mirror of
https://github.com/jbowdre/runtimeterror.git
synced 2024-11-25 08:22:19 +00:00
update draft
This commit is contained in:
parent
6c08e4cf8a
commit
ad63824ccd
1 changed files with 291 additions and 1 deletions
|
@ -21,7 +21,7 @@ tags:
|
|||
- vault
|
||||
---
|
||||
|
||||
I've been [using Proxmox](/ditching-vsphere-for-proxmox/) in my [homelab](/homelab/) for a little while now, and I recently expanded the environment a bit with the addition of two HP Elite Mini 800 G9 computers. I figured it was time to start automating the process of building and maintaining my VM templates. I already had functional [Packer templates for VMware](https://github.com/jbowdre/packer-vsphere-templates) so I used that content as a starting point for the Proxmox builds themselves. Once I had the builds working locally, I just had to explore how to automate them.
|
||||
I've been [using Proxmox](/ditching-vsphere-for-proxmox/) in my [homelab](/homelab/) for a little while now, and I recently expanded the environment a bit with the addition of two HP Elite Mini 800 G9 computers. I figured it was time to start automating the process of building and maintaining my VM templates. I already had functional [Packer templates for VMware](https://github.com/jbowdre/packer-vsphere-templates) so I used that content as a starting point for the [Proxmox builds](https://github.com/jbowdre/packer-proxmox-templates). Once I had the builds working locally, I just had to explore how to automate them.
|
||||
|
||||
This post will describe how I did it. It will cover a lot of the implementation details but may gloss over some general setup steps; you'll likely need at least passing familiarity with [Packer](https://www.packer.io/) and [Vault](https://www.vaultproject.io/) to take this on.
|
||||
|
||||
|
@ -29,6 +29,7 @@ This post will describe how I did it. It will cover a lot of the implementation
|
|||
There are a lot of parts to this setup, so let's start by quickly running through those:
|
||||
- a **Proxmox host** to serve the virtual infrastructure and provide compute for the new templates,
|
||||
- a **Vault instance** running in a container in the lab to hold the secrets needed for the builds,
|
||||
- some **Packer content** for building the templates in the first place,
|
||||
- an **on-premise self-hosted GitHub runner** to simplify connectivity between GitHub and my homelab,
|
||||
- and a **private GitHub repo** to hold the code and tell the runner when it's time to get to work.
|
||||
|
||||
|
@ -191,3 +192,292 @@ Within the `packer` secrets engine, I have two secrets which each have a number
|
|||
| `public_key` | `ssh-ed25519 AAAAC3NzaC1[...]lXLUI5I40 admin@example.com` | SSH public key for the user |
|
||||
| `username` | `admin` | build account username |
|
||||
|
||||
### Packer Content
|
||||
The layout of my [Packer Proxmox repo](https://github.com/jbowdre/packer-proxmox-templates/) looks something like this:
|
||||
|
||||
```text
|
||||
.
|
||||
├── .github # [tl! collapse:8 ]
|
||||
│ ├── actions
|
||||
│ │ └── packerbuild
|
||||
│ │ ├── action.yml
|
||||
│ │ ├── build.sh
|
||||
│ │ └── Dockerfile
|
||||
│ └── workflows
|
||||
│ ├── build-single.yml
|
||||
│ └── build.yml
|
||||
├── builds
|
||||
│ └── linux
|
||||
│ └── ubuntu
|
||||
│ ├── 22-04-lts
|
||||
│ │ ├── data
|
||||
│ │ │ ├── meta-data
|
||||
│ │ │ └── user-data.pkrtpl.hcl
|
||||
│ │ ├── hardening.sh
|
||||
│ │ ├── linux-server.auto.pkrvars.hcl
|
||||
│ │ ├── linux-server.pkr.hcl
|
||||
│ │ └── variables.pkr.hcl
|
||||
│ └── 24-04-lts # [tl! collapse:7 ]
|
||||
│ ├── data
|
||||
│ │ ├── meta-data
|
||||
│ │ └── user-data.pkrtpl.hcl
|
||||
│ ├── hardening.sh
|
||||
│ ├── linux-server.auto.pkrvars.hcl
|
||||
│ ├── linux-server.pkr.hcl
|
||||
│ └── variables.pkr.hcl
|
||||
├── certs
|
||||
├── scripts
|
||||
│ └── linux # [tl! collapse:16 ]
|
||||
│ ├── cleanup-cloud-init.sh
|
||||
│ ├── cleanup-packages.sh
|
||||
│ ├── cleanup-subiquity.sh
|
||||
│ ├── configure-pam_mkhomedir.sh
|
||||
│ ├── configure-sshd.sh
|
||||
│ ├── disable-multipathd.sh
|
||||
│ ├── generalize.sh
|
||||
│ ├── install-ca-certs.sh
|
||||
│ ├── install-cloud-init.sh
|
||||
│ ├── join-domain.sh
|
||||
│ ├── persist-cloud-init-net.sh
|
||||
│ ├── prune-motd.sh
|
||||
│ ├── set-homedir-privacy.sh
|
||||
│ ├── update-packages.sh
|
||||
│ ├── wait-for-cloud-init.sh
|
||||
│ └── zero-disk.sh
|
||||
├── build.sh -> .github/actions/packerbuild/build.sh
|
||||
└── vault-env.sh
|
||||
```
|
||||
|
||||
- `.github/` holds the actions and workflows that will perform the automated builds. I'll cover this later.
|
||||
- `builds/` contains subfolders for OS types (Linux or Windows (eventually)) and then separate subfolders for each flavor.
|
||||
- `linux/ubuntu/22-04-lts/` holds everything related to the Ubuntu 22.04 build:
|
||||
- `data/meta-data` is an empty placeholder,
|
||||
- `data/user-data.pkrtpl.hcl` is a template file for `cloud-init` to perform the initial install,
|
||||
- `hardening.sh` is a script to perform basic security hardening,
|
||||
- `variables.pkr.hcl` describes all the variables for the build,
|
||||
- `linux-server.auto.pkrvars.hcl` assigns values to each of those variables, and
|
||||
- `linux-server.pkr.hcl` details the steps for actually perfoming the build.
|
||||
- `certs/` is empty in my case but *could* contain CA certificates that need to be installed in the template.
|
||||
- `scripts/linux/` contains a variety of scripts that will be executed by Packer as a part of the build.
|
||||
- `build.sh` is a (symlink to a) wrapper script which helps with running the builds locally.
|
||||
- `vault-env.sh` exports variables for connecting to my Vault instance for use by `build.sh`.
|
||||
|
||||
Lets drill into that `cloud-init` template file first, `builds/linux/ubuntu/22-04-lts/data/user-data.pkrtpl.hcl`. It follows the basic YAML-based syntax of a standard [cloud config file](https://cloudinit.readthedocs.io/en/latest/reference/examples.html), but with some [HCL templating](https://developer.hashicorp.com/packer/docs/templates/hcl_templates/functions/file/templatefile) to pull in certain values from elsewhere.
|
||||
|
||||
```yaml
|
||||
# torchlight! {"lineNumbers":true}
|
||||
#cloud-config
|
||||
autoinstall:
|
||||
%{ if length( apt_mirror ) > 0 ~}
|
||||
apt:
|
||||
primary:
|
||||
- arches: [default]
|
||||
uri: "${ apt_mirror }"
|
||||
%{ endif ~}
|
||||
early-commands: # [tl! **:5]
|
||||
- sudo systemctl stop ssh # [tl! ~~]
|
||||
identity:
|
||||
hostname: ${ vm_guest_os_hostname } # [tl! ~~:2]
|
||||
password: '${ build_password_hash }'
|
||||
username: ${ build_username }
|
||||
keyboard:
|
||||
layout: ${ vm_guest_os_keyboard }
|
||||
late-commands: # [tl! **:2]
|
||||
- echo "${ build_username } ALL=(ALL) NOPASSWD:ALL" > /target/etc/sudoers.d/${ build_username } # [tl! ~~:1]
|
||||
- curtin in-target --target=/target -- chmod 400 /etc/sudoers.d/${ build_username }
|
||||
locale: ${ vm_guest_os_language }
|
||||
network: # [tl! collapse:9]
|
||||
network:
|
||||
version: 2
|
||||
ethernets:
|
||||
mainif:
|
||||
match:
|
||||
name: e*
|
||||
critical: true
|
||||
dhcp4: true
|
||||
dhcp-identifier: mac
|
||||
%{ if length( apt_packages ) > 0 ~} # [tl! **:5]
|
||||
packages:
|
||||
%{ for package in apt_packages ~} # [tl! ~~:2]
|
||||
- ${ package }
|
||||
%{ endfor ~}
|
||||
%{ endif ~}
|
||||
ssh:
|
||||
install-server: true
|
||||
allow-pw: true
|
||||
%{ if length( ssh_keys ) > 0 ~} # [tl! **:5]
|
||||
authorized-keys:
|
||||
%{ for ssh_key in ssh_keys ~} # [tl! ~~2]
|
||||
- ${ ssh_key }
|
||||
%{ endfor ~}
|
||||
%{ endif ~}
|
||||
storage:
|
||||
config: # [tl! collapse:start]
|
||||
- ptable: gpt
|
||||
path: /dev/sda
|
||||
wipe: superblock
|
||||
type: disk
|
||||
id: disk-sda
|
||||
- device: disk-sda
|
||||
size: ${ vm_guest_part_efi }M
|
||||
wipe: superblock
|
||||
flag: boot
|
||||
number: 1
|
||||
grub_device: true
|
||||
type: partition
|
||||
id: partition-0
|
||||
- fstype: fat32
|
||||
volume: partition-0
|
||||
label: EFIFS
|
||||
type: format
|
||||
id: format-efi
|
||||
- device: disk-sda
|
||||
size: ${ vm_guest_part_boot }M
|
||||
wipe: superblock
|
||||
number: 2
|
||||
type: partition
|
||||
id: partition-1
|
||||
- fstype: xfs
|
||||
volume: partition-1
|
||||
label: BOOTFS
|
||||
type: format
|
||||
id: format-boot
|
||||
- device: disk-sda
|
||||
size: -1
|
||||
wipe: superblock
|
||||
number: 3
|
||||
type: partition
|
||||
id: partition-2
|
||||
- name: sysvg
|
||||
devices:
|
||||
- partition-2
|
||||
type: lvm_volgroup
|
||||
id: lvm_volgroup-0
|
||||
- name: home
|
||||
volgroup: lvm_volgroup-0
|
||||
size: ${ vm_guest_part_home}M
|
||||
wipe: superblock
|
||||
type: lvm_partition
|
||||
id: lvm_partition-home
|
||||
- fstype: xfs
|
||||
volume: lvm_partition-home
|
||||
type: format
|
||||
label: HOMEFS
|
||||
id: format-home
|
||||
- name: tmp
|
||||
volgroup: lvm_volgroup-0
|
||||
size: ${ vm_guest_part_tmp }M
|
||||
wipe: superblock
|
||||
type: lvm_partition
|
||||
id: lvm_partition-tmp
|
||||
- fstype: xfs
|
||||
volume: lvm_partition-tmp
|
||||
type: format
|
||||
label: TMPFS
|
||||
id: format-tmp
|
||||
- name: var
|
||||
volgroup: lvm_volgroup-0
|
||||
size: ${ vm_guest_part_var }M
|
||||
wipe: superblock
|
||||
type: lvm_partition
|
||||
id: lvm_partition-var
|
||||
- fstype: xfs
|
||||
volume: lvm_partition-var
|
||||
type: format
|
||||
label: VARFS
|
||||
id: format-var
|
||||
- name: log
|
||||
volgroup: lvm_volgroup-0
|
||||
size: ${ vm_guest_part_log }M
|
||||
wipe: superblock
|
||||
type: lvm_partition
|
||||
id: lvm_partition-log
|
||||
- fstype: xfs
|
||||
volume: lvm_partition-log
|
||||
type: format
|
||||
label: LOGFS
|
||||
id: format-log
|
||||
- name: audit
|
||||
volgroup: lvm_volgroup-0
|
||||
size: ${ vm_guest_part_audit }M
|
||||
wipe: superblock
|
||||
type: lvm_partition
|
||||
id: lvm_partition-audit
|
||||
- fstype: xfs
|
||||
volume: lvm_partition-audit
|
||||
type: format
|
||||
label: AUDITFS
|
||||
id: format-audit
|
||||
- name: vartmp
|
||||
volgroup: lvm_volgroup-0
|
||||
size: ${ vm_guest_part_vartmp }M
|
||||
wipe: superblock
|
||||
type: lvm_partition
|
||||
id: lvm_partition-vartmp
|
||||
- fstype: xfs
|
||||
volume: lvm_partition-vartmp
|
||||
type: format
|
||||
label: VARTMPFS
|
||||
id: format-vartmp
|
||||
- name: root
|
||||
volgroup: lvm_volgroup-0
|
||||
%{ if vm_guest_part_root == 0 ~}
|
||||
size: -1
|
||||
%{ else ~}
|
||||
size: ${ vm_guest_part_root }M
|
||||
%{ endif ~}
|
||||
wipe: superblock
|
||||
type: lvm_partition
|
||||
id: lvm_partition-root
|
||||
- fstype: xfs
|
||||
volume: lvm_partition-root
|
||||
type: format
|
||||
label: ROOTFS
|
||||
id: format-root
|
||||
- path: /
|
||||
device: format-root
|
||||
type: mount
|
||||
id: mount-root
|
||||
- path: /boot
|
||||
device: format-boot
|
||||
type: mount
|
||||
id: mount-boot
|
||||
- path: /boot/efi
|
||||
device: format-efi
|
||||
type: mount
|
||||
id: mount-efi
|
||||
- path: /home
|
||||
device: format-home
|
||||
type: mount
|
||||
id: mount-home
|
||||
- path: /tmp
|
||||
device: format-tmp
|
||||
type: mount
|
||||
id: mount-tmp
|
||||
- path: /var
|
||||
device: format-var
|
||||
type: mount
|
||||
id: mount-var
|
||||
- path: /var/log
|
||||
device: format-log
|
||||
type: mount
|
||||
id: mount-log
|
||||
- path: /var/log/audit
|
||||
device: format-audit
|
||||
type: mount
|
||||
id: mount-audit
|
||||
- path: /var/tmp
|
||||
device: format-vartmp
|
||||
type: mount
|
||||
id: mount-vartmp # [tl! collapse:end]
|
||||
user-data:
|
||||
package_upgrade: true
|
||||
disable_root: true
|
||||
timezone: ${ vm_guest_os_timezone }
|
||||
version: 1
|
||||
```
|
||||
|
||||
Some of the key tasks handled by this configuration include:
|
||||
- stopping the SSH server (line 10),
|
||||
- setting the hostname (line 12), inserting username and password (lines 13-14),
|
||||
-
|
||||
|
|
Loading…
Reference in a new issue