mirror of
https://github.com/jbowdre/runtimeterror.git
synced 2024-11-22 06:52:18 +00:00
update draft
This commit is contained in:
parent
6c08e4cf8a
commit
ad63824ccd
1 changed files with 291 additions and 1 deletions
|
@ -21,7 +21,7 @@ tags:
|
||||||
- vault
|
- vault
|
||||||
---
|
---
|
||||||
|
|
||||||
I've been [using Proxmox](/ditching-vsphere-for-proxmox/) in my [homelab](/homelab/) for a little while now, and I recently expanded the environment a bit with the addition of two HP Elite Mini 800 G9 computers. I figured it was time to start automating the process of building and maintaining my VM templates. I already had functional [Packer templates for VMware](https://github.com/jbowdre/packer-vsphere-templates) so I used that content as a starting point for the Proxmox builds themselves. Once I had the builds working locally, I just had to explore how to automate them.
|
I've been [using Proxmox](/ditching-vsphere-for-proxmox/) in my [homelab](/homelab/) for a little while now, and I recently expanded the environment a bit with the addition of two HP Elite Mini 800 G9 computers. I figured it was time to start automating the process of building and maintaining my VM templates. I already had functional [Packer templates for VMware](https://github.com/jbowdre/packer-vsphere-templates) so I used that content as a starting point for the [Proxmox builds](https://github.com/jbowdre/packer-proxmox-templates). Once I had the builds working locally, I just had to explore how to automate them.
|
||||||
|
|
||||||
This post will describe how I did it. It will cover a lot of the implementation details but may gloss over some general setup steps; you'll likely need at least passing familiarity with [Packer](https://www.packer.io/) and [Vault](https://www.vaultproject.io/) to take this on.
|
This post will describe how I did it. It will cover a lot of the implementation details but may gloss over some general setup steps; you'll likely need at least passing familiarity with [Packer](https://www.packer.io/) and [Vault](https://www.vaultproject.io/) to take this on.
|
||||||
|
|
||||||
|
@ -29,6 +29,7 @@ This post will describe how I did it. It will cover a lot of the implementation
|
||||||
There are a lot of parts to this setup, so let's start by quickly running through those:
|
There are a lot of parts to this setup, so let's start by quickly running through those:
|
||||||
- a **Proxmox host** to serve the virtual infrastructure and provide compute for the new templates,
|
- a **Proxmox host** to serve the virtual infrastructure and provide compute for the new templates,
|
||||||
- a **Vault instance** running in a container in the lab to hold the secrets needed for the builds,
|
- a **Vault instance** running in a container in the lab to hold the secrets needed for the builds,
|
||||||
|
- some **Packer content** for building the templates in the first place,
|
||||||
- an **on-premise self-hosted GitHub runner** to simplify connectivity between GitHub and my homelab,
|
- an **on-premise self-hosted GitHub runner** to simplify connectivity between GitHub and my homelab,
|
||||||
- and a **private GitHub repo** to hold the code and tell the runner when it's time to get to work.
|
- and a **private GitHub repo** to hold the code and tell the runner when it's time to get to work.
|
||||||
|
|
||||||
|
@ -191,3 +192,292 @@ Within the `packer` secrets engine, I have two secrets which each have a number
|
||||||
| `public_key` | `ssh-ed25519 AAAAC3NzaC1[...]lXLUI5I40 admin@example.com` | SSH public key for the user |
|
| `public_key` | `ssh-ed25519 AAAAC3NzaC1[...]lXLUI5I40 admin@example.com` | SSH public key for the user |
|
||||||
| `username` | `admin` | build account username |
|
| `username` | `admin` | build account username |
|
||||||
|
|
||||||
|
### Packer Content
|
||||||
|
The layout of my [Packer Proxmox repo](https://github.com/jbowdre/packer-proxmox-templates/) looks something like this:
|
||||||
|
|
||||||
|
```text
|
||||||
|
.
|
||||||
|
├── .github # [tl! collapse:8 ]
|
||||||
|
│ ├── actions
|
||||||
|
│ │ └── packerbuild
|
||||||
|
│ │ ├── action.yml
|
||||||
|
│ │ ├── build.sh
|
||||||
|
│ │ └── Dockerfile
|
||||||
|
│ └── workflows
|
||||||
|
│ ├── build-single.yml
|
||||||
|
│ └── build.yml
|
||||||
|
├── builds
|
||||||
|
│ └── linux
|
||||||
|
│ └── ubuntu
|
||||||
|
│ ├── 22-04-lts
|
||||||
|
│ │ ├── data
|
||||||
|
│ │ │ ├── meta-data
|
||||||
|
│ │ │ └── user-data.pkrtpl.hcl
|
||||||
|
│ │ ├── hardening.sh
|
||||||
|
│ │ ├── linux-server.auto.pkrvars.hcl
|
||||||
|
│ │ ├── linux-server.pkr.hcl
|
||||||
|
│ │ └── variables.pkr.hcl
|
||||||
|
│ └── 24-04-lts # [tl! collapse:7 ]
|
||||||
|
│ ├── data
|
||||||
|
│ │ ├── meta-data
|
||||||
|
│ │ └── user-data.pkrtpl.hcl
|
||||||
|
│ ├── hardening.sh
|
||||||
|
│ ├── linux-server.auto.pkrvars.hcl
|
||||||
|
│ ├── linux-server.pkr.hcl
|
||||||
|
│ └── variables.pkr.hcl
|
||||||
|
├── certs
|
||||||
|
├── scripts
|
||||||
|
│ └── linux # [tl! collapse:16 ]
|
||||||
|
│ ├── cleanup-cloud-init.sh
|
||||||
|
│ ├── cleanup-packages.sh
|
||||||
|
│ ├── cleanup-subiquity.sh
|
||||||
|
│ ├── configure-pam_mkhomedir.sh
|
||||||
|
│ ├── configure-sshd.sh
|
||||||
|
│ ├── disable-multipathd.sh
|
||||||
|
│ ├── generalize.sh
|
||||||
|
│ ├── install-ca-certs.sh
|
||||||
|
│ ├── install-cloud-init.sh
|
||||||
|
│ ├── join-domain.sh
|
||||||
|
│ ├── persist-cloud-init-net.sh
|
||||||
|
│ ├── prune-motd.sh
|
||||||
|
│ ├── set-homedir-privacy.sh
|
||||||
|
│ ├── update-packages.sh
|
||||||
|
│ ├── wait-for-cloud-init.sh
|
||||||
|
│ └── zero-disk.sh
|
||||||
|
├── build.sh -> .github/actions/packerbuild/build.sh
|
||||||
|
└── vault-env.sh
|
||||||
|
```
|
||||||
|
|
||||||
|
- `.github/` holds the actions and workflows that will perform the automated builds. I'll cover this later.
|
||||||
|
- `builds/` contains subfolders for OS types (Linux or Windows (eventually)) and then separate subfolders for each flavor.
|
||||||
|
- `linux/ubuntu/22-04-lts/` holds everything related to the Ubuntu 22.04 build:
|
||||||
|
- `data/meta-data` is an empty placeholder,
|
||||||
|
- `data/user-data.pkrtpl.hcl` is a template file for `cloud-init` to perform the initial install,
|
||||||
|
- `hardening.sh` is a script to perform basic security hardening,
|
||||||
|
- `variables.pkr.hcl` describes all the variables for the build,
|
||||||
|
- `linux-server.auto.pkrvars.hcl` assigns values to each of those variables, and
|
||||||
|
- `linux-server.pkr.hcl` details the steps for actually perfoming the build.
|
||||||
|
- `certs/` is empty in my case but *could* contain CA certificates that need to be installed in the template.
|
||||||
|
- `scripts/linux/` contains a variety of scripts that will be executed by Packer as a part of the build.
|
||||||
|
- `build.sh` is a (symlink to a) wrapper script which helps with running the builds locally.
|
||||||
|
- `vault-env.sh` exports variables for connecting to my Vault instance for use by `build.sh`.
|
||||||
|
|
||||||
|
Lets drill into that `cloud-init` template file first, `builds/linux/ubuntu/22-04-lts/data/user-data.pkrtpl.hcl`. It follows the basic YAML-based syntax of a standard [cloud config file](https://cloudinit.readthedocs.io/en/latest/reference/examples.html), but with some [HCL templating](https://developer.hashicorp.com/packer/docs/templates/hcl_templates/functions/file/templatefile) to pull in certain values from elsewhere.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# torchlight! {"lineNumbers":true}
|
||||||
|
#cloud-config
|
||||||
|
autoinstall:
|
||||||
|
%{ if length( apt_mirror ) > 0 ~}
|
||||||
|
apt:
|
||||||
|
primary:
|
||||||
|
- arches: [default]
|
||||||
|
uri: "${ apt_mirror }"
|
||||||
|
%{ endif ~}
|
||||||
|
early-commands: # [tl! **:5]
|
||||||
|
- sudo systemctl stop ssh # [tl! ~~]
|
||||||
|
identity:
|
||||||
|
hostname: ${ vm_guest_os_hostname } # [tl! ~~:2]
|
||||||
|
password: '${ build_password_hash }'
|
||||||
|
username: ${ build_username }
|
||||||
|
keyboard:
|
||||||
|
layout: ${ vm_guest_os_keyboard }
|
||||||
|
late-commands: # [tl! **:2]
|
||||||
|
- echo "${ build_username } ALL=(ALL) NOPASSWD:ALL" > /target/etc/sudoers.d/${ build_username } # [tl! ~~:1]
|
||||||
|
- curtin in-target --target=/target -- chmod 400 /etc/sudoers.d/${ build_username }
|
||||||
|
locale: ${ vm_guest_os_language }
|
||||||
|
network: # [tl! collapse:9]
|
||||||
|
network:
|
||||||
|
version: 2
|
||||||
|
ethernets:
|
||||||
|
mainif:
|
||||||
|
match:
|
||||||
|
name: e*
|
||||||
|
critical: true
|
||||||
|
dhcp4: true
|
||||||
|
dhcp-identifier: mac
|
||||||
|
%{ if length( apt_packages ) > 0 ~} # [tl! **:5]
|
||||||
|
packages:
|
||||||
|
%{ for package in apt_packages ~} # [tl! ~~:2]
|
||||||
|
- ${ package }
|
||||||
|
%{ endfor ~}
|
||||||
|
%{ endif ~}
|
||||||
|
ssh:
|
||||||
|
install-server: true
|
||||||
|
allow-pw: true
|
||||||
|
%{ if length( ssh_keys ) > 0 ~} # [tl! **:5]
|
||||||
|
authorized-keys:
|
||||||
|
%{ for ssh_key in ssh_keys ~} # [tl! ~~2]
|
||||||
|
- ${ ssh_key }
|
||||||
|
%{ endfor ~}
|
||||||
|
%{ endif ~}
|
||||||
|
storage:
|
||||||
|
config: # [tl! collapse:start]
|
||||||
|
- ptable: gpt
|
||||||
|
path: /dev/sda
|
||||||
|
wipe: superblock
|
||||||
|
type: disk
|
||||||
|
id: disk-sda
|
||||||
|
- device: disk-sda
|
||||||
|
size: ${ vm_guest_part_efi }M
|
||||||
|
wipe: superblock
|
||||||
|
flag: boot
|
||||||
|
number: 1
|
||||||
|
grub_device: true
|
||||||
|
type: partition
|
||||||
|
id: partition-0
|
||||||
|
- fstype: fat32
|
||||||
|
volume: partition-0
|
||||||
|
label: EFIFS
|
||||||
|
type: format
|
||||||
|
id: format-efi
|
||||||
|
- device: disk-sda
|
||||||
|
size: ${ vm_guest_part_boot }M
|
||||||
|
wipe: superblock
|
||||||
|
number: 2
|
||||||
|
type: partition
|
||||||
|
id: partition-1
|
||||||
|
- fstype: xfs
|
||||||
|
volume: partition-1
|
||||||
|
label: BOOTFS
|
||||||
|
type: format
|
||||||
|
id: format-boot
|
||||||
|
- device: disk-sda
|
||||||
|
size: -1
|
||||||
|
wipe: superblock
|
||||||
|
number: 3
|
||||||
|
type: partition
|
||||||
|
id: partition-2
|
||||||
|
- name: sysvg
|
||||||
|
devices:
|
||||||
|
- partition-2
|
||||||
|
type: lvm_volgroup
|
||||||
|
id: lvm_volgroup-0
|
||||||
|
- name: home
|
||||||
|
volgroup: lvm_volgroup-0
|
||||||
|
size: ${ vm_guest_part_home}M
|
||||||
|
wipe: superblock
|
||||||
|
type: lvm_partition
|
||||||
|
id: lvm_partition-home
|
||||||
|
- fstype: xfs
|
||||||
|
volume: lvm_partition-home
|
||||||
|
type: format
|
||||||
|
label: HOMEFS
|
||||||
|
id: format-home
|
||||||
|
- name: tmp
|
||||||
|
volgroup: lvm_volgroup-0
|
||||||
|
size: ${ vm_guest_part_tmp }M
|
||||||
|
wipe: superblock
|
||||||
|
type: lvm_partition
|
||||||
|
id: lvm_partition-tmp
|
||||||
|
- fstype: xfs
|
||||||
|
volume: lvm_partition-tmp
|
||||||
|
type: format
|
||||||
|
label: TMPFS
|
||||||
|
id: format-tmp
|
||||||
|
- name: var
|
||||||
|
volgroup: lvm_volgroup-0
|
||||||
|
size: ${ vm_guest_part_var }M
|
||||||
|
wipe: superblock
|
||||||
|
type: lvm_partition
|
||||||
|
id: lvm_partition-var
|
||||||
|
- fstype: xfs
|
||||||
|
volume: lvm_partition-var
|
||||||
|
type: format
|
||||||
|
label: VARFS
|
||||||
|
id: format-var
|
||||||
|
- name: log
|
||||||
|
volgroup: lvm_volgroup-0
|
||||||
|
size: ${ vm_guest_part_log }M
|
||||||
|
wipe: superblock
|
||||||
|
type: lvm_partition
|
||||||
|
id: lvm_partition-log
|
||||||
|
- fstype: xfs
|
||||||
|
volume: lvm_partition-log
|
||||||
|
type: format
|
||||||
|
label: LOGFS
|
||||||
|
id: format-log
|
||||||
|
- name: audit
|
||||||
|
volgroup: lvm_volgroup-0
|
||||||
|
size: ${ vm_guest_part_audit }M
|
||||||
|
wipe: superblock
|
||||||
|
type: lvm_partition
|
||||||
|
id: lvm_partition-audit
|
||||||
|
- fstype: xfs
|
||||||
|
volume: lvm_partition-audit
|
||||||
|
type: format
|
||||||
|
label: AUDITFS
|
||||||
|
id: format-audit
|
||||||
|
- name: vartmp
|
||||||
|
volgroup: lvm_volgroup-0
|
||||||
|
size: ${ vm_guest_part_vartmp }M
|
||||||
|
wipe: superblock
|
||||||
|
type: lvm_partition
|
||||||
|
id: lvm_partition-vartmp
|
||||||
|
- fstype: xfs
|
||||||
|
volume: lvm_partition-vartmp
|
||||||
|
type: format
|
||||||
|
label: VARTMPFS
|
||||||
|
id: format-vartmp
|
||||||
|
- name: root
|
||||||
|
volgroup: lvm_volgroup-0
|
||||||
|
%{ if vm_guest_part_root == 0 ~}
|
||||||
|
size: -1
|
||||||
|
%{ else ~}
|
||||||
|
size: ${ vm_guest_part_root }M
|
||||||
|
%{ endif ~}
|
||||||
|
wipe: superblock
|
||||||
|
type: lvm_partition
|
||||||
|
id: lvm_partition-root
|
||||||
|
- fstype: xfs
|
||||||
|
volume: lvm_partition-root
|
||||||
|
type: format
|
||||||
|
label: ROOTFS
|
||||||
|
id: format-root
|
||||||
|
- path: /
|
||||||
|
device: format-root
|
||||||
|
type: mount
|
||||||
|
id: mount-root
|
||||||
|
- path: /boot
|
||||||
|
device: format-boot
|
||||||
|
type: mount
|
||||||
|
id: mount-boot
|
||||||
|
- path: /boot/efi
|
||||||
|
device: format-efi
|
||||||
|
type: mount
|
||||||
|
id: mount-efi
|
||||||
|
- path: /home
|
||||||
|
device: format-home
|
||||||
|
type: mount
|
||||||
|
id: mount-home
|
||||||
|
- path: /tmp
|
||||||
|
device: format-tmp
|
||||||
|
type: mount
|
||||||
|
id: mount-tmp
|
||||||
|
- path: /var
|
||||||
|
device: format-var
|
||||||
|
type: mount
|
||||||
|
id: mount-var
|
||||||
|
- path: /var/log
|
||||||
|
device: format-log
|
||||||
|
type: mount
|
||||||
|
id: mount-log
|
||||||
|
- path: /var/log/audit
|
||||||
|
device: format-audit
|
||||||
|
type: mount
|
||||||
|
id: mount-audit
|
||||||
|
- path: /var/tmp
|
||||||
|
device: format-vartmp
|
||||||
|
type: mount
|
||||||
|
id: mount-vartmp # [tl! collapse:end]
|
||||||
|
user-data:
|
||||||
|
package_upgrade: true
|
||||||
|
disable_root: true
|
||||||
|
timezone: ${ vm_guest_os_timezone }
|
||||||
|
version: 1
|
||||||
|
```
|
||||||
|
|
||||||
|
Some of the key tasks handled by this configuration include:
|
||||||
|
- stopping the SSH server (line 10),
|
||||||
|
- setting the hostname (line 12), inserting username and password (lines 13-14),
|
||||||
|
-
|
||||||
|
|
Loading…
Reference in a new issue