Puppet Class: profile::puppetserver

Defined in:
modules/profile/manifests/puppetserver.pp

Overview

SPDX-License-Identifier: Apache-2.0

Parameters:

  • hiera_data_dir (Stdlib::Unixpath) (defaults to: lookup('profile::puppetserver::hiera_data_dir'))

    the default location for hiera data

  • hierarchy (Array[Puppetserver::Hierarchy]) (defaults to: lookup('profile::puppetserver::hierarchy'))

    a hash of hierarchy to add to the hiera file

  • java_start_mem (Stdlib::Datasize) (defaults to: lookup('profile::puppetserver::java_start_mem'))

    the value to use for the java args -Xms

  • java_max_mem (Stdlib::Datasize) (defaults to: lookup('profile::puppetserver::java_max_mem'))

    the value to use for the java args -Xmx

  • code_dir (Stdlib::Unixpath) (defaults to: lookup('profile::puppetserver::code_dir'))

    the location where puppet looks for code

  • reports (Array[Puppetserver::Report,1]) (defaults to: lookup('profile::puppetserver::reports'))

    list of reports to configure

  • puppetdb_urls (Array[Stdlib::HTTPUrl]) (defaults to: lookup('profile::puppetserver::puppetdb_urls'))

    if present puppetdb will be configured using these urls

  • puppetdb_submit_only_urls (Array[Stdlib::HTTPUrl]) (defaults to: lookup('profile::puppetserver::puppetdb_submit_only_urls'))

    if present puppetdb will be configured to also use these urls for writes

  • enc_path (Optional[Stdlib::Unixpath]) (defaults to: lookup('profile::puppetserver::enc_path'))

    path to an enc to use

  • enc_source (Optional[Stdlib::Filesource]) (defaults to: lookup('profile::puppetserver::enc_source'))

    puppet file source for enc

  • max_active_instances (Optional[Integer[1]]) (defaults to: lookup('profile::puppetserver::max_active_instances', { 'default_value' => undef }))

    number of jruby instances to start, defaults to cpu count, this effectively is the max concurrency for compilation

  • listen_host (Optional[Stdlib::Host]) (defaults to: lookup('profile::puppetserver::listen_host', { 'default_value' => undef }))

    host to bind webserver socket

  • server_id (Stdlib::Fqdn) (defaults to: lookup('profile::puppetserver::server_id'))

    hostname for metrics and ca_server

  • autosign (Variant[Boolean, Stdlib::Unixpath]) (defaults to: lookup('profile::puppetserver::autosign', { 'default_value' => false }))

    if true autosign agent certs, if a path then use that script to validate

  • ca_server (Stdlib::Fqdn) (defaults to: lookup('profile::puppetserver::ca_server'))

    the fqdn of the ca_server

  • intermediate_ca (Boolean) (defaults to: lookup('profile::puppetserver::intermediate_ca'))

    configure puppet Ca with an intermediate CA

  • ca_public_key (Optional[Stdlib::Filesource]) (defaults to: lookup('profile::puppetserver::ca_public_key'))

    location of the intermediate ca content

  • ssldir_on_srv (Boolean) (defaults to: lookup('profile::puppetserver::ssldir_on_srv'))

    used on cloud-vps; it allows storing certs on a detachable volume

  • separate_ssldir (Boolean) (defaults to: lookup('profile::puppetserver::separate_ssldir'))

    used when the puppetserver is managed by a different puppet server #TODO remove this setting in favor of ssldir_on_srv

  • ca_crl (Optional[Stdlib::Filesource]) (defaults to: lookup('profile::puppetserver::ca_crl'))

    location of the intermediate crl content

  • ca_private_key_secret (Optional[String]) (defaults to: lookup('profile::puppetserver::ca_private_key_secret'))

    the content of the W

  • ca_allow_san (Boolean) (defaults to: lookup('profile::puppetserver::ca_allow_san'))

    whether to allow agents to request SANs

  • ca_name (Optional[String[1]]) (defaults to: lookup('profile::puppetserver::ca_name'))

    override the default Puppet CA name

  • git_pull (Boolean) (defaults to: lookup('profile::puppetserver::git_pull', { 'default_value' => true }))

    whether to pull puppet code from git, defaults to true

  • auto_restart (Boolean) (defaults to: lookup('profile::puppetserver::auto_restart'))

    if true changes to config files will cause the puppetserver to either restart or reload the puppetserver service

  • enable_jmx (Boolean) (defaults to: lookup('profile::puppetserver::enable_jmx'))
  • extra_mounts (Hash[String, Stdlib::Unixpath]) (defaults to: lookup('profile::puppetserver::extra_mounts'))

    hash of mount point name to path, mount point name will used in puppet:///<MOUNT POINT>

  • environment_timeout,

    number of seconds to cache code from an environment, or unlimited to never evict the cache

  • environment_timeout (Variant[ Enum['unlimited'], Integer ]) (defaults to: lookup('profile::puppetserver::environment_timeout'))


32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
# File 'modules/profile/manifests/puppetserver.pp', line 32

class profile::puppetserver (
    Stdlib::Fqdn                       $server_id                 = lookup('profile::puppetserver::server_id'),
    Stdlib::Unixpath                   $code_dir                  = lookup('profile::puppetserver::code_dir'),
    Stdlib::Unixpath                   $hiera_data_dir            = lookup('profile::puppetserver::hiera_data_dir'),
    Stdlib::Datasize                   $java_start_mem            = lookup('profile::puppetserver::java_start_mem'),
    Stdlib::Datasize                   $java_max_mem              = lookup('profile::puppetserver::java_max_mem'),
    Array[Puppetserver::Hierarchy]     $hierarchy                 = lookup('profile::puppetserver::hierarchy'),
    Array[Puppetserver::Report,1]      $reports                   = lookup('profile::puppetserver::reports'),
    Array[Stdlib::HTTPUrl]             $puppetdb_urls             = lookup('profile::puppetserver::puppetdb_urls'),
    Array[Stdlib::HTTPUrl]             $puppetdb_submit_only_urls = lookup('profile::puppetserver::puppetdb_submit_only_urls'),
    Optional[Stdlib::Unixpath]         $enc_path                  = lookup('profile::puppetserver::enc_path'),
    Optional[Stdlib::Filesource]       $enc_source                = lookup('profile::puppetserver::enc_source'),
    Optional[Integer[1]]               $max_active_instances      = lookup('profile::puppetserver::max_active_instances', { 'default_value' => undef }),
    Optional[Stdlib::Host]             $listen_host               = lookup('profile::puppetserver::listen_host', { 'default_value' => undef }),
    Variant[Boolean, Stdlib::Unixpath] $autosign                  = lookup('profile::puppetserver::autosign', { 'default_value' => false }),
    Boolean                            $git_pull                  = lookup('profile::puppetserver::git_pull', { 'default_value' => true }),
    Boolean                            $ssldir_on_srv             = lookup('profile::puppetserver::ssldir_on_srv'),
    Boolean                            $separate_ssldir           = lookup('profile::puppetserver::separate_ssldir'),
    Stdlib::Fqdn                       $ca_server                 = lookup('profile::puppetserver::ca_server'),
    Boolean                            $intermediate_ca           = lookup('profile::puppetserver::intermediate_ca'),
    Boolean                            $enable_jmx                = lookup('profile::puppetserver::enable_jmx'),
    Boolean                            $auto_restart              = lookup('profile::puppetserver::auto_restart'),
    Optional[Stdlib::Filesource]       $ca_public_key             = lookup('profile::puppetserver::ca_public_key'),
    Optional[Stdlib::Filesource]       $ca_crl                    = lookup('profile::puppetserver::ca_crl'),
    Optional[String]                   $ca_private_key_secret     = lookup('profile::puppetserver::ca_private_key_secret'),
    Boolean                            $ca_allow_san              = lookup('profile::puppetserver::ca_allow_san'),
    Optional[String[1]]                $ca_name                   = lookup('profile::puppetserver::ca_name'),
    Hash[String, Stdlib::Unixpath]     $extra_mounts              = lookup('profile::puppetserver::extra_mounts'),
    Variant[
        Enum['unlimited'],
        Integer
    ]                                  $environment_timeout       = lookup('profile::puppetserver::environment_timeout'),

) {
    $enable_ca = $ca_server == $facts['networking']['fqdn']
    if $git_pull {
        include profile::puppetserver::git
        $paths = {
            'ops'  => {
                'repo' => $profile::puppetserver::git::control_repo_dir,
                # TODO: link this with config master profile
                'sha1' => '/srv/config-master/puppet-sha1.txt',
            },
            # We have labsprivate on the puppetservers to ensure that we validate changes via
            # puppet-merge. Specifically we dont want the WMCS puppetserveres accidentally running
            # malicious modules injected into the private repo.  And to a lesser extent any
            # vulnerabilities that may be present via hiera injections.  e.g. injecting a user
            'labsprivate'  => {
                'repo' => "${profile::puppetserver::git::basedir}/labs/private",
                'sha1' => '/srv/config-master/puppet-sha1.txt',
            },
        }
        # TODO: once the migration is complete update to use ca_server instead
        class { 'merge_cli':
            #ca_server => $ca_server,
            ca_server => 'puppetmaster1001.eqiad.wment',
            masters   => $profile::puppetserver::git::servers,
            workers   => $profile::puppetserver::git::servers,
            paths     => $paths,
        }
        $g10k_sources = {
            'production'  => {
                'remote'  => $profile::puppetserver::git::control_repo_dir,
            },
        }
    } else {
        $g10k_sources = {}
    }

    $exluded_args = [
        'enc_source', 'git_pull', 'intermediate_ca',
        'ca_public_key', 'ca_crl', 'ca_private_key_secret',
    ]
    class { 'puppetserver':
        * => wmflib::resource::filter_params($exluded_args),
    }
    class { 'puppetserver::g10k':
        ensure  => stdlib::ensure(!$g10k_sources.empty),
        sources => $g10k_sources,
    }
    $config_dir = $puppetserver::puppetserver_config_dir
    $ssl_dir = $puppetserver::ssl_dir
    $ca_dir = $puppetserver::ca_dir
    $ca_private_key = $ca_private_key_secret.then |$x| { Sensitive(secret($x)) }
    class { 'puppetserver::ca':
        enable          => $enable_ca,
        intermediate_ca => $intermediate_ca,
        ca_public_key   => $ca_public_key,
        ca_crl          => $ca_crl,
        ca_private_key  => $ca_private_key,
    }

    # TODO: move to puppetserver class
    class { 'puppetmaster::ca_monitoring':
        ensure  => $enable_ca.bool2str('present', 'absent'),
        ca_root => $puppetserver::ca_dir,
    }

    class { 'puppetserver::generators': }

    puppetserver::rsync_module { 'ca':
        path     => $ca_dir,
        hosts    => wmflib::class::hosts('puppetserver::ca'),
        interval => {'start' => 'OnUnitInactiveSec', 'interval' => 'daily'},
    }

    ferm::service { 'puppetserver':
        srange => '$DOMAIN_NETWORKS',
        proto  => 'tcp',
        port   => 8140,
    }

    if $enc_source and $enc_path {
        file { $enc_path:
            ensure => file,
            source => $enc_source,
            owner  => 'root',
            group  => 'root',
            mode   => '0555',
        }
    }
}