pbsready.cfg.in 8.46 KB
Newer Older
1 2
[buildout]

3
parts +=
4
  logrotate-entry-cron
5
  logrotate-entry-equeue
6
  logrotate-entry-notifier
7
  logrotate-entry-resilient
8
  cron
9
  cron-entry-notifier-status-feed
10
  notifier-feed-status-promise
11
  notifier-stalled-promise
12
  resilient-sshkeys-authority
13
  sshd-raw-server
14 15 16 17 18
  sshd-graceful
  sshkeys-sshd
  sshd-promise
  resilient-sshkeys-sshd-promise
  sshd-pbs-authorized-key
19
  notifier
20

21

22 23 24
extends =
  ${monitor2-template:rendered}

25 26 27 28
#----------------
#--
#-- Creation of all needed directories.

29 30 31 32 33 34 35
[rootdirectory]
recipe = slapos.cookbook:mkdirectory
etc = $${buildout:directory}/etc
var = $${buildout:directory}/var
srv = $${buildout:directory}/srv
bin = $${buildout:directory}/bin

36
[basedirectory]
37 38 39 40
recipe = slapos.cookbook:mkdirectory
log = $${rootdirectory:var}/log
services = $${rootdirectory:etc}/service
run = $${rootdirectory:var}/run
41
scripts = $${rootdirectory:etc}/run
42 43
backup = $${rootdirectory:srv}/backup
promises = $${rootdirectory:etc}/promise
44
services = $${rootdirectory:etc}/service
Marco Mariani's avatar
Marco Mariani committed
45 46
cache = $${rootdirectory:var}/cache
notifier = $${rootdirectory:etc}/notifier
47 48

[directory]
49
recipe = slapos.cookbook:mkdirectory
50 51 52
backup = $${basedirectory:backup}/$${slap-parameter:namebase}
ssh = $${rootdirectory:etc}/ssh/
sshkeys = $${rootdirectory:srv}/sshkeys
Marco Mariani's avatar
Marco Mariani committed
53 54
notifier-feeds = $${basedirectory:notifier}/feeds
notifier-callbacks = $${basedirectory:notifier}/callbacks
55
notifier-status-items = $${basedirectory:notifier}/status-items
56 57 58 59 60
cron-entries = $${rootdirectory:etc}/cron.d
crontabs = $${rootdirectory:etc}/crontabs
cronstamps = $${rootdirectory:etc}/cronstamps
logrotate-entries = $${rootdirectory:etc}/logrotate.d
logrotate-backup = $${basedirectory:backup}/logrotate
61
cgi-bin = $${rootdirectory:srv}/cgi-bin
62
monitor-resilient = $${monitor-directory:private}/resilient
63

64 65 66 67

[slap-parameter]
authorized-key =

68 69 70
#----------------
#--
#-- Deploy cron.
71
# cron and cron-simplelogger are deployed by logrotate.
72 73 74 75 76 77

#----------------
#--
#-- Deploy logrotate.

[logrotate-entry-equeue]
78
<= logrotate-entry-base
79
name = equeue
80
log = $${equeue:log} $${sshd-server:log}
81 82
frequency = daily
rotate-num = 30
83

84
[logrotate-entry-notifier]
85 86 87 88 89 90
<= logrotate-entry-base
name = notifier
log = $${notifier:feeds}/*
rotate-num = 5
frequency = weekly
nocompress = 1
91

92
[logrotate-entry-resilient]
93
<= logrotate-entry-base
94 95 96 97 98
name = resilient_log
log = $${basedirectory:log}/resilient.log
frequency = weekly
rotate-num = 7

99 100
#----------------
#--
101
#-- Sets up an rdiff-backup server (with a openssh server for ssh)
102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117

[rdiff-backup-server]
recipe = slapos.cookbook:pbs
client = false
path = $${directory:backup}
wrapper = $${rootdirectory:bin}/rdiffbackup-server
rdiffbackup-binary = ${buildout:bin-directory}/rdiff-backup


#----------------
#--
#-- Set up the equeue and notifier.

[equeue]
recipe = slapos.cookbook:equeue
socket = $${basedirectory:run}/equeue.sock
118
lockfile = $${basedirectory:run}/equeue.lock
119 120 121 122 123 124 125 126
log = $${basedirectory:log}/equeue.log
database = $${rootdirectory:srv}/equeue.db
wrapper = $${basedirectory:services}/equeue
equeue-binary = ${buildout:bin-directory}/equeue

# notifier.notify adds the [exporter, notifier] to the execution queue
# notifier.notify.callback sets up a callback
[notifier]
127 128 129 130 131
recipe = slapos.recipe.template:jinja2
template = ${template-wrapper:output}
rendered = $${:wrapper}
wrapper = $${basedirectory:services}/notifier
mode = 0700
132 133
feeds = $${directory:notifier-feeds}
callbacks = $${directory:notifier-callbacks}
134 135
command = ${buildout:bin-directory}/pubsubserver --callbacks $${directory:notifier-callbacks} --feeds $${directory:notifier-feeds} --equeue-socket $${equeue:socket} --logfile $${basedirectory:log}/notifier.log $${:host} $${:port}
notifier-binary = ${buildout:bin-directory}/pubsubnotifier
136
host = $${slap-network-information:global-ipv6}
137
port = $${notifier-port:port}
138
instance-root-name = $${instance-info-parameters:root-name}
139
log-url = $${monitor-publish-parameters:monitor-base-url}/resilient/notifier-status-rss
140
status-item-directory = $${directory:notifier-status-items}
141 142
context =
  key content notifier:command
143

144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161
[notifier-resilient-status-feed]
recipe = slapos.cookbook:wrapper
command-line = ${buildout:directory}/bin/generatefeed --output $${:feed-path} --status-item-path $${notifier:status-item-directory} --title "Status feed for $${notifier:instance-root-name}" --link $${notifier:log-url}
feed-path = $${directory:monitor-resilient}/notifier-status-rss
wrapper-path = $${rootdirectory:bin}/resilient-genstatusrss.py

[cron-entry-notifier-status-feed]
<= cron
recipe = slapos.cookbook:cron.d
name = resilient-notifier-status-feed
frequency = */5 * * * *
command = $${notifier-resilient-status-feed:wrapper-path}

[notifier-stalled-promise]
recipe = slapos.cookbook:wrapper
# time-buffer is 24h (+1h of latitude)
command-line = ${buildout:bin-directory}/check-feed-as-promise --feed-path $${notifier-resilient-status-feed:feed-path} --title --ok-pattern 'OK' --time-buffer 90000
wrapper-path = $${basedirectory:promises}/stalled-notifier-callbacks
162

163 164
#----------------
#--
165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184
#-- OpenSSH.
[resilient-sshd-config]
# XXX: Add timeout support
recipe = slapos.recipe.template:jinja2
rendered = $${directory:etc}/resilient-sshd.conf
path_pid = $${directory:run}/resilient-sshd.pid
template = inline:
 PidFile $${:path_pid}
 Port $${sshd-port:port}
 ListenAddress $${slap-network-information:global-ipv6}
 Protocol 2
 UsePrivilegeSeparation no
 HostKey $${directory:ssh}/server_key.rsa
 AuthorizedKeysFile $${directory:ssh}/.ssh/authorized_keys
 PasswordAuthentication no
 PubkeyAuthentication yes
 ForceCommand $${rdiff-backup-server:wrapper}

[sshd-raw-server]
recipe = slapos.cookbook:wrapper
185 186
host = $${slap-network-information:global-ipv6}
rsa-keyfile = $${directory:ssh}/server_key.rsa
187 188 189
home = $${directory:ssh}
command-line = ${openssh:location}/sbin/sshd -D -e -f $${resilient-sshd-config:rendered}
wrapper-path = $${rootdirectory:bin}/raw_sshd
190

191 192
[sshd-pbs-authorized-key]
<= sshd-raw-server
193 194 195
recipe = slapos.cookbook:dropbear.add_authorized_key
key = $${slap-parameter:authorized-key}

196
[sshd-server]
197 198 199
recipe = collective.recipe.template
log = $${basedirectory:log}/sshd.log
input = inline:#!/bin/sh
200
    exec $${sshd-raw-server:wrapper-path} >> $${:log} 2>&1
201 202 203

output = $${rootdirectory:bin}/raw_sshd_log
mode = 700
204

205 206
[sshd-graceful]
recipe = slapos.cookbook:wrapper
207
command-line = $${directory:bin}/killpidfromfile $${resilient-sshd-config:path_pid} SIGHUP
208 209 210 211 212 213 214 215
wrapper-path = $${basedirectory:scripts}/sshd-graceful

[sshd-promise]
recipe = slapos.cookbook:check_port_listening
path = $${basedirectory:promises}/sshd
hostname = $${slap-network-information:global-ipv6}
port = $${sshd-port:port}

216 217 218 219
#----------------
#--
#-- sshkeys

220 221
[sshkeys-directory]
recipe = slapos.cookbook:mkdirectory
222 223
requests = $${directory:sshkeys}/resilient-requests
keys = $${directory:sshkeys}/resilient-keys
224

225
[resilient-sshkeys-authority]
226 227 228
recipe = slapos.cookbook:sshkeys_authority
request-directory = $${sshkeys-directory:requests}
keys-directory = $${sshkeys-directory:keys}
229
wrapper = $${basedirectory:services}/resilient_sshkeys_authority
230
keygen-binary = ${openssh:location}/bin/ssh-keygen
231

232
[sshkeys-sshd]
233
<= resilient-sshkeys-authority
234
recipe = slapos.cookbook:sshkeys_authority.request
235
name = sshd
236
type = rsa
237 238 239
executable = $${sshd-server:output}
public-key = $${sshd-raw-server:rsa-keyfile}.pub
private-key = $${sshd-raw-server:rsa-keyfile}
240 241
wrapper = $${basedirectory:services}/sshd

242
[resilient-sshkeys-sshd-promise]
243 244
# Check that public key file exists and is not empty
recipe = collective.recipe.template
245
input = inline:#!${bash:location}/bin/bash
246
  PUBLIC_KEY_CONTENT="$${sshkeys-sshd:public-key-value}"
247
  if [[ ! -n "$PUBLIC_KEY_CONTENT" || "$PUBLIC_KEY_CONTENT" == *None* ]]; then
248 249 250 251
    exit 1
  fi
output = $${basedirectory:promises}/public-key-existence
mode = 700
252

253 254 255 256 257 258 259 260 261 262 263 264 265 266
#----------------
#--
#-- Promises

[notifier-feed-status-promise]
recipe = slapos.recipe.template:jinja2
template = ${notifier-feed-promise-template:target}
rendered = $${basedirectory:promises}/notifier-feed-check-malformed-or-failure.py
mode = 700
context =
  key notifier_feed_directory directory:notifier-feeds
  raw base_url http://[$${notifier:host}]:$${notifier:port}/get/
  raw python_executable ${buildout:executable}

267 268
#----------------
#--
269
#-- Connection informations to re-use.
270 271 272 273

[user-info]
recipe = slapos.cookbook:userinfo

274 275 276
# XXX-Cedric: when "aggregation" system is done in libslap, directly publish.
[resilient-publish-connection-parameter]
recipe = slapos.cookbook:publish
277
ssh-public-key = $${sshkeys-sshd:public-key-value}
278
ssh-url = ssh://$${user-info:pw-name}@[$${sshd-raw-server:host}]:$${sshd-port:port}/$${rdiff-backup-server:path}
279
ip = $${slap-network-information:global-ipv6}