First recipes
This commit is contained in:
15
recipes/alpine/provisionning/alpine-3.16-install.sh
Normal file
15
recipes/alpine/provisionning/alpine-3.16-install.sh
Normal file
@ -0,0 +1,15 @@
|
||||
#!/bin/sh
|
||||
#set -xeo pipefail
|
||||
|
||||
# Run the installer
|
||||
yes | setup-alpine -e -f install.conf
|
||||
|
||||
# Copy ssh keys
|
||||
echo "Copy packer ssh key"
|
||||
mount /dev/vg0/lv_root /mnt
|
||||
cp -rp .ssh /mnt/root/
|
||||
sync
|
||||
umount /mnt
|
||||
|
||||
echo "Rebooting the host after install"
|
||||
reboot -nf
|
21
recipes/alpine/provisionning/alpine-3.16-postinstall.sh
Normal file
21
recipes/alpine/provisionning/alpine-3.16-postinstall.sh
Normal file
@ -0,0 +1,21 @@
|
||||
#!/bin/sh
|
||||
set -xeo pipefail
|
||||
|
||||
apk add --no-cache wget curl jq haveged ca-certificates rsyslog
|
||||
|
||||
rc-update add haveged boot
|
||||
rc-update add rsyslog boot
|
||||
rc-update add sshd boot
|
||||
|
||||
# Generate root password
|
||||
pass=$(openssl rand -base64 32 | tee -a .secret)
|
||||
chmod 600 .secret
|
||||
echo -e "${pass}\n${pass}" | passwd
|
||||
|
||||
# Remove expect package
|
||||
|
||||
# Prevent logs spamming like "process '/sbin/getty -L 0 ttyS0 vt100' (pid 2516) exited. Scheduling for restart."
|
||||
# We don't need an access to ttyS0
|
||||
sed -i 's@^\(ttyS0::respawn.*\)@#\1@' /etc/inittab
|
||||
|
||||
sync
|
1
recipes/alpine/provisionning/alpine-3.17-install.sh
Symbolic link
1
recipes/alpine/provisionning/alpine-3.17-install.sh
Symbolic link
@ -0,0 +1 @@
|
||||
alpine-3.16-install.sh
|
1
recipes/alpine/provisionning/alpine-3.17-postinstall.sh
Symbolic link
1
recipes/alpine/provisionning/alpine-3.17-postinstall.sh
Symbolic link
@ -0,0 +1 @@
|
||||
alpine-3.16-postinstall.sh
|
@ -0,0 +1,181 @@
|
||||
#!/bin/sh
|
||||
|
||||
ENV_FILE=${ENV_FILE:-/var/run/one-context/one_env}
|
||||
LOG_FILE="/var/log/initkubernets.log"
|
||||
FIRST_BOOT="/var/run/firstboot.flag"
|
||||
|
||||
infoLog() {
|
||||
echo "Info: $@" | tee -a ${LOG_FILE}
|
||||
}
|
||||
|
||||
errorLog() {
|
||||
echo "Error: $@" | tee -a ${LOG_FILE}
|
||||
}
|
||||
|
||||
waitReadyState() {
|
||||
local vmID="${1}"
|
||||
local timeout="${2}"
|
||||
|
||||
local tick=0
|
||||
while true ;do
|
||||
local ready=$(onegate vm show ${vmID} --json | jq -rc ".VM.USER_TEMPLATE.READY")
|
||||
if [ "${ready}" = "YES" ];then
|
||||
return 0
|
||||
elif [ "${timeout}" -eq "${tick}" ];then
|
||||
return ${timeout}
|
||||
else
|
||||
sleep 1
|
||||
tick=$((tick+1))
|
||||
fi
|
||||
done
|
||||
}
|
||||
|
||||
returnToken() {
|
||||
infoLog "Returning tokens"
|
||||
local caSecretKey="${1}"
|
||||
local caToken=$(openssl x509 -in /etc/kubernetes/pki/ca.crt -noout -pubkey | openssl rsa -pubin -outform DER 2>/dev/null | sha256sum | cut -d' ' -f1)
|
||||
local kubeToken=$(kubeadm token list | awk '/authentication,signing.*The default*/ {print $1}')
|
||||
local masterAddr=$(awk -F '/' '/server/ {print $3}' /etc/kubernetes/admin.conf)
|
||||
|
||||
if [ -n "${ONEGATE_ENDPOINT}" ];then
|
||||
infoLog "Onegate detected"
|
||||
data="READY=YES"
|
||||
data="${data} MASTER_ADDR=${masterAddr}"
|
||||
data="${data} MASTER_TOKEN=${kubeToken}"
|
||||
data="${data} MASTER_CA_TOKEN=sha256:${caToken}"
|
||||
data="${data} MASTER_CA_SECRET_KEY=${caSecretKey}"
|
||||
onegate vm update --data "${data}"
|
||||
infoLog "Onegate data seted"
|
||||
else
|
||||
infoLog "Onegate is not present"
|
||||
echo "${masterAdd} ${kubeToken} ${caToken}" >> /root/kube.token
|
||||
infoLog "Tokens are available at /root/kube.token"
|
||||
fi
|
||||
}
|
||||
|
||||
joinCluster() {
|
||||
local master="${MASTER_ADDR}"
|
||||
local token="${MASTER_TOKEN}"
|
||||
local caToken="${MASTER_CA_TOKEN}"
|
||||
local caSecretKey="${MASTER_CA_SECRET_KEY}"
|
||||
local sname="${SERVICE_NAME}"
|
||||
|
||||
if [ -n "${ONEGATE_ENDPOINT}" ];then
|
||||
local masterID=$(onegate service show --json | jq -c '.SERVICE.roles[] | select(.name == "leader") | .nodes[0].deploy_id')
|
||||
if [ "${?}" -eq 0 ]; then
|
||||
waitReadyState ${masterID} 600
|
||||
if [ "${?}" -ne 0 ];then
|
||||
errorLog "Master node is node ready after 600s"
|
||||
return 3
|
||||
fi
|
||||
local masterInfo=$(onegate vm show ${masterID} --json | \
|
||||
jq -cr ".VM.USER_TEMPLATE.MASTER_ADDR, .VM.USER_TEMPLATE.MASTER_TOKEN, .VM.USER_TEMPLATE.MASTER_CA_TOKEN,.VM.USER_TEMPLATE.MASTER_CA_SECRET_KEY, .VM.TEMPLATE.NIC[0].IP")
|
||||
master=$(echo ${masterInfo} | cut -d " " -f 1)
|
||||
token=$(echo ${masterInfo} | cut -d " " -f 2)
|
||||
caToken=$(echo ${masterInfo} | cut -d " " -f 3)
|
||||
caSecretKey=$(echo ${masterInfo} | cut -d " " -f 4)
|
||||
masterIP=$(echo ${masterInfo} | cut -d " " -f 5)
|
||||
sname=$(onegate service show --json | jq -cr ".SERVICE.name")
|
||||
fi
|
||||
|
||||
# Setting dns resolution for cluster
|
||||
echo "${masterIP} ${sname}" >> /etc/hosts
|
||||
onegate service show --json | jq -rc '.SERVICE.roles[].nodes[].vm_info.VM | .TEMPLATE.NIC[].IP + " " + .NAME' >> /etc/hosts
|
||||
fi
|
||||
if [ -n "${master}" ] & [ -n "${token}" ] & [ -n "${caToken}" ];then
|
||||
opts="--node-name $(hostname -f)"
|
||||
opts="${opts} --token ${token}"
|
||||
opts="${opts} --discovery-token-ca-cert-hash ${caToken}"
|
||||
if [ -n "${1}" ];then
|
||||
opts="${opts} --control-plane"
|
||||
opts="${opts} --certificate-key ${caSecretKey}"
|
||||
fi
|
||||
opts="${opts} ${master}"
|
||||
|
||||
kubeadm join ${opts} | tee -a "${LOG_FILE}"
|
||||
else
|
||||
errorLog "Something is missing, can't join the cluster:"
|
||||
errorLog " Master addr: [${master}]"
|
||||
errorLog " Master token: [${token}]"
|
||||
errorLog " Master CA token: [${caToken}]"
|
||||
return 3
|
||||
fi
|
||||
}
|
||||
|
||||
getServiceName() {
|
||||
local sname=$(onegate service show --json | jq -cr ".SERVICE.name")
|
||||
local tmout=30
|
||||
local tick=0
|
||||
while true ;do
|
||||
if [ -z "${sname}" ];then
|
||||
sname=$(onegate service show --json | jq -cr ".SERVICE.name")
|
||||
else
|
||||
echo ${sname}
|
||||
return 0
|
||||
fi
|
||||
sleep 1
|
||||
tick=$((tick+1))
|
||||
if [ ${tmout} -eq ${tick} ];then
|
||||
hostname -f
|
||||
return 3
|
||||
fi
|
||||
done
|
||||
}
|
||||
|
||||
initLeader() {
|
||||
sname="$(hostname -f)"
|
||||
|
||||
if [ -n "${ONEGATE_ENDPOINT}" ];then
|
||||
sname=$(getServiceName)
|
||||
sip=$(onegate vm show --json | jq -rc ".VM.TEMPLATE.NIC[0].IP")
|
||||
echo "${sip} ${sname} $(hostname -f)" >> /etc/hosts
|
||||
onegate service show --json | jq -rc '.SERVICE.roles[].nodes[].vm_info.VM | .TEMPLATE.NIC[].IP + " " + .NAME' >> /etc/hosts
|
||||
fi
|
||||
|
||||
caSecretKey=$(date | sha256sum | awk '{print $1}')
|
||||
|
||||
infoLog "Kubernetes init started"
|
||||
kubeadm init --pod-network-cidr=10.244.0.0/16 \
|
||||
--node-name="${SET_HOSTNAME}" \
|
||||
--control-plane-endpoint "${sname}:6443" \
|
||||
--upload-certs --certificate-key "${caSecretKey}" | tee -a "${LOG_FILE}"
|
||||
infoLog "Kubernetes init ended"
|
||||
|
||||
infoLog "Configuring kubectl"
|
||||
mkdir /root/.kube
|
||||
ln -s /etc/kubernetes/admin.conf /root/.kube/config
|
||||
infoLog "kubectl configured"
|
||||
|
||||
infoLog "Installing cilium"
|
||||
sleep 20
|
||||
kubectl config view --minify -o jsonpath='{.clusters[].name}'
|
||||
sleep 20
|
||||
cilium install --helm-set 'cni.binPath=/usr/libexec/cni' --wait | tee -a "${LOG_FILE}"
|
||||
infoLog "Cilium is installed"
|
||||
|
||||
returnToken "${caSecretKey}"
|
||||
}
|
||||
|
||||
initKube() {
|
||||
if [ "${SERVER_ROLE}" == "leader" ];then
|
||||
initLeader
|
||||
elif [ "${SERVER_ROLE}" == "worker" ];then
|
||||
joinCluster
|
||||
elif [ "${SERVER_ROLE}" == "master" ];then
|
||||
joinCluster "${SERVER_ROLE}"
|
||||
fi
|
||||
touch ${FIRST_BOOT}
|
||||
infoLog "Kubernetes cluster init is finished"
|
||||
}
|
||||
|
||||
if [ -f "${ENV_FILE}" ]; then
|
||||
. "${ENV_FILE}"
|
||||
fi
|
||||
|
||||
if [ -f "${FIRST_BOOT}" ];then
|
||||
exit 0
|
||||
else
|
||||
uuidgen > /etc/machine-id
|
||||
swapoff -a # Make sure swap is disabled
|
||||
initKube &
|
||||
fi
|
@ -0,0 +1,3 @@
|
||||
#!/bin/sh
|
||||
|
||||
mount --make-rshared /
|
@ -0,0 +1,25 @@
|
||||
#!/bin/sh
|
||||
|
||||
FL_VERSIONS="current 3374.2.0"
|
||||
MATCHBOX_DIR="/var/lib/matchbox"
|
||||
ASSETS_DIR="${MATCHBOX_DIR}/assets/"
|
||||
|
||||
GPG_FNAME="Flatcar_Image_Signing_Key.asc"
|
||||
GPG_KEYS_URL="https://www.flatcar.org/security/image-signing-key/"
|
||||
|
||||
cd /tmp
|
||||
curl -L -O ${GPG_KEYS_URL}/${GPG_FNAME}
|
||||
gpg --import --keyid-format LONG ${GPG_FNAME}
|
||||
cd -
|
||||
|
||||
echo "Provisionning matchbox with flatcar images"
|
||||
tout=30
|
||||
for version in ${FL_VERSIONS}; do
|
||||
for i in $(seq 1 ${tout});do
|
||||
echo " * ${FL_VERSIONS} stable image (try ${i})"
|
||||
/usr/local/bin/get-flatcar stable ${version} ${ASSETS_DIR}
|
||||
if [[ "${?}" -eq 0 ]]; then
|
||||
break
|
||||
fi
|
||||
done
|
||||
done
|
10
recipes/alpine/provisionning/conf/matchbox/inittftp.start
Normal file
10
recipes/alpine/provisionning/conf/matchbox/inittftp.start
Normal file
@ -0,0 +1,10 @@
|
||||
#!/bin/sh
|
||||
|
||||
dest="${1}"
|
||||
|
||||
ipxeEFISource="http://boot.ipxe.org/ipxe.efi"
|
||||
kpxeSource="http://boot.ipxe.org/undionly.kpxe"
|
||||
|
||||
cd "${dest}"
|
||||
wget "${ipxeEFISource}"
|
||||
wget "${kpxeSource}"
|
@ -0,0 +1,13 @@
|
||||
#!/bin/sh
|
||||
|
||||
CONF="/etc/conf.d/jenkins-slave"
|
||||
if [ -e "/etc/jenkins-slave.conf" ]; then
|
||||
CONF="/etc/jenkins-slave.conf"
|
||||
fi
|
||||
|
||||
TOTAL_MEMORY=$(cat /proc/meminfo | grep MemTotal | awk '{ printf "%sg", int($2/1024/1024)+1 }')
|
||||
sed -i "s|^JENKINS_SLAVE_NAME=.*$|JENKINS_SLAVE_NAME='slave-$ETH0_IP'|" "${CONF}"
|
||||
sed -i "s|^JENKINS_SLAVE_USERNAME=.*$|JENKINS_SLAVE_USERNAME='$JENKINS_SLAVE_USERNAME'|" "${CONF}"
|
||||
sed -i "s|^JENKINS_SLAVE_PASSWORD=.*$|JENKINS_SLAVE_PASSWORD='$JENKINS_SLAVE_PASSWORD'|" "${CONF}"
|
||||
sed -i "s|^JENKINS_MASTER_URL=.*$|JENKINS_MASTER_URL='$JENKINS_MASTER_URL'|" "${CONF}"
|
||||
sed -i "s|^JENKINS_SLAVE_LABELS=.*$|JENKINS_SLAVE_LABELS='docker docker-compose mem-$TOTAL_MEMORY $JENKINS_SLAVE_LABELS'|" "${CONF}"
|
@ -0,0 +1,31 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
ENV_FILE=${ENV_FILE:-/var/run/one-context/one_env}
|
||||
|
||||
# $TOKENTXT is available only through the env. file
|
||||
# shellcheck disable=SC1090
|
||||
if [ -f "${ENV_FILE}" ]; then
|
||||
. "${ENV_FILE}"
|
||||
fi
|
||||
|
||||
###
|
||||
|
||||
if [ -n "${GITLAB_URL}" ]; then
|
||||
if command -v gitlab-runner; then
|
||||
if [ -n "${GITLAB_SHELL}" ]; then
|
||||
opts="--shell=${GITLAB_SHELL}"
|
||||
fi
|
||||
# shellcheck disable=SC2086
|
||||
gitlab-runner register \
|
||||
--non-interactive \
|
||||
--url="${GITLAB_URL}" \
|
||||
--registration-token="${GITLAB_TOKEN}" \
|
||||
--executor="${GITLAB_EXECUTOR}" \
|
||||
--description="${GITLAB_RUNNER_NAME}" \
|
||||
--tag-list="${GITLAB_TAG_LIST}" \
|
||||
--locked=false \
|
||||
--access-level=not_protected \
|
||||
--run-untagged=false \
|
||||
"${opts}"
|
||||
fi
|
||||
fi
|
@ -0,0 +1,80 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
#
|
||||
# Generate all the configuration files
|
||||
# Get all the values from the VLS_DIR
|
||||
# Process each template from the TPL_DIR with this values
|
||||
#
|
||||
|
||||
ENV_FILE=${ENV_FILE:-/var/run/one-context/one_env}
|
||||
TPL_DIR="/usr/share/builder/templates"
|
||||
VLS_DIR="/usr/share/builder/values"
|
||||
CONFIG=""
|
||||
|
||||
. ${ENV_FILE}
|
||||
|
||||
BTR="$(command -v btr)"
|
||||
if [ "${?}" -ne 0 ]; then
|
||||
echo "Warning: Nothing to do the templater is not installed"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
if [ ! -e "${TPL_DIR}" ]; then
|
||||
echo "Error: The template dir is missing (${TPL_DIR})"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if [ ! -e "${VLS_DIR}" ]; then
|
||||
echo "Error: The template dir is missing (${VLS_DIR})"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
jsonQuery() {
|
||||
local data="${1}"
|
||||
local query="${2}"
|
||||
echo "${data}" | jq -cr "${query}"
|
||||
}
|
||||
|
||||
# NAME: @jsonMerge
|
||||
# AIM: Merge two json structures
|
||||
# NOTES:
|
||||
# The last one has de last word
|
||||
# if you have the same key in A and B
|
||||
# this keeps the value of the B structure.
|
||||
# PARAMS:
|
||||
# $1: original JSON Structure
|
||||
# $2: updated JSON Structure
|
||||
jsonMerge() {
|
||||
local data="${1}"
|
||||
local data2="${2}"
|
||||
|
||||
echo "${data} ${data2}" | jq -cr -s ".[0] * .[1]"
|
||||
}
|
||||
|
||||
getValues() {
|
||||
|
||||
local values=""
|
||||
|
||||
for file in $(find ${VLS_DIR} -name "*.json"); do
|
||||
values="${values}$(cat ${file})"
|
||||
done
|
||||
|
||||
if [ -n "${RAW_CONFIG}" ]; then
|
||||
values="$(jsonMerge ${values} ${RAW_CONFIG})"
|
||||
fi
|
||||
|
||||
for key in $(echo ${values} | jq -cr '.|keys[]'); do
|
||||
ukey=${key^^}
|
||||
if [ -n "${!ukey}" ]; then
|
||||
values="$(jsonMerge "${values}" "{\"${key}\":\"${!ukey}\"}")"
|
||||
fi
|
||||
done
|
||||
echo ${values}
|
||||
}
|
||||
|
||||
processTemplates() {
|
||||
${BTR} -t ${TPL_DIR} -c "${1}"
|
||||
}
|
||||
VALUES=$(getValues)
|
||||
echo ${VALUES}
|
||||
processTemplates "${VALUES}"
|
21
recipes/alpine/provisionning/conf/one-context/net-97-k3s
Normal file
21
recipes/alpine/provisionning/conf/one-context/net-97-k3s
Normal file
@ -0,0 +1,21 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
ENV_FILE=${ENV_FILE:-/var/run/one-context/one_env}
|
||||
|
||||
# $TOKENTXT is available only through the env. file
|
||||
# shellcheck disable=SC1090
|
||||
if [ -f "${ENV_FILE}" ]; then
|
||||
. "${ENV_FILE}"
|
||||
fi
|
||||
|
||||
###
|
||||
|
||||
if [ -n "${K3S_ROLE}" ]; then
|
||||
if [ "${K3S_ROLE}" = "server" ]; then
|
||||
rc-update add dnsmasq default
|
||||
service dnsmasq start
|
||||
|
||||
rc-update add k3s default
|
||||
service k3s start
|
||||
fi
|
||||
fi
|
5
recipes/alpine/provisionning/k3s.sh
Normal file
5
recipes/alpine/provisionning/k3s.sh
Normal file
@ -0,0 +1,5 @@
|
||||
#!/bin/sh
|
||||
|
||||
echo "export KUBECONFIG=/etc/rancher/k3s/k3s.yaml" >> /root/.profile
|
||||
|
||||
exit 0
|
18
recipes/alpine/provisionning/kubernetes.sh
Normal file
18
recipes/alpine/provisionning/kubernetes.sh
Normal file
@ -0,0 +1,18 @@
|
||||
#!/bin/sh
|
||||
|
||||
mount --make-rshared /
|
||||
|
||||
modprobe br_netfilter
|
||||
|
||||
uuidgen > /etc/machine-id
|
||||
|
||||
sysctl -w net.bridge.bridge-nf-call-iptables=1
|
||||
|
||||
# Remove swap
|
||||
cat /etc/fstab | grep -v swap > temp.fstab
|
||||
cat temp.fstab > /etc/fstab
|
||||
rm temp.fstab
|
||||
swapoff -a
|
||||
|
||||
#lvremove -y /dev/vg0/lv_swap
|
||||
#lvextend -y -r -l +100%FREE /dev/vg0/lv_root
|
26
recipes/alpine/provisionning/letsencrypt.sh
Normal file
26
recipes/alpine/provisionning/letsencrypt.sh
Normal file
@ -0,0 +1,26 @@
|
||||
#!/bin/sh
|
||||
|
||||
set -eo pipefail
|
||||
|
||||
DESTDIR=/usr/local/share/ca-certificates
|
||||
UPDATE_CERTS_CMD=update-ca-certificates
|
||||
CERTS="$(cat <<EOF
|
||||
https://letsencrypt.org/certs/isrgrootx1.pem
|
||||
https://letsencrypt.org/certs/isrg-root-x2.pem
|
||||
https://letsencrypt.org/certs/lets-encrypt-r3.pem
|
||||
https://letsencrypt.org/certs/lets-encrypt-e1.pem
|
||||
https://letsencrypt.org/certs/lets-encrypt-r4.pem
|
||||
https://letsencrypt.org/certs/lets-encrypt-e2.pem
|
||||
EOF
|
||||
)"
|
||||
|
||||
cd "$DESTDIR"
|
||||
|
||||
for cert in $CERTS; do
|
||||
echo "Downloading '$cert'..."
|
||||
filename=$(basename "$cert")
|
||||
wget --tries=10 --timeout=30 -O "$filename" "$cert"
|
||||
#openssl x509 -in "$filename" -inform PEM -out "$filename.crt"
|
||||
done
|
||||
|
||||
$UPDATE_CERTS_CMD
|
38
recipes/alpine/provisionning/matchbox.sh
Normal file
38
recipes/alpine/provisionning/matchbox.sh
Normal file
@ -0,0 +1,38 @@
|
||||
#!/bin/sh
|
||||
|
||||
VERSION=0.9.1
|
||||
ARCH=amd64
|
||||
BIN="matchbox"
|
||||
FILENAME="matchbox-v${VERSION}-linux-${ARCH}.tar.gz"
|
||||
URL="https://github.com/poseidon/matchbox/releases/download/v${VERSION}/${FILENAME}"
|
||||
MATCHBOX_DIR="/var/lib/matchbox"
|
||||
ASSETS_DIR="${MATCHBOX_DIR}/assets/"
|
||||
MATCHBOX_USER="matchbox"
|
||||
FL_VERSIONS="current 3374.2.0"
|
||||
|
||||
apk add wget
|
||||
|
||||
echo "Downloading matchbox"
|
||||
cd /tmp
|
||||
wget -q --show-progress "${URL}"
|
||||
tar -xzvf "${FILENAME}"
|
||||
cd ./matchbox-v${VERSION}-linux-${ARCH}
|
||||
|
||||
echo "Installing matchbox"
|
||||
cp ${BIN} /usr/local/bin
|
||||
|
||||
echo "Installing get-flatcar"
|
||||
cp ./scripts/get-flatcar /usr/local/bin
|
||||
chmod +x /usr/local/bin/get-flatcar
|
||||
|
||||
useradd -U "${MATCHBOX_USER}"
|
||||
mkdir -p "${ASSETS_DIR}"
|
||||
chown -R "${MATCHBOX_USER}:${MATCHBOX_USER}" "${MATCHBOX_DIR}"
|
||||
chown -R "${MATCHBOX_USER}:${MATCHBOX_USER}" "${ASSETS_DIR}"
|
||||
|
||||
chown -R "${MATCHBOX_USER}:${MATCHBOX_USER}" "${ASSETS_DIR}"
|
||||
ls -lhaR ${ASSETS_DIR}
|
||||
|
||||
cp -rp ./scripts/tls /root
|
||||
|
||||
exit "${?}"
|
12
recipes/alpine/provisionning/one-context.sh
Normal file
12
recipes/alpine/provisionning/one-context.sh
Normal file
@ -0,0 +1,12 @@
|
||||
#!/bin/sh
|
||||
|
||||
set -e
|
||||
|
||||
ONE_CONTEXT_VERSION="6.4.0"
|
||||
ONE_CONTEXT_PKG_VERSION="1"
|
||||
PKG="one-context-${ONE_CONTEXT_VERSION}-r${ONE_CONTEXT_PKG_VERSION}.apk"
|
||||
PKG_URL="https://github.com/OpenNebula/addon-context-linux/releases/download/v${ONE_CONTEXT_VERSION}/${PKG}"
|
||||
|
||||
cd /tmp || exit 3
|
||||
wget -q --no-check-certificate ${PKG_URL}
|
||||
apk add --allow-untrusted --no-cache ${PKG}
|
102
recipes/alpine/provisionning/one-context/net-96-templater
Normal file
102
recipes/alpine/provisionning/one-context/net-96-templater
Normal file
@ -0,0 +1,102 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
#
|
||||
# Generate all the configuration files
|
||||
# Get all the values from the VLS_DIR
|
||||
# Process each template from the TPL_DIR with this values
|
||||
#
|
||||
|
||||
ENV_FILE=${ENV_FILE:-/var/run/one-context/one_env}
|
||||
TPL_DIR="/usr/share/builder/templates"
|
||||
VLS_DIR="/usr/share/builder/values"
|
||||
CONFIG=""
|
||||
|
||||
. ${ENV_FILE}
|
||||
|
||||
BTR="$(command -v btr)"
|
||||
if [ "${?}" -ne 0 ]; then
|
||||
echo "Warning: Nothing to do the templater is not installed"
|
||||
exit 0
|
||||
fi
|
||||
|
||||
if [ ! -e "${TPL_DIR}" ]; then
|
||||
echo "Error: The template dir is missing (${TPL_DIR})"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
if [ ! -e "${VLS_DIR}" ]; then
|
||||
echo "Error: The template dir is missing (${VLS_DIR})"
|
||||
exit 1
|
||||
fi
|
||||
|
||||
jsonQuery() {
|
||||
local data="${1}"
|
||||
local query="${2}"
|
||||
echo "${data}" | jq -cr "${query}"
|
||||
}
|
||||
|
||||
# NAME: @jsonMerge
|
||||
# AIM: Merge two json structures
|
||||
# NOTES:
|
||||
# The last one has de last word
|
||||
# if you have the same key in A and B
|
||||
# this keeps the value of the B structure.
|
||||
# PARAMS:
|
||||
# $1: original JSON Structure
|
||||
# $2: updated JSON Structure
|
||||
jsonMerge() {
|
||||
local data="${1}"
|
||||
local data2="${2}"
|
||||
|
||||
echo "${data} ${data2}" | jq -cr -s ".[0] * .[1]"
|
||||
}
|
||||
|
||||
jsonUpdateVal() {
|
||||
local json="${1}"
|
||||
local key="${2}"
|
||||
local value="${3}"
|
||||
|
||||
echo "${json}" | jq --arg a "${value}" "${key} = \$a"
|
||||
}
|
||||
|
||||
getValues() {
|
||||
|
||||
local values=""
|
||||
|
||||
for file in $(find ${VLS_DIR} -name "*.json"); do
|
||||
values="${values}$(cat ${file})"
|
||||
done
|
||||
|
||||
if [ -n "${RAW_CONFIG}" ]; then
|
||||
values="$(jsonMerge ${values} ${RAW_CONFIG})"
|
||||
fi
|
||||
|
||||
for svc in $(echo ${values} | jq -cr '.Services|keys[]'); do
|
||||
for key in $(echo ${values} | jq -cr ".Services.${svc}.Vars|keys[]"); do
|
||||
ukey=${key^^}
|
||||
vkeys="$(echo ${values} | jq -cr \".Services.${svc}.Vars.${key}\|keys[]\")"
|
||||
if [ ${?} -eq 0 ]; then
|
||||
for var in $(echo ${values} | jq -cr ".Services.${svc}.Vars.${key}|keys[]"); do
|
||||
uvar=${var^^}
|
||||
val=$(eval echo "\$${ukey}_${uvar}")
|
||||
if [ -n "${val}" ]; then
|
||||
values=$(jsonUpdateVal "${values}" ".Services.${svc}.Vars.${key}.${var}" "${val}")
|
||||
fi
|
||||
done
|
||||
else
|
||||
values=$(jsonUpdateVal "${values}" ".Services.${svc}.Vars.${key}" "${!ukey}")
|
||||
fi
|
||||
done
|
||||
done
|
||||
echo ${values}
|
||||
}
|
||||
|
||||
processTemplates() {
|
||||
${BTR} -t ${TPL_DIR} -c "${1}"
|
||||
}
|
||||
|
||||
VALUES=$(getValues)
|
||||
file=$(mktemp)
|
||||
echo "${VALUES}" > "${file}"
|
||||
processTemplates "${file}"
|
||||
rm -rf "${file}"
|
21
recipes/alpine/provisionning/one-context/net-97-k3s
Normal file
21
recipes/alpine/provisionning/one-context/net-97-k3s
Normal file
@ -0,0 +1,21 @@
|
||||
#!/usr/bin/env bash
|
||||
|
||||
ENV_FILE=${ENV_FILE:-/var/run/one-context/one_env}
|
||||
|
||||
# $TOKENTXT is available only through the env. file
|
||||
# shellcheck disable=SC1090
|
||||
if [ -f "${ENV_FILE}" ]; then
|
||||
. "${ENV_FILE}"
|
||||
fi
|
||||
|
||||
###
|
||||
|
||||
if [ -n "${K3S_ROLE}" ]; then
|
||||
if [ "${K3S_ROLE}" = "server" ]; then
|
||||
rc-update add dnsmasq default
|
||||
service dnsmasq start
|
||||
|
||||
rc-update add k3s default
|
||||
service k3s start
|
||||
fi
|
||||
fi
|
23
recipes/alpine/provisionning/templater-install.sh
Normal file
23
recipes/alpine/provisionning/templater-install.sh
Normal file
@ -0,0 +1,23 @@
|
||||
#!/bin/sh
|
||||
|
||||
set -ex
|
||||
|
||||
TOOL_DIR="${1:-/usr/local/bin}"
|
||||
TOOL_USER="${2:-root}"
|
||||
TOOL_GROUP="${3:-root}"
|
||||
ATTACHMENT_URL="https://forge.cadoles.com/attachments/"
|
||||
|
||||
installTool() {
|
||||
NAME="${1}"
|
||||
URL="${2}"
|
||||
|
||||
curl -k -o ${TOOL_DIR}/${NAME} ${URL}
|
||||
chmod +x ${TOOL_DIR}/${NAME}
|
||||
}
|
||||
|
||||
apk add curl
|
||||
|
||||
# Install templater
|
||||
installTool "tpr" "https://forge.cadoles.com/attachments/242b3cba-8d07-4b89-80ab-7c12253a8524"
|
||||
# Install bootstraper
|
||||
installTool "btr" "https://forge.cadoles.com/attachments/e8442b2a-2065-4282-b4a4-648681fa044c"
|
Reference in New Issue
Block a user