k_config_console.html
|
3. Login to the PE console
|
||||||
- The remote is on the front page of the project in the gitlab UI
|
4. Select Access Control in the left hand panel
|
||||||
- git_settings should be:
|
5. On the User Roles page, add a new role called `Deploy Environments`
|
||||||
- `{"provider": "rugged",
|
- NOTE: Make sure to name it exactly as I have because the puppet code expects that exact name
|
||||||
"private_key": "/root/.ssh/r10k_rsa"}`
|
6. After creating the role click through and select the permissions tab
|
||||||
3. Run `puppet agent -t`
|
- Add Puppet Environment type, Deploy Code permission, and All object
|
||||||
|
- Add Tokens type, override default expiry permission
|
||||||
|
7. Still in the PE Console, navigate to the Classification page
|
||||||
|
- Click on the PE Master group
|
||||||
|
- Click the Classes tab
|
||||||
|
- Add the `puppet_enterprise::profile::master`
|
||||||
|
- Set the `r10k_remote` to the ssh url from the front page of your gitlab repo
|
||||||
|
- Set the `r10k_private_key` parameter to `/etc/puppetlabs/puppetserver/code_manager.key`
|
||||||
|
- Commit your changes
|
||||||
|
8. Run `puppet agent -t`
|
||||||
- Expect to see changes to `r10k.yaml`
|
- Expect to see changes to `r10k.yaml`
|
||||||
3. Run `r10k deploy environment -pv`
|
9. Run `r10k deploy environment -pv`
|
||||||
4. Run `puppet agent -t`
|
10. Run `puppet agent -t`
|
||||||
|
- Expect to see code manager enabled
|
||||||
|
10. `echo 'code_manager_mv_old_code=true' > /opt/puppetlabs/facter/facts.d/code_manager_mv_old_code.txt`
|
||||||
|
11. Run `puppet agent -t`
|
||||||
- Now you should see many more changes
|
- Now you should see many more changes
|
||||||
|
- Your code has been deployed with code manager now
|
||||||
|
|
||||||
|
## Test Code Manager
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Test The Zack/r10k Webhook
|
## Test The Zack/r10k Webhook
|
||||||
|
|
||||||
One of the components setup by this control-repo is that when you "push" code to your git server, the git server will inform the puppet master to run `r10k deploy environment -p`.
|
One of the components setup by this control-repo is that when you "push" code to your git server, the git server will inform the puppet master to run `r10k deploy environment -p`.
|
||||||
|
|
||||||
1. Edit README.md
|
1. Edit README.md
|
||||||
- Just add something to it
|
- Just add something to it
|
||||||
2. `git add README.md`
|
2. `git add README.md`
|
||||||
3. `git commit -m "edit README"`
|
3. `git commit -m "edit README"`
|
||||||
@ -144,16 +160,14 @@ One of the components setup by this control-repo is that when you "push" code to
|
|||||||
5. Allow the push to complete and then give it few seconds to complete
|
5. Allow the push to complete and then give it few seconds to complete
|
||||||
- Open `/etc/puppetlabs/code/environments/production/README.md` and confirm your change is present
|
- Open `/etc/puppetlabs/code/environments/production/README.md` and confirm your change is present
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
----
|
----
|
||||||
#Miscellaneous
|
#Miscellaneous
|
||||||
|
|
||||||
## If You Want to Install Pointing To This Repo on Github
|
## If You Want to Install Pointing To This Repo on Github
|
||||||
|
|
||||||
### Setting Up Gitlab
|
### Setting Up Gitlab
|
||||||
|
|
||||||
1. Install Gitlab on a server by specifying the following trusted fact on the soon-to-be Gitlab server and then [install the PE agent](http://docs.puppetlabs.com/pe/latest/install_agents.html#using-the-puppet-agent-package-installation-script).
|
1. Install Gitlab on a server by specifying the following trusted fact on the soon-to-be Gitlab server and then [install the PE agent](http://docs.puppetlabs.com/pe/latest/install_agents.html#using-the-puppet-agent-package-installation-script).
|
||||||
|
|
||||||
```
|
```
|
||||||
---
|
---
|
||||||
@ -164,7 +178,7 @@ One of the components setup by this control-repo is that when you "push" code to
|
|||||||
|
|
||||||
### Setting up Github
|
### Setting up Github
|
||||||
|
|
||||||
Not yet completed.
|
Not yet completed.
|
||||||
|
|
||||||
### Setting up Stash
|
### Setting up Stash
|
||||||
|
|
||||||
@ -173,6 +187,3 @@ Not yet completed.
|
|||||||
|
|
||||||
#TODO
|
#TODO
|
||||||
Flush out generating an answer file and then appending extra answers onto the end of it.
|
Flush out generating an answer file and then appending extra answers onto the end of it.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
@ -1,10 +1,10 @@
|
|||||||
class profile::code_manager {
|
class profile::code_manager {
|
||||||
|
|
||||||
$authenticate_webhook = hiera('puppet_enterprise::master::code_manager::authenticate_webhook', true)
|
$authenticate_webhook = hiera('puppet_enterprise::master::code_manager::authenticate_webhook', true)
|
||||||
|
|
||||||
$code_manager_service_user = 'code_manager_service_user'
|
$code_manager_service_user = 'code_manager_service_user'
|
||||||
$code_manager_service_user_password = fqdn_rand_string(40, '', "${code_manager_service_user}_password")
|
$code_manager_service_user_password = fqdn_rand_string(40, '', "${code_manager_service_user}_password")
|
||||||
|
|
||||||
#puppet_master_classifier_settings is a custom function
|
#puppet_master_classifier_settings is a custom function
|
||||||
$classifier_settings = puppet_master_classifer_settings()
|
$classifier_settings = puppet_master_classifer_settings()
|
||||||
$classifier_hostname = $classifier_settings['server']
|
$classifier_hostname = $classifier_settings['server']
|
||||||
@ -16,6 +16,19 @@ class profile::code_manager {
|
|||||||
$gms_api_token = hiera('gms_api_token', undef)
|
$gms_api_token = hiera('gms_api_token', undef)
|
||||||
$git_management_system = hiera('git_management_system', undef)
|
$git_management_system = hiera('git_management_system', undef)
|
||||||
|
|
||||||
|
$code_manager_ssh_key_file = '/etc/puppetlabs/puppetserver/code_manager.key'
|
||||||
|
exec { 'create code manager ssh key' :
|
||||||
|
command => "/usr/bin/ssh-keygen -t rsa -b 2048 -C 'code_manager' -f ${code_manager_ssh_key_file} -q -N ''",
|
||||||
|
creates => $code_manager_ssh_key_file,
|
||||||
|
}
|
||||||
|
|
||||||
|
file { $code_manager_ssh_key_file :
|
||||||
|
ensure => file,
|
||||||
|
owner => 'pe-puppet',
|
||||||
|
group => 'pe-puppet',
|
||||||
|
require => Exec['create code manager ssh key'],
|
||||||
|
}
|
||||||
|
|
||||||
#If files exist in the codedir code manager can't manage them unless pe-puppet can read them
|
#If files exist in the codedir code manager can't manage them unless pe-puppet can read them
|
||||||
exec { 'chown all environments to pe-puppet' :
|
exec { 'chown all environments to pe-puppet' :
|
||||||
command => "/bin/chown -R pe-puppet:pe-puppet ${::settings::codedir}",
|
command => "/bin/chown -R pe-puppet:pe-puppet ${::settings::codedir}",
|
||||||
@ -49,12 +62,33 @@ class profile::code_manager {
|
|||||||
require => [ Rbac_user[$code_manager_service_user], File[$token_directory] ],
|
require => [ Rbac_user[$code_manager_service_user], File[$token_directory] ],
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|
||||||
#this file cannont be read until the next run after the above exec
|
#this file cannont be read until the next run after the above exec
|
||||||
#because the file function runs on the master not on the agent
|
#because the file function runs on the master not on the agent
|
||||||
#so the file doesn't exist at the time the function is run
|
#so the file doesn't exist at the time the function is run
|
||||||
$rbac_token_file_contents = no_fail_file($token_filename)
|
$rbac_token_file_contents = no_fail_file($token_filename)
|
||||||
|
|
||||||
|
#Only mv code if this is at least the 2nd run of puppet
|
||||||
|
#Code manager needs to be enabled and puppet server restarted
|
||||||
|
#before this exec can complete. Gating on the token file
|
||||||
|
#ensures at least one run has completed
|
||||||
|
if $::code_manager_mv_old_code and !empty($rbac_token_file_contents) {
|
||||||
|
|
||||||
|
$timestamp = chomp(generate('/bin/date', '+%Y%d%m_%H:%M:%S'))
|
||||||
|
|
||||||
|
exec { 'mv files out of $environmentpath' :
|
||||||
|
command => "mkdir /etc/puppetlabs/env_back_${timestamp};
|
||||||
|
mv ${::settings::codedir}/environments/* /etc/puppetlabs/env_back_${timestamp}/;
|
||||||
|
rm /opt/puppetlabs/facter/facts.d/code_manager_mv_old_code.txt;
|
||||||
|
TOKEN=`/opt/puppetlabs/puppet/bin/ruby -e \"require 'json'; puts JSON.parse(File.read('${token_filename}'))['token']\"`;
|
||||||
|
/opt/puppetlabs/puppet/bin/curl -k -X POST -H 'Content-Type: application/json' \"https://${::trusted['certname']}:8170/code-manager/v1/deploys?token=\$TOKEN\" -d '{\"environments\": [\"${::environment}\"], \"wait\": true}';
|
||||||
|
/opt/puppetlabs/puppet/bin/curl -k -X POST -H 'Content-Type: application/json' \"https://${::trusted['certname']}:8170/code-manager/v1/deploys?token=\$TOKEN\" -d '{\"deploy-all\": true, \"wait\": true}';
|
||||||
|
sleep 15",
|
||||||
|
path => $::path,
|
||||||
|
logoutput => true,
|
||||||
|
require => Exec["Generate Token for ${code_manager_service_user}"],
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
if !empty($gms_api_token) {
|
if !empty($gms_api_token) {
|
||||||
if $authenticate_webhook and !empty($rbac_token_file_contents) {
|
if $authenticate_webhook and !empty($rbac_token_file_contents) {
|
||||||
|
|
||||||
@ -71,6 +105,16 @@ class profile::code_manager {
|
|||||||
default => $git_management_system,
|
default => $git_management_system,
|
||||||
}
|
}
|
||||||
|
|
||||||
|
git_deploy_key { "add_deploy_key_to_puppet_control-${::fqdn}":
|
||||||
|
ensure => present,
|
||||||
|
name => $::fqdn,
|
||||||
|
path => "${code_manager_ssh_key_file}.pub",
|
||||||
|
token => $gms_api_token,
|
||||||
|
project_name => 'puppet/control-repo',
|
||||||
|
server_url => hiera('gms_server_url'),
|
||||||
|
provider => $git_management_system,
|
||||||
|
}
|
||||||
|
|
||||||
git_webhook { "code_manager_post_receive_webhook-${::fqdn}" :
|
git_webhook { "code_manager_post_receive_webhook-${::fqdn}" :
|
||||||
ensure => present,
|
ensure => present,
|
||||||
webhook_url => "https://${::fqdn}:8170/code-manager/v1/webhook?type=${code_manager_webhook_type}${token_info}",
|
webhook_url => "https://${::fqdn}:8170/code-manager/v1/webhook?type=${code_manager_webhook_type}${token_info}",
|
||||||
|
@ -13,33 +13,6 @@ class profile::puppetmaster {
|
|||||||
notify => Service['pe-puppetserver'],
|
notify => Service['pe-puppetserver'],
|
||||||
}
|
}
|
||||||
|
|
||||||
#BEGIN - Generate an SSH key for r10k to connect to git
|
|
||||||
$r10k_ssh_key_file = '/root/.ssh/r10k_rsa'
|
|
||||||
exec { 'create r10k ssh key' :
|
|
||||||
command => "/usr/bin/ssh-keygen -t rsa -b 2048 -C 'r10k' -f ${r10k_ssh_key_file} -q -N ''",
|
|
||||||
creates => $r10k_ssh_key_file,
|
|
||||||
}
|
|
||||||
#END - Generate an SSH key for r10k to connect to git
|
|
||||||
|
|
||||||
#BEGIN - Add deploy key and webook to git management system
|
|
||||||
$git_management_system = hiera('git_management_system', undef)
|
|
||||||
$gms_api_token = hiera('gms_api_token', undef)
|
|
||||||
|
|
||||||
if !empty($gms_api_token) {
|
|
||||||
|
|
||||||
git_deploy_key { "add_deploy_key_to_puppet_control-${::fqdn}":
|
|
||||||
ensure => present,
|
|
||||||
name => $::fqdn,
|
|
||||||
path => "${r10k_ssh_key_file}.pub",
|
|
||||||
token => $gms_api_token,
|
|
||||||
project_name => 'puppet/control-repo',
|
|
||||||
server_url => hiera('gms_server_url'),
|
|
||||||
provider => $git_management_system,
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
|
||||||
#END - Add deploy key and webhook to git management system
|
|
||||||
|
|
||||||
#Lay down update-classes.sh for use in r10k postrun_command
|
#Lay down update-classes.sh for use in r10k postrun_command
|
||||||
#This is configured via the pe_r10k::postrun key in hiera
|
#This is configured via the pe_r10k::postrun key in hiera
|
||||||
file { '/usr/local/bin/update-classes.sh' :
|
file { '/usr/local/bin/update-classes.sh' :
|
||||||
|
@ -9,11 +9,9 @@ class profile::zack_r10k_webhook (
|
|||||||
$git_management_system = hiera('git_management_system', undef)
|
$git_management_system = hiera('git_management_system', undef)
|
||||||
|
|
||||||
if $use_mcollective {
|
if $use_mcollective {
|
||||||
|
|
||||||
class { 'r10k::mcollective':
|
class { 'r10k::mcollective':
|
||||||
notify => Service['mcollective'],
|
notify => Service['mcollective'],
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
class {'r10k::webhook::config':
|
class {'r10k::webhook::config':
|
||||||
@ -30,7 +28,23 @@ class profile::zack_r10k_webhook (
|
|||||||
require => Class['r10k::webhook::config'],
|
require => Class['r10k::webhook::config'],
|
||||||
}
|
}
|
||||||
|
|
||||||
|
$r10k_ssh_key_file = '/root/.ssh/r10k_rsa'
|
||||||
|
exec { 'create r10k ssh key' :
|
||||||
|
command => "/usr/bin/ssh-keygen -t rsa -b 2048 -C 'r10k' -f ${r10k_ssh_key_file} -q -N ''",
|
||||||
|
creates => $r10k_ssh_key_file,
|
||||||
|
}
|
||||||
|
|
||||||
if !empty($gms_api_token) {
|
if !empty($gms_api_token) {
|
||||||
|
git_deploy_key { "add_deploy_key_to_puppet_control-${::fqdn}":
|
||||||
|
ensure => present,
|
||||||
|
name => $::fqdn,
|
||||||
|
path => "${r10k_ssh_key_file}.pub",
|
||||||
|
token => $gms_api_token,
|
||||||
|
project_name => 'puppet/control-repo',
|
||||||
|
server_url => hiera('gms_server_url'),
|
||||||
|
provider => $git_management_system,
|
||||||
|
}
|
||||||
|
|
||||||
git_webhook { "web_post_receive_webhook-${::fqdn}" :
|
git_webhook { "web_post_receive_webhook-${::fqdn}" :
|
||||||
ensure => present,
|
ensure => present,
|
||||||
webhook_url => "https://${username}:${password}@${::fqdn}:8088/payload",
|
webhook_url => "https://${username}:${password}@${::fqdn}:8088/payload",
|
||||||
|
@ -1,7 +1,6 @@
|
|||||||
class role::all_in_one_pe {
|
class role::all_in_one_pe {
|
||||||
|
|
||||||
include profile::puppetmaster
|
include profile::puppetmaster
|
||||||
include profile::zack_r10k_webhook
|
|
||||||
include profile::code_manager
|
include profile::code_manager
|
||||||
|
|
||||||
}
|
}
|
||||||
|
6
site/role/manifests/all_in_one_pe_2015_2.pp
Normal file
6
site/role/manifests/all_in_one_pe_2015_2.pp
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
class role::all_in_one_pe_2015_2 {
|
||||||
|
|
||||||
|
include profile::puppetmaster
|
||||||
|
include profile::zack_r10k_webhook
|
||||||
|
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user