Split git.o.o haproxy out of cgit module.
* manifests/site.pp: Use distinct manifests for git.o.o and git.o.o backends. This allows for the haproxy server to not serve git content and purely be a load balancer. * modules/cgit/manifests/init.pp: Remove haproxy from cgit module. Remove stale xinetd cleanup. Select git daemon port when selecting HTTP(S) ports. * modules/openstack_project/manifests/git.pp: Make git.pp a manifest to load balance git servers with haproxy. * modules/openstack_project/manifests/git_backend.pp: New manifest to manage servers that actually serve git content. They sit behind a load balancer. * modules/openstack_project/manifests/review.pp: Stop replicating repos to git load balancer. Change-Id: I343a0d1e0a7b93874c2e2299ed974a3304957efb
This commit is contained in:
parent
77fc7f08db
commit
f22f8f5aa1
@ -289,27 +289,17 @@ node /^elasticsearch\d*\.openstack\.org$/ {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
# A CentOS machine load balance git access. Will also
|
# A CentOS machine to load balance git access.
|
||||||
# run local cgit and git daemon.
|
|
||||||
node 'git.openstack.org' {
|
node 'git.openstack.org' {
|
||||||
class { 'openstack_project::git':
|
class { 'openstack_project::git':
|
||||||
vhost_name => 'git.openstack.org',
|
|
||||||
sysadmins => hiera('sysadmins'),
|
sysadmins => hiera('sysadmins'),
|
||||||
git_gerrit_ssh_key => hiera('gerrit_replication_ssh_rsa_pubkey_contents'),
|
|
||||||
ssl_cert_file_contents => hiera('git_ssl_cert_file_contents'),
|
|
||||||
ssl_key_file_contents => hiera('git_ssl_key_file_contents'),
|
|
||||||
ssl_chain_file_contents => hiera('git_ssl_chain_file_contents'),
|
|
||||||
balance_git => true,
|
|
||||||
behind_proxy => true,
|
|
||||||
balancer_member_names => [
|
balancer_member_names => [
|
||||||
'localhost',
|
|
||||||
'git01.openstack.org',
|
'git01.openstack.org',
|
||||||
'git02.openstack.org',
|
'git02.openstack.org',
|
||||||
'git03.openstack.org',
|
'git03.openstack.org',
|
||||||
'git04.openstack.org',
|
'git04.openstack.org',
|
||||||
],
|
],
|
||||||
balancer_member_ips => [
|
balancer_member_ips => [
|
||||||
'127.0.0.1',
|
|
||||||
'192.237.218.169',
|
'192.237.218.169',
|
||||||
'192.237.217.253',
|
'192.237.217.253',
|
||||||
'192.237.218.239',
|
'192.237.218.239',
|
||||||
@ -321,7 +311,7 @@ node 'git.openstack.org' {
|
|||||||
# CentOS machines to run cgit and git daemon. Will be
|
# CentOS machines to run cgit and git daemon. Will be
|
||||||
# load balanced by git.openstack.org.
|
# load balanced by git.openstack.org.
|
||||||
node /^git\d+\.openstack\.org$/ {
|
node /^git\d+\.openstack\.org$/ {
|
||||||
class { 'openstack_project::git':
|
class { 'openstack_project::git_backend':
|
||||||
vhost_name => 'git.openstack.org',
|
vhost_name => 'git.openstack.org',
|
||||||
sysadmins => hiera('sysadmins'),
|
sysadmins => hiera('sysadmins'),
|
||||||
git_gerrit_ssh_key => hiera('gerrit_replication_ssh_rsa_pubkey_contents'),
|
git_gerrit_ssh_key => hiera('gerrit_replication_ssh_rsa_pubkey_contents'),
|
||||||
|
@ -18,7 +18,6 @@ class cgit(
|
|||||||
$vhost_name = $::fqdn,
|
$vhost_name = $::fqdn,
|
||||||
$serveradmin = "webmaster@${::fqdn}",
|
$serveradmin = "webmaster@${::fqdn}",
|
||||||
$cgitdir = '/var/www/cgit',
|
$cgitdir = '/var/www/cgit',
|
||||||
$daemon_port = '29418',
|
|
||||||
$staticfiles = '/var/www/cgit/static',
|
$staticfiles = '/var/www/cgit/static',
|
||||||
$ssl_cert_file = '',
|
$ssl_cert_file = '',
|
||||||
$ssl_key_file = '',
|
$ssl_key_file = '',
|
||||||
@ -26,10 +25,7 @@ class cgit(
|
|||||||
$ssl_cert_file_contents = '', # If left empty puppet will not create file.
|
$ssl_cert_file_contents = '', # If left empty puppet will not create file.
|
||||||
$ssl_key_file_contents = '', # If left empty puppet will not create file.
|
$ssl_key_file_contents = '', # If left empty puppet will not create file.
|
||||||
$ssl_chain_file_contents = '', # If left empty puppet will not create file.
|
$ssl_chain_file_contents = '', # If left empty puppet will not create file.
|
||||||
$balance_git = false,
|
|
||||||
$behind_proxy = false,
|
$behind_proxy = false,
|
||||||
$balancer_member_names = [],
|
|
||||||
$balancer_member_ips = []
|
|
||||||
) {
|
) {
|
||||||
|
|
||||||
include apache
|
include apache
|
||||||
@ -90,10 +86,12 @@ class cgit(
|
|||||||
if $behind_proxy == true {
|
if $behind_proxy == true {
|
||||||
$http_port = 8080
|
$http_port = 8080
|
||||||
$https_port = 4443
|
$https_port = 4443
|
||||||
|
$daemon_port = 29418
|
||||||
}
|
}
|
||||||
else {
|
else {
|
||||||
$http_port = 80
|
$http_port = 80
|
||||||
$https_port = 443
|
$https_port = 443
|
||||||
|
$daemon_port = 9418
|
||||||
}
|
}
|
||||||
|
|
||||||
exec { 'cgit_allow_http_port':
|
exec { 'cgit_allow_http_port':
|
||||||
@ -162,19 +160,6 @@ class cgit(
|
|||||||
require => File[$cgitdir],
|
require => File[$cgitdir],
|
||||||
}
|
}
|
||||||
|
|
||||||
file { '/etc/xinetd.d/git':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'root',
|
|
||||||
group => 'root',
|
|
||||||
mode => '0644',
|
|
||||||
source => 'puppet:///modules/cgit/git.xinetd',
|
|
||||||
}
|
|
||||||
|
|
||||||
service { 'xinetd':
|
|
||||||
ensure => stopped,
|
|
||||||
subscribe => File['/etc/xinetd.d/git'],
|
|
||||||
}
|
|
||||||
|
|
||||||
file { '/etc/init.d/git-daemon':
|
file { '/etc/init.d/git-daemon':
|
||||||
ensure => present,
|
ensure => present,
|
||||||
owner => 'root',
|
owner => 'root',
|
||||||
@ -217,90 +202,4 @@ class cgit(
|
|||||||
before => Apache::Vhost[$vhost_name],
|
before => Apache::Vhost[$vhost_name],
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
if $balance_git == true {
|
|
||||||
class { 'haproxy':
|
|
||||||
enable => true,
|
|
||||||
global_options => {
|
|
||||||
'log' => '127.0.0.1 local0',
|
|
||||||
'chroot' => '/var/lib/haproxy',
|
|
||||||
'pidfile' => '/var/run/haproxy.pid',
|
|
||||||
'maxconn' => '4000',
|
|
||||||
'user' => 'haproxy',
|
|
||||||
'group' => 'haproxy',
|
|
||||||
'daemon' => '',
|
|
||||||
'stats' => 'socket /var/lib/haproxy/stats'
|
|
||||||
},
|
|
||||||
}
|
|
||||||
# The three listen defines here are what the world will hit.
|
|
||||||
haproxy::listen { 'balance_git_http':
|
|
||||||
ipaddress => [$::ipaddress, $::ipaddress6],
|
|
||||||
ports => ['80'],
|
|
||||||
mode => 'tcp',
|
|
||||||
collect_exported => false,
|
|
||||||
options => {
|
|
||||||
'balance' => 'source',
|
|
||||||
'option' => [
|
|
||||||
'tcplog',
|
|
||||||
],
|
|
||||||
},
|
|
||||||
}
|
|
||||||
haproxy::listen { 'balance_git_https':
|
|
||||||
ipaddress => [$::ipaddress, $::ipaddress6],
|
|
||||||
ports => ['443'],
|
|
||||||
mode => 'tcp',
|
|
||||||
collect_exported => false,
|
|
||||||
options => {
|
|
||||||
'balance' => 'source',
|
|
||||||
'option' => [
|
|
||||||
'tcplog',
|
|
||||||
],
|
|
||||||
},
|
|
||||||
}
|
|
||||||
haproxy::listen { 'balance_git_daemon':
|
|
||||||
ipaddress => [$::ipaddress, $::ipaddress6],
|
|
||||||
ports => ['9418'],
|
|
||||||
mode => 'tcp',
|
|
||||||
collect_exported => false,
|
|
||||||
options => {
|
|
||||||
'maxconn' => '32',
|
|
||||||
'backlog' => '64',
|
|
||||||
'balance' => 'source',
|
|
||||||
'option' => [
|
|
||||||
'tcplog',
|
|
||||||
],
|
|
||||||
},
|
|
||||||
}
|
|
||||||
haproxy::balancermember { 'balance_git_http_member':
|
|
||||||
listening_service => 'balance_git_http',
|
|
||||||
server_names => $balancer_member_names,
|
|
||||||
ipaddresses => $balancer_member_ips,
|
|
||||||
ports => '8080',
|
|
||||||
}
|
|
||||||
haproxy::balancermember { 'balance_git_https_member':
|
|
||||||
listening_service => 'balance_git_https',
|
|
||||||
server_names => $balancer_member_names,
|
|
||||||
ipaddresses => $balancer_member_ips,
|
|
||||||
ports => '4443',
|
|
||||||
}
|
|
||||||
haproxy::balancermember { 'balance_git_daemon_member':
|
|
||||||
listening_service => 'balance_git_daemon',
|
|
||||||
server_names => $balancer_member_names,
|
|
||||||
ipaddresses => $balancer_member_ips,
|
|
||||||
ports => '29418',
|
|
||||||
options => 'maxqueue 512',
|
|
||||||
}
|
|
||||||
|
|
||||||
file { '/etc/rsyslog.d/haproxy.conf':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'root',
|
|
||||||
group => 'root',
|
|
||||||
mode => '0644',
|
|
||||||
source => 'puppet:///modules/cgit/rsyslog.haproxy.conf',
|
|
||||||
}
|
|
||||||
service { 'rsyslog':
|
|
||||||
ensure => running,
|
|
||||||
subscribe => file['/etc/rsyslog.d/haproxy.conf'],
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
@ -12,125 +12,104 @@
|
|||||||
# License for the specific language governing permissions and limitations
|
# License for the specific language governing permissions and limitations
|
||||||
# under the License.
|
# under the License.
|
||||||
#
|
#
|
||||||
# Class to configure cgit on a CentOS node.
|
# Class to configure haproxy to serve git on a CentOS node.
|
||||||
#
|
#
|
||||||
# == Class: openstack_project::git
|
# == Class: openstack_project::git
|
||||||
class openstack_project::git (
|
class openstack_project::git (
|
||||||
$vhost_name = $::fqdn,
|
|
||||||
$sysadmins = [],
|
$sysadmins = [],
|
||||||
$git_gerrit_ssh_key = '',
|
|
||||||
$ssl_cert_file_contents = '',
|
|
||||||
$ssl_key_file_contents = '',
|
|
||||||
$ssl_chain_file_contents = '',
|
|
||||||
$balance_git = false,
|
|
||||||
$behind_proxy = false,
|
|
||||||
$balancer_member_names = [],
|
$balancer_member_names = [],
|
||||||
$balancer_member_ips = []
|
$balancer_member_ips = []
|
||||||
) {
|
) {
|
||||||
class { 'openstack_project::server':
|
class { 'openstack_project::server':
|
||||||
iptables_public_tcp_ports => [80, 443, 4443, 8080, 9418, 29418],
|
iptables_public_tcp_ports => [80, 443, 9418],
|
||||||
sysadmins => $sysadmins,
|
sysadmins => $sysadmins,
|
||||||
}
|
}
|
||||||
|
|
||||||
include jeepyb
|
|
||||||
include pip
|
|
||||||
|
|
||||||
class { '::cgit':
|
|
||||||
vhost_name => $vhost_name,
|
|
||||||
ssl_cert_file => '/etc/pki/tls/certs/git.openstack.org.pem',
|
|
||||||
ssl_key_file => '/etc/pki/tls/private/git.openstack.org.key',
|
|
||||||
ssl_chain_file => '/etc/pki/tls/certs/intermediate.pem',
|
|
||||||
ssl_cert_file_contents => $ssl_cert_file_contents,
|
|
||||||
ssl_key_file_contents => $ssl_key_file_contents,
|
|
||||||
ssl_chain_file_contents => $ssl_chain_file_contents,
|
|
||||||
balance_git => $balance_git,
|
|
||||||
behind_proxy => $behind_proxy,
|
|
||||||
balancer_member_names => $balancer_member_names,
|
|
||||||
balancer_member_ips => $balancer_member_ips,
|
|
||||||
}
|
|
||||||
|
|
||||||
# We don't actually use these, but jeepyb requires them.
|
|
||||||
$local_git_dir = '/var/lib/git'
|
|
||||||
$ssh_project_key = ''
|
|
||||||
|
|
||||||
file { '/etc/cgitrc':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'root',
|
|
||||||
group => 'root',
|
|
||||||
mode => '0644',
|
|
||||||
source => 'puppet:///modules/openstack_project/git/cgitrc'
|
|
||||||
}
|
|
||||||
|
|
||||||
file { '/home/cgit/.ssh/':
|
|
||||||
ensure => directory,
|
|
||||||
owner => 'cgit',
|
|
||||||
group => 'cgit',
|
|
||||||
mode => '0700',
|
|
||||||
require => User['cgit'],
|
|
||||||
}
|
|
||||||
|
|
||||||
file { '/home/cgit/.ssh/authorized_keys':
|
|
||||||
owner => 'cgit',
|
|
||||||
group => 'cgit',
|
|
||||||
mode => '0600',
|
|
||||||
content => $git_gerrit_ssh_key,
|
|
||||||
replace => true,
|
|
||||||
require => File['/home/cgit/.ssh/']
|
|
||||||
}
|
|
||||||
|
|
||||||
file { '/home/cgit/projects.yaml':
|
|
||||||
ensure => present,
|
|
||||||
owner => 'cgit',
|
|
||||||
group => 'cgit',
|
|
||||||
mode => '0444',
|
|
||||||
content => template('openstack_project/review.projects.yaml.erb'),
|
|
||||||
replace => true,
|
|
||||||
}
|
|
||||||
|
|
||||||
exec { 'create_cgitrepos':
|
|
||||||
command => 'create-cgitrepos',
|
|
||||||
path => '/bin:/usr/bin:/usr/local/bin',
|
|
||||||
require => File['/home/cgit/projects.yaml'],
|
|
||||||
subscribe => File['/home/cgit/projects.yaml'],
|
|
||||||
refreshonly => true,
|
|
||||||
}
|
|
||||||
|
|
||||||
class { 'selinux':
|
class { 'selinux':
|
||||||
mode => 'enforcing'
|
mode => 'enforcing'
|
||||||
}
|
}
|
||||||
|
|
||||||
cron { 'mirror_repack':
|
class { 'haproxy':
|
||||||
user => 'cgit',
|
enable => true,
|
||||||
weekday => '0',
|
global_options => {
|
||||||
hour => '4',
|
'log' => '127.0.0.1 local0',
|
||||||
minute => '7',
|
'chroot' => '/var/lib/haproxy',
|
||||||
command => 'find /var/lib/git/ -type d -name "*.git" -print -exec git --git-dir="{}" repack -afd \; -exec git --git-dir="{}" pack-refs --all \;',
|
'pidfile' => '/var/run/haproxy.pid',
|
||||||
environment => 'PATH=/usr/bin:/bin:/usr/sbin:/sbin',
|
'maxconn' => '4000',
|
||||||
require => User['cgit'],
|
'user' => 'haproxy',
|
||||||
|
'group' => 'haproxy',
|
||||||
|
'daemon' => '',
|
||||||
|
'stats' => 'socket /var/lib/haproxy/stats'
|
||||||
|
},
|
||||||
|
}
|
||||||
|
# The three listen defines here are what the world will hit.
|
||||||
|
haproxy::listen { 'balance_git_http':
|
||||||
|
ipaddress => [$::ipaddress, $::ipaddress6],
|
||||||
|
ports => ['80'],
|
||||||
|
mode => 'tcp',
|
||||||
|
collect_exported => false,
|
||||||
|
options => {
|
||||||
|
'balance' => 'source',
|
||||||
|
'option' => [
|
||||||
|
'tcplog',
|
||||||
|
],
|
||||||
|
},
|
||||||
|
}
|
||||||
|
haproxy::listen { 'balance_git_https':
|
||||||
|
ipaddress => [$::ipaddress, $::ipaddress6],
|
||||||
|
ports => ['443'],
|
||||||
|
mode => 'tcp',
|
||||||
|
collect_exported => false,
|
||||||
|
options => {
|
||||||
|
'balance' => 'source',
|
||||||
|
'option' => [
|
||||||
|
'tcplog',
|
||||||
|
],
|
||||||
|
},
|
||||||
|
}
|
||||||
|
haproxy::listen { 'balance_git_daemon':
|
||||||
|
ipaddress => [$::ipaddress, $::ipaddress6],
|
||||||
|
ports => ['9418'],
|
||||||
|
mode => 'tcp',
|
||||||
|
collect_exported => false,
|
||||||
|
options => {
|
||||||
|
'maxconn' => '32',
|
||||||
|
'backlog' => '64',
|
||||||
|
'balance' => 'source',
|
||||||
|
'option' => [
|
||||||
|
'tcplog',
|
||||||
|
],
|
||||||
|
},
|
||||||
|
}
|
||||||
|
haproxy::balancermember { 'balance_git_http_member':
|
||||||
|
listening_service => 'balance_git_http',
|
||||||
|
server_names => $balancer_member_names,
|
||||||
|
ipaddresses => $balancer_member_ips,
|
||||||
|
ports => '8080',
|
||||||
|
}
|
||||||
|
haproxy::balancermember { 'balance_git_https_member':
|
||||||
|
listening_service => 'balance_git_https',
|
||||||
|
server_names => $balancer_member_names,
|
||||||
|
ipaddresses => $balancer_member_ips,
|
||||||
|
ports => '4443',
|
||||||
|
}
|
||||||
|
haproxy::balancermember { 'balance_git_daemon_member':
|
||||||
|
listening_service => 'balance_git_daemon',
|
||||||
|
server_names => $balancer_member_names,
|
||||||
|
ipaddresses => $balancer_member_ips,
|
||||||
|
ports => '29418',
|
||||||
|
options => 'maxqueue 512',
|
||||||
}
|
}
|
||||||
|
|
||||||
file { '/var/www/cgit/static/openstack.png':
|
file { '/etc/rsyslog.d/haproxy.conf':
|
||||||
ensure => present,
|
ensure => present,
|
||||||
source => 'puppet:///modules/openstack_project/openstack.png',
|
owner => 'root',
|
||||||
require => File['/var/www/cgit/static'],
|
group => 'root',
|
||||||
|
mode => '0644',
|
||||||
|
source => 'puppet:///modules/cgit/rsyslog.haproxy.conf',
|
||||||
}
|
}
|
||||||
|
service { 'rsyslog':
|
||||||
file { '/var/www/cgit/static/favicon.ico':
|
ensure => running,
|
||||||
ensure => present,
|
subscribe => file['/etc/rsyslog.d/haproxy.conf'],
|
||||||
source => 'puppet:///modules/openstack_project/status/favicon.ico',
|
|
||||||
require => File['/var/www/cgit/static'],
|
|
||||||
}
|
}
|
||||||
|
|
||||||
file { '/var/www/cgit/static/openstack-page-bkg.jpg':
|
|
||||||
ensure => present,
|
|
||||||
source => 'puppet:///modules/openstack_project/openstack-page-bkg.jpg',
|
|
||||||
require => File['/var/www/cgit/static'],
|
|
||||||
}
|
|
||||||
|
|
||||||
file { '/var/www/cgit/static/openstack.css':
|
|
||||||
ensure => present,
|
|
||||||
source => 'puppet:///modules/openstack_project/git/openstack.css',
|
|
||||||
require => File['/var/www/cgit/static'],
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
130
modules/openstack_project/manifests/git_backend.pp
Normal file
130
modules/openstack_project/manifests/git_backend.pp
Normal file
@ -0,0 +1,130 @@
|
|||||||
|
# Copyright 2013 Hewlett-Packard Development Company, L.P.
|
||||||
|
#
|
||||||
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
||||||
|
# not use this file except in compliance with the License. You may obtain
|
||||||
|
# a copy of the License at
|
||||||
|
#
|
||||||
|
# http://www.apache.org/licenses/LICENSE-2.0
|
||||||
|
#
|
||||||
|
# Unless required by applicable law or agreed to in writing, software
|
||||||
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
||||||
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
||||||
|
# License for the specific language governing permissions and limitations
|
||||||
|
# under the License.
|
||||||
|
#
|
||||||
|
# Class to configure cgit on a CentOS node.
|
||||||
|
#
|
||||||
|
# == Class: openstack_project::git_backend
|
||||||
|
class openstack_project::git_backend (
|
||||||
|
$vhost_name = $::fqdn,
|
||||||
|
$sysadmins = [],
|
||||||
|
$git_gerrit_ssh_key = '',
|
||||||
|
$ssl_cert_file_contents = '',
|
||||||
|
$ssl_key_file_contents = '',
|
||||||
|
$ssl_chain_file_contents = '',
|
||||||
|
$behind_proxy = false
|
||||||
|
) {
|
||||||
|
class { 'openstack_project::server':
|
||||||
|
iptables_public_tcp_ports => [4443, 8080, 29418],
|
||||||
|
sysadmins => $sysadmins,
|
||||||
|
}
|
||||||
|
|
||||||
|
include jeepyb
|
||||||
|
include pip
|
||||||
|
|
||||||
|
class { '::cgit':
|
||||||
|
vhost_name => $vhost_name,
|
||||||
|
ssl_cert_file => '/etc/pki/tls/certs/git.openstack.org.pem',
|
||||||
|
ssl_key_file => '/etc/pki/tls/private/git.openstack.org.key',
|
||||||
|
ssl_chain_file => '/etc/pki/tls/certs/intermediate.pem',
|
||||||
|
ssl_cert_file_contents => $ssl_cert_file_contents,
|
||||||
|
ssl_key_file_contents => $ssl_key_file_contents,
|
||||||
|
ssl_chain_file_contents => $ssl_chain_file_contents,
|
||||||
|
behind_proxy => $behind_proxy,
|
||||||
|
}
|
||||||
|
|
||||||
|
# We don't actually use these, but jeepyb requires them.
|
||||||
|
$local_git_dir = '/var/lib/git'
|
||||||
|
$ssh_project_key = ''
|
||||||
|
|
||||||
|
file { '/etc/cgitrc':
|
||||||
|
ensure => present,
|
||||||
|
owner => 'root',
|
||||||
|
group => 'root',
|
||||||
|
mode => '0644',
|
||||||
|
source => 'puppet:///modules/openstack_project/git/cgitrc'
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/home/cgit/.ssh/':
|
||||||
|
ensure => directory,
|
||||||
|
owner => 'cgit',
|
||||||
|
group => 'cgit',
|
||||||
|
mode => '0700',
|
||||||
|
require => User['cgit'],
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/home/cgit/.ssh/authorized_keys':
|
||||||
|
owner => 'cgit',
|
||||||
|
group => 'cgit',
|
||||||
|
mode => '0600',
|
||||||
|
content => $git_gerrit_ssh_key,
|
||||||
|
replace => true,
|
||||||
|
require => File['/home/cgit/.ssh/']
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/home/cgit/projects.yaml':
|
||||||
|
ensure => present,
|
||||||
|
owner => 'cgit',
|
||||||
|
group => 'cgit',
|
||||||
|
mode => '0444',
|
||||||
|
content => template('openstack_project/review.projects.yaml.erb'),
|
||||||
|
replace => true,
|
||||||
|
}
|
||||||
|
|
||||||
|
exec { 'create_cgitrepos':
|
||||||
|
command => 'create-cgitrepos',
|
||||||
|
path => '/bin:/usr/bin:/usr/local/bin',
|
||||||
|
require => File['/home/cgit/projects.yaml'],
|
||||||
|
subscribe => File['/home/cgit/projects.yaml'],
|
||||||
|
refreshonly => true,
|
||||||
|
}
|
||||||
|
|
||||||
|
class { 'selinux':
|
||||||
|
mode => 'enforcing'
|
||||||
|
}
|
||||||
|
|
||||||
|
cron { 'mirror_repack':
|
||||||
|
user => 'cgit',
|
||||||
|
weekday => '0',
|
||||||
|
hour => '4',
|
||||||
|
minute => '7',
|
||||||
|
command => 'find /var/lib/git/ -type d -name "*.git" -print -exec git --git-dir="{}" repack -afd \; -exec git --git-dir="{}" pack-refs --all \;',
|
||||||
|
environment => 'PATH=/usr/bin:/bin:/usr/sbin:/sbin',
|
||||||
|
require => User['cgit'],
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/var/www/cgit/static/openstack.png':
|
||||||
|
ensure => present,
|
||||||
|
source => 'puppet:///modules/openstack_project/openstack.png',
|
||||||
|
require => File['/var/www/cgit/static'],
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/var/www/cgit/static/favicon.ico':
|
||||||
|
ensure => present,
|
||||||
|
source => 'puppet:///modules/openstack_project/status/favicon.ico',
|
||||||
|
require => File['/var/www/cgit/static'],
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/var/www/cgit/static/openstack-page-bkg.jpg':
|
||||||
|
ensure => present,
|
||||||
|
source => 'puppet:///modules/openstack_project/openstack-page-bkg.jpg',
|
||||||
|
require => File['/var/www/cgit/static'],
|
||||||
|
}
|
||||||
|
|
||||||
|
file { '/var/www/cgit/static/openstack.css':
|
||||||
|
ensure => present,
|
||||||
|
source => 'puppet:///modules/openstack_project/git/openstack.css',
|
||||||
|
require => File['/var/www/cgit/static'],
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@ -119,13 +119,6 @@ class openstack_project::review (
|
|||||||
threads => '4',
|
threads => '4',
|
||||||
mirror => true,
|
mirror => true,
|
||||||
},
|
},
|
||||||
{
|
|
||||||
name => 'cgit',
|
|
||||||
url => 'cgit@git.openstack.org:/var/lib/git/',
|
|
||||||
replicationDelay => '0',
|
|
||||||
threads => '4',
|
|
||||||
mirror => true,
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
name => 'git01',
|
name => 'git01',
|
||||||
url => 'cgit@git01.openstack.org:/var/lib/git/',
|
url => 'cgit@git01.openstack.org:/var/lib/git/',
|
||||||
|
Loading…
x
Reference in New Issue
Block a user