# == Class: openstack_project::mirror_update # class openstack_project::mirror_update ( $sysadmins = [], $bandersnatch_keytab = '', $reprepro_keytab = '', $admin_keytab = '', $gem_keytab = '', $centos_keytab = '', $epel_keytab = '', $yum_puppetlabs_keytab = '', $fedora_keytab = '', $opensuse_keytab = '', ) { include ::gnupg include ::openstack_project::reprepro_mirror class { 'openstack_project::server': sysadmins => $sysadmins, afs => true, } class { 'openstack_project::gem_mirror': } class { 'bandersnatch': bandersnatch_source => 'pip3', } class { 'bandersnatch::mirror': mirror_root => '/afs/.openstack.org/mirror/pypi', static_root => '/afs/.openstack.org/mirror', hash_index => true, package_blacklist => [ # These packages are quite large and release often. Ignore them. tensorflow, tf-nightly, tf-nightly-gpu, tfp-nightly, tfp-nightly-gpu, tensorboard, tb-nightly, mxnet, mxnet-mkl, mxnet-cu75, mxnet-cu75mkl, mxnet-cu80, mxnet-cu80mkl, mxnet-cu80-win, mxnet-cu90, mxnet-cu90mkl, mxnet-cu91, mxnet-cu91mkl, ], require => Class['bandersnatch'], } file { '/etc/bandersnatch.keytab': owner => 'root', group => 'root', mode => '0400', content => $bandersnatch_keytab, } file { '/etc/gem.keytab': owner => 'rubygems', group => 'root', mode => '0400', content => $gem_keytab, require => Class['openstack_project::gem_mirror'], } file { '/etc/afsadmin.keytab': owner => 'root', group => 'root', mode => '0400', content => $admin_keytab, } file { '/usr/local/bin/bandersnatch-mirror-update': ensure => present, owner => 'root', group => 'root', mode => '0755', source => 'puppet:///modules/openstack_project/bandersnatch-mirror-update.sh', } file { '/usr/local/bin/gem-mirror-update': ensure => present, owner => 'root', group => 'root', mode => '0755', source => 'puppet:///modules/openstack_project/gem-mirror-update.sh', } cron { 'bandersnatch': user => $user, minute => '*/5', command => 'flock -n /var/run/bandersnatch/mirror.lock bandersnatch-mirror-update /var/log/bandersnatch/mirror.log', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/bandersnatch-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/bandersnatch.keytab'], Class['bandersnatch::mirror'] ] } file { '/etc/reprepro.keytab': owner => 'root', group => 'root', mode => '0400', content => $reprepro_keytab, } file { '/usr/local/bin/reprepro-mirror-update': ensure => present, owner => 'root', group => 'root', mode => '0755', source => 'puppet:///modules/openstack_project/reprepro/reprepro-mirror-update.sh', } ### Debian mirror ### ::openstack_project::reprepro { 'debian-reprepro-mirror': confdir => '/etc/reprepro/debian', basedir => '/afs/.openstack.org/mirror/debian', distributions => 'openstack_project/reprepro/distributions.debian.erb', updates_file => 'puppet:///modules/openstack_project/reprepro/debuntu-updates', releases => ['stretch'], } cron { 'reprepro debian': user => $user, hour => '*/2', minute => fqdn_rand(45, 'reprepro-debian'), command => 'flock -n /var/run/reprepro/debian.lock reprepro-mirror-update /etc/reprepro/debian mirror.debian >>/var/log/reprepro/debian-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/reprepro-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/reprepro.keytab'], ::Openstack_project::Reprepro['debian-reprepro-mirror'], ] } gnupg_key { 'Debian 8/jessie Archive': ensure => present, key_id => '7638d0442b90d010', user => 'root', key_source => 'puppet:///modules/openstack_project/reprepro/debian-jessie-mirror-gpg-key.asc', key_type => 'public', } gnupg_key { 'Debian 8/jessie Security': ensure => present, key_id => '9d6d8f6bc857c906', user => 'root', key_source => 'puppet:///modules/openstack_project/reprepro/debian-jessie-security-mirror-gpg-key.asc', key_type => 'public', } ::openstack_project::reprepro { 'ubuntu-reprepro-mirror': confdir => '/etc/reprepro/ubuntu', basedir => '/afs/.openstack.org/mirror/ubuntu', distributions => 'openstack_project/reprepro/distributions.ubuntu.erb', updates_file => 'puppet:///modules/openstack_project/reprepro/debuntu-updates', releases => ['bionic', 'trusty', 'xenial'], } cron { 'reprepro ubuntu': user => $user, hour => '*/2', minute => fqdn_rand(45, 'reprepro-ubuntu'), command => 'flock -n /var/run/reprepro/ubuntu.lock reprepro-mirror-update /etc/reprepro/ubuntu mirror.ubuntu >>/var/log/reprepro/ubuntu-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/reprepro-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/reprepro.keytab'], ::Openstack_project::Reprepro['ubuntu-reprepro-mirror'], ] } ::openstack_project::reprepro { 'ubuntu-ports-reprepro-mirror': confdir => '/etc/reprepro/ubuntu-ports', basedir => '/afs/.openstack.org/mirror/ubuntu-ports', distributions => 'openstack_project/reprepro/distributions.ubuntu-ports.erb', updates_file => 'puppet:///modules/openstack_project/reprepro/debuntu-updates', releases => ['bionic', 'xenial'], } cron { 'reprepro ubuntu-ports': user => $user, hour => '*/2', minute => fqdn_rand(45, 'reprepro-ubuntu-ports'), command => 'flock -n /var/run/reprepro/ubuntu-ports.lock reprepro-mirror-update /etc/reprepro/ubuntu-ports mirror.ubuntu-ports >>/var/log/reprepro/ubuntu-ports-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/reprepro-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/reprepro.keytab'], ::Openstack_project::Reprepro['ubuntu-ports-reprepro-mirror'], ] } gnupg_key { 'Ubuntu Archive': ensure => present, key_id => '40976EAF437D05B5', user => 'root', key_server => 'hkp://keyserver.ubuntu.com', key_type => 'public', } gnupg_key { 'Ubuntu Archive (2012)': ensure => present, key_id => '3B4FE6ACC0B21F32', user => 'root', key_server => 'hkp://keyserver.ubuntu.com', key_type => 'public', } ::openstack_project::reprepro { 'debian-ceph-hammer-reprepro-mirror': confdir => '/etc/reprepro/debian-ceph-hammer', basedir => '/afs/.openstack.org/mirror/ceph-deb-hammer', distributions => 'openstack_project/reprepro/distributions.debian-ceph-hammer.erb', updates_file => 'puppet:///modules/openstack_project/reprepro/debian-ceph-hammer-updates', releases => ['trusty', 'xenial'], } cron { 'reprepro debian ceph hammer': user => $user, hour => '*/2', minute => fqdn_rand(45, 'debian-ceph-hammer'), command => 'flock -n /var/run/reprepro/debian-ceph-hammer.lock reprepro-mirror-update /etc/reprepro/debian-ceph-hammer mirror.deb-hammer >>/var/log/reprepro/debian-ceph-hammer-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/reprepro-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/reprepro.keytab'], ::Openstack_project::Reprepro['debian-ceph-hammer-reprepro-mirror'], ] } ::openstack_project::reprepro { 'debian-ceph-jewel-reprepro-mirror': confdir => '/etc/reprepro/debian-ceph-jewel', basedir => '/afs/.openstack.org/mirror/ceph-deb-jewel', distributions => 'openstack_project/reprepro/distributions.debian-ceph-jewel.erb', updates_file => 'puppet:///modules/openstack_project/reprepro/debian-ceph-jewel-updates', releases => ['trusty', 'xenial'], } cron { 'reprepro debian ceph jewel': user => $user, hour => '*/2', minute => fqdn_rand(45, 'debian-ceph-jewel'), command => 'flock -n /var/run/reprepro/debian-ceph-jewel.lock reprepro-mirror-update /etc/reprepro/debian-ceph-jewel mirror.deb-jewel >>/var/log/reprepro/debian-ceph-jewel-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/reprepro-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/reprepro.keytab'], ::Openstack_project::Reprepro['debian-ceph-jewel-reprepro-mirror'], ] } ::openstack_project::reprepro { 'debian-ceph-luminous-reprepro-mirror': confdir => '/etc/reprepro/debian-ceph-luminous', basedir => '/afs/.openstack.org/mirror/ceph-deb-luminous', distributions => 'openstack_project/reprepro/distributions.debian-ceph-luminous.erb', updates_file => 'puppet:///modules/openstack_project/reprepro/debian-ceph-luminous-updates', releases => ['stretch', 'xenial'], } cron { 'reprepro debian ceph luminous': user => $user, hour => '*/2', minute => fqdn_rand(45, 'debian-ceph-luminous'), command => 'flock -n /var/run/reprepro/debian-ceph-luminous.lock reprepro-mirror-update /etc/reprepro/debian-ceph-luminous mirror.deb-luminous >>/var/log/reprepro/debian-ceph-luminous-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/reprepro-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/reprepro.keytab'], ::Openstack_project::Reprepro['debian-ceph-luminous-reprepro-mirror'], ] } gnupg_key { 'Ceph Archive': ensure => present, # 08B7 3419 AC32 B4E9 66C1 A330 E84A C2C0 460F 3994 key_id => 'E84AC2C0460F3994', user => 'root', key_type => 'public', key_source => 'puppet:///modules/openstack_project/reprepro/ceph-mirror-gpg-key.asc', } ## Docker APT mirror ::openstack_project::reprepro { 'debian-docker-reprepro-mirror': confdir => '/etc/reprepro/debian-docker', basedir => '/afs/.openstack.org/mirror/deb-docker', distributions => 'openstack_project/reprepro/distributions.debian-docker.erb', updates_file => 'puppet:///modules/openstack_project/reprepro/debian-docker-updates', releases => ['xenial'], } cron { 'reprepro debian docker': user => $user, hour => '*/2', minute => fqdn_rand(45, 'debian-docker'), command => 'flock -n /var/run/reprepro/debian-docker.lock reprepro-mirror-update /etc/reprepro/debian-docker mirror.deb-docker >>/var/log/reprepro/debian-docker-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/reprepro-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/reprepro.keytab'], ::Openstack_project::Reprepro['debian-docker-reprepro-mirror'], ] } gnupg_key { 'Docker Archive': ensure => present, # pub 4096R/0EBFCD88 2017-02-22 Docker Release (CE deb) # fingerprint: 9DC8 5822 9FC7 DD38 854A E2D8 8D81 803C 0EBF CD88 # Note the key that signs the release file is actually the subkey F273FCD8 key_id => '0EBFCD88', user => 'root', key_type => 'public', key_source => 'puppet:///modules/openstack_project/reprepro/docker-mirror-gpg-key.asc', } ## Puppetlabs APT mirror ::openstack_project::reprepro { 'apt-puppetlabs-reprepro-mirror': confdir => '/etc/reprepro/apt-puppetlabs', basedir => '/afs/.openstack.org/mirror/apt-puppetlabs', distributions => 'openstack_project/reprepro/distributions.apt-puppetlabs.erb', updates_file => 'puppet:///modules/openstack_project/reprepro/puppetlabs-debs', releases => ['xenial', 'stretch'], } cron { 'reprepro ubuntu puppetlabs': user => $user, hour => '*/2', minute => fqdn_rand(45, 'ubuntu-puppetlabs'), command => 'flock -n /var/run/reprepro/apt-puppetlabs.lock reprepro-mirror-update /etc/reprepro/apt-puppetlabs mirror.apt-puppetlabs >>/var/log/reprepro/apt-puppetlabs-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/reprepro-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/reprepro.keytab'], ::Openstack_project::Reprepro['apt-puppetlabs-reprepro-mirror'], ] } gnupg_key { 'Puppetlabs Archive': ensure => present, key_id => 'EF8D349F', user => 'root', key_type => 'public', key_source => 'puppet:///modules/openstack_project/reprepro/puppetlabs-mirror-gpg-key.asc', } ### CentOS mirror ### file { '/etc/centos.keytab': owner => 'root', group => 'root', mode => '0400', content => $centos_keytab, } file { '/usr/local/bin/centos-mirror-update': ensure => present, owner => 'root', group => 'root', mode => '0755', source => 'puppet:///modules/openstack_project/mirror/centos-mirror-update.sh', } cron { 'centos mirror': user => $user, minute => fqdn_rand(45, 'centos-mirror'), hour => '*/2', command => 'flock -n /var/run/centos-mirror.lock centos-mirror-update mirror.centos >>/var/log/centos-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/centos-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/centos.keytab'], ] } ### RDO mirror ### file { '/etc/rdo.keytab': ensure => absent, } file { '/usr/local/bin/rdo-mirror-update': ensure => absent, } cron { 'rdo mirror': ensure => absent, } ### EPEL mirror ### file { '/etc/epel.keytab': owner => 'root', group => 'root', mode => '0400', content => $epel_keytab, } file { '/usr/local/bin/epel-mirror-update': ensure => present, owner => 'root', group => 'root', mode => '0755', source => 'puppet:///modules/openstack_project/mirror/epel-mirror-update.sh', } cron { 'epel mirror': user => $user, minute => fqdn_rand(45, 'epel-mirror'), hour => '*/2', command => 'flock -n /var/run/epel-mirror.lock epel-mirror-update mirror.epel >>/var/log/epel-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/epel-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/epel.keytab'], ] } ### Puppetlabs / CentOS mirror ### file { '/etc/yum-puppetlabs.keytab': owner => 'root', group => 'root', mode => '0400', content => $yum_puppetlabs_keytab, } file { '/usr/local/bin/yum-puppetlabs-mirror-update': ensure => present, owner => 'root', group => 'root', mode => '0755', source => 'puppet:///modules/openstack_project/mirror/yum-puppetlabs-mirror-update.sh', } cron { 'yum-puppetlabs mirror': user => $user, minute => fqdn_rand(45, 'yum-puppetlabs'), hour => '*/2', command => 'flock -n /var/run/yum-puppetlabs-mirror.lock yum-puppetlabs-mirror-update mirror.yum-puppetlabs >>/var/log/yum-puppetlabs-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/yum-puppetlabs-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/yum-puppetlabs.keytab'], ] } ### Fedora mirror ### file { '/etc/fedora.keytab': owner => 'root', group => 'root', mode => '0400', content => $fedora_keytab, } file { '/usr/local/bin/fedora-mirror-update': ensure => present, owner => 'root', group => 'root', mode => '0755', source => 'puppet:///modules/openstack_project/mirror/fedora-mirror-update.sh', } cron { 'fedora mirror': user => $user, minute => fqdn_rand(45, 'fedora-mirror'), hour => '*/2', command => 'flock -n /var/run/fedora-mirror.lock fedora-mirror-update mirror.fedora >>/var/log/fedora-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/fedora-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/fedora.keytab'], ] } ### openSUSE mirror ### file { '/etc/opensuse.keytab': owner => 'root', group => 'root', mode => '0400', content => $opensuse_keytab, } file { '/usr/local/bin/opensuse-mirror-update': ensure => present, owner => 'root', group => 'root', mode => '0755', source => 'puppet:///modules/openstack_project/mirror/opensuse-mirror-update.sh', } cron { 'opensuse mirror': user => $user, minute => fqdn_rand(45, 'opensuse-mirror'), hour => '*/6', command => 'flock -n /var/run/opensuse-mirror.lock opensuse-mirror-update mirror.opensuse >>/var/log/opensuse-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/opensuse-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/opensuse.keytab'], ] } ### Ubuntu Cloud Archive Mirror ### ::openstack_project::reprepro { 'ubuntu-cloud-archive-reprepro-mirror': confdir => '/etc/reprepro/ubuntu-cloud-archive', basedir => '/afs/.openstack.org/mirror/ubuntu-cloud-archive', distributions => 'openstack_project/reprepro/distributions.ubuntu-cloud-archive.erb', updates_file => 'puppet:///modules/openstack_project/reprepro/ubuntu-cloud-archive-updates', releases => { 'trusty'=>['liberty', 'mitaka'], 'xenial'=>['newton', 'ocata', 'pike', 'queens'] }, } cron { 'reprepro ubuntu-cloud-archive': user => $user, hour => '*/2', minute => fqdn_rand(45, 'ubuntu-cloud-archive-mirror'), command => 'flock -n /var/run/reprepro/ubuntu-cloud-archive.lock reprepro-mirror-update /etc/reprepro/ubuntu-cloud-archive mirror.ubuntu-cloud >>/var/log/reprepro/ubuntu-cloud-archive-mirror.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ File['/usr/local/bin/reprepro-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/reprepro.keytab'], ::Openstack_project::Reprepro['ubuntu-cloud-archive-reprepro-mirror'], ] } gnupg_key { 'Canonical Cloud Archive Signing Key': ensure => present, # 391A 9AA2 1471 9283 9E9D B031 5EDB 1B62 EC49 26EA key_id => '5EDB1B62EC4926EA', user => 'root', key_type => 'public', key_source => 'puppet:///modules/openstack_project/reprepro/ubuntu-cloud-archive-gpg-key.asc', } ### MariaDB mirror ### ::openstack_project::mariadb_mirror { '10.0': require => [ File['/usr/local/bin/reprepro-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/reprepro.keytab'], ] } ::openstack_project::mariadb_mirror { '10.1': require => [ File['/usr/local/bin/reprepro-mirror-update'], File['/etc/afsadmin.keytab'], File['/etc/reprepro.keytab'], ] } gnupg_key { 'MariaDB Package Signing Key': ensure => present, # 1993 69E5 404B D5FC 7D2F E43B CBCB 082A 1BB9 43DB key_id => 'CBCB082A1BB943DB', user => 'root', key_type => 'public', key_source => 'puppet:///modules/openstack_project/reprepro/mariadb-mirror-gpg-key.asc', } gnupg_key { 'MariaDB Package Signing Key (new)': ensure => present, # 177F 4010 FE56 CA33 3630 0305 F165 6F24 C74C D1D8 key_id => 'F1656F24C74CD1D8', user => 'root', key_type => 'public', key_source => 'puppet:///modules/openstack_project/reprepro/mariadb-mirror-new-gpg-key.asc', } # AFS Monitoring file { '/etc/afsmon.cfg': ensure => present, content => template('openstack_project/mirror-update/afsmon.cfg.erb'), replace => true, } vcsrepo { '/opt/afsmon': ensure => latest, provider => git, revision => 'master', source => 'https://git.openstack.org/openstack-infra/afsmon', } python::virtualenv { '/usr/afsmon-env': ensure => present, owner => 'root', group => 'root', timeout => 0, # puppet-python 1.9.4 wants to guess we want "virtualenv-3", which # we don't. Fixed in later versions. virtualenv => 'virtualenv', version => 3, } exec { 'install_afsmon' : command => '/usr/afsmon-env/bin/pip install --upgrade /opt/afsmon', path => '/usr/local/bin:/usr/bin:/bin', refreshonly => true, subscribe => Vcsrepo['/opt/afsmon'], require => Python::Virtualenv['/usr/afsmon-env'], } cron { 'afsmon': minute => [0, 30], command => '/usr/afsmon-env/bin/afsmon statsd >> /var/log/afsmon.log 2>&1', environment => 'PATH=/usr/local/bin:/usr/bin:/bin:/usr/sbin:/sbin', require => [ Python::Virtualenv['/usr/afsmon-env'], Exec['install_afsmon'], File['/etc/afsmon.cfg'], ], } }