All Projects → BadgerOps → salt-workspace

BadgerOps / salt-workspace

Licence: other
salt-workspace

Programming Languages

shell
77523 projects
python
139335 projects - #7 most used programming language
Makefile
30231 projects
SaltStack
118 projects

This is a workspace for learning the Saltstack configuration management tool

This workspace is being developed alongside a series of blog posts on https://blog.badgerops.net. While it can be used as a stand alone framework, there will (hopefully!) be good value in following along with the blog series.

The following information should get you up and running on either OS X, Windows or Linux.

Development Setup

OS X / Linux

  • Please not that when installing the below packages, unless specified, install from website or link.
  1. Install dependencies

    a. Install Virtualbox

    b. Install Vagrant

    • install vagrant plugin:
    vagrant plugin install vagrant-hostmanager

    c. Ensure Git is installed Download Git. If already installed via xcode tools, you should be ready to go.

    d. ensure Homebrew is installed Homebrew website

    e. Ensure pyaml is installed:

    brew install libyaml
    sudo apt install python3-pip
    pip3 install pyyaml
  2. Clone the repo, build the project and run the tests (may take a while for the first time). DO NOT move on until dependencies are resolved.

    docker-machine start
    eval $(docker-machine env )
    git clone https://github.com/BadgerOps/salt-workspace.git
    cd salt-workspace
    make
    make test
    • if make test fails, its most likely because pyyaml is not installed

Salt development

Prior to testing your changes, make sure you build the project first. Vagrant will only expose the ./dist directory to the saltmaster's /srv directory. Running the command 'make' in the root directory should build the entire project for you.

Make sure you re-run make after each local change or it will not be reflected in the virtual environment.

This can be automated on your development machine using various tools such as Watchman. They will monitor your directory for changes and automatically run the make command for you.

Because development environment differ, this is not included in this repository.

Linux

The Linux test hosts default to RHEL 7.x. If you want to test RHEL 6.x, set your environment variable LINUX_VERSION to 6: export LINUX_VERSION=6

  1. Launch the saltmaster and linux hosts vagrant up. This may take a while when running for the very first time because the VM needs to be downloaded. Ensure that you're on a fast internet connection.
  2. Log into the test Linux host vagrant ssh linux-1. Here you can run sudo su - to become root. No password is required. (if prompted, it will be the vagrant default 'vagrant')
  3. A highstate should get invoked during provisioning. To re-run a highstate, invoke sudo salt-call state.highstate from within the test VM.
  4. To test a specific role, add a role to the grains file in /etc/salt/grains and re-run a highstate. For example, to test the role foo_bar, edit the grains file to match the following snippet.
roles:
   - foo_bar

Multiple VM Testing

If testing a role/formula that requires multiple minions, you can increase the linux minion count by setting the LINUX_MINION_COUNT environment variable before running vagrant up. See below as an example.

export LINUX_MINION_COUNT=3
vagrant up /linux/

You should now have a linux-1, linux-2, and linux-3 machine.

Memory Settings

Some minions may require more than the default memory of 512MB. You may increase this before running vagrant up. The following example uses 1GB of memory per minion.

export LINUX_BOX_RAM=1024
vagrant up

Windows

  1. Launch the saltmaster and windows hosts vagrant up saltmaster, vagrant up windows. This may take a while when running for the very first time because the VM needs to be downloaded. Ensure that you are on a fast internet connection.
  2. Log into the test Windows host vagrant rdp windows. The username is Administrator and password is vagrant all lower case.
  3. A highstate should get invoked during provisioning. To re-run a highstate, invoke c:\salt-call.bat state.highstate from within a terminal.
  4. To test a specific role, add a role to the grains file in c:\salt\conf\grains and re-run a highstate. For example, to test the role foo_bar, edit the grains file to match the following snippet.
roles:
  - foo_bar

Workflow for making changes

Use the following workflow to submit a new feature or bug fix.

  1. Fork the repository
  2. Clone the repository.
  3. Ensure your user information is correct.
  4. Create a new branch locally.
  5. Make your changes and commit locally.
  6. Push the changes to the upstream repository.
  7. Submit a pull request.

Below is an example of steps 2-5 - you'll want to fork the repository to your own github profile first.

git clone https://github.com/john_doe/salt-workspace.git
cd salt-workspace
git config user.name "Doe, John"
git config user.email [email protected]
git checkout -b feature/some-new-feature
# Make your changes.
vim ./path/to/file.sls
# Commit your changes locally.
git add ./poth/to/file.sls
git commit -m 'Making a change to file.sls for reason foo'
# Push your changes to the Git server.
git push --set-upstream origin feature/some-new-feature

When you create a branch - You branch from a parent. You generally want the parent to always be an updated master. Thus before making any new branches or changes - you want to obtain an updated master. If you were to attempt to make a new branch with out running the following commands after doing the git push you would be creating a new branch that has a parent of the previous branch you just pushed.

git checkout master
git fetch
git pull origin master
git checkout -b feature/some-new-feature

See Daniel Miessler's git Primer for more help with using Git.

Encrypting pillar values

It's possible to encrypt pillar values using the GPG renderer. This is highly advised for any sensitive information such as passwords and SSL keys.

You'll need to first install GnuPG. Once installed, you can create and import the Salt key with the following command.

You can then follow this guide to create your GPG key, the following steps assume the name is 'Salt Master', or as noted in the documentation you can do the following:

# mkdir -p /etc/salt/gpgkeys
# chmod 0700 /etc/salt/gpgkeys
# gpg --gen-key --homedir /etc/salt/gpgkeys

IMPORTANT: safeguard the private key that is generated, this (must!) live on the salt master under /etc/salt/gpgkeys but you should take precautions to keep it safe and secure, or your secrets encrypted with it are meaningless.

gpg --import salt_key.asc

You can encrypt a new password with the following command where 'mysecret' without quotes is your secret value.

echo -n 'mysecret' | gpg --armor --encrypt -r 'Salt Master'

Once you have this text, you can add to Pillar. Any pillar file must have the string #!yaml|gpg at the top in order for the GPG renderer to kick in.

When the pillar file is rendered, it will get decrypted on the master and your minion will receive the plain text value.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].