1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
|
class role::cryptoportfolio::front inherits role::cryptoportfolio {
ensure_resource('exec', 'systemctl daemon-reload', {
command => '/usr/bin/systemctl daemon-reload',
refreshonly => true
})
$password_seed = lookup("base_installation::puppet_pass_seed")
$cf_front_app = "${home}/go/src/git.immae.eu/Cryptoportfolio/Front"
$cf_front_app_api_workdir = "${cf_front_app}/cmd/app"
$cf_front_app_api_bin = "${cf_front_app_api_workdir}/cryptoportfolio-app"
$cf_front_app_api_conf = "${home}/conf.toml"
$cf_front_app_api_secret = generate_password(24, $password_seed, "cryptoportfolio_api_secret")
$cf_front_app_password_reset_secret = generate_password(24, $password_seed, "cryptoportfolio_api_password_reset_secret")
$cf_front_app_free_sms_user = lookup("role::cryptoportfolio::front::free_sms_user")
$cf_front_app_free_sms_pass = lookup("role::cryptoportfolio::front::free_sms_pass")
$cf_front_app_static_conf = "${cf_front_app}/cmd/web/env/prod.env"
ensure_packages(["go", "npm", "nodejs", "yarn"])
file { [
"${home}/go/",
"${home}/go/src",
"${home}/go/src/git.immae.eu",
"${home}/go/src/git.immae.eu/Cryptoportfolio",
$cf_front_app]:
ensure => "directory",
mode => "0700",
owner => $user,
group => $group,
require => User["$user:"],
}
file { "${home}/front":
ensure => "link",
target => $cf_front_app,
before => File[$cf_front_app],
}
file { "/etc/systemd/system/cryptoportfolio-app.service":
mode => "0644",
owner => "root",
group => "root",
content => template("role/cryptoportfolio/cryptoportfolio-app.service.erb"),
notify => Exec["systemctl daemon-reload"],
}
service { 'cryptoportfolio-app':
enable => true,
ensure => "running",
subscribe => [File[$cf_front_app_api_conf], Exec["go-cryptoportfolio-app"], Exec["web-cryptoportfolio-build"]],
require => [
File["/etc/systemd/system/cryptoportfolio-app.service"],
Postgresql::Server::Db[$pg_db]
],
} ~>
exec { "dump $pg_db structure":
refreshonly => true,
user => $::profile::postgresql::pg_user,
group => $::profile::postgresql::pg_user,
command => "/usr/bin/pg_dump --schema-only --clean --no-publications $pg_db > /var/lib/postgres/${pg_db}.schema",
}
archive { "${home}/front_${front_version}.tar.gz":
path => "${home}/front_${front_version}.tar.gz",
source => "https://git.immae.eu/releases/cryptoportfolio/front/front_${front_version}.tar.gz",
checksum_type => "sha256",
checksum => $front_sha256,
cleanup => false,
extract => true,
user => $user,
username => lookup("base_installation::ldap_cn"),
password => generate_password(24, $password_seed, "ldap"),
extract_path => $cf_front_app,
require => [User["$user:"], File[$cf_front_app]],
notify => [
Exec["web-cryptoportfolio-dependencies"],
Exec["go-get-dep"],
]
}
# Api
$pg_password = generate_password(24, $password_seed, "postgres_cryptoportfolio")
$pg_host = "${pg_hostname}:${pg_port}"
file { $cf_front_app_api_conf:
owner => $user,
group => $group,
mode => "0600",
content => template("role/cryptoportfolio/api_conf.toml.erb"),
before => Exec["go-cryptoportfolio-app"],
}
exec { "go-get-dep":
user => $user,
environment => ["HOME=${home}"],
creates => "${home}/go/bin/dep",
command => "/usr/bin/go get -u github.com/golang/dep/cmd/dep",
refreshonly => true,
} ~>
exec { "go-cryptoportfolio-dependencies":
cwd => $cf_front_app,
user => $user,
environment => ["HOME=${home}"],
command => "${home}/go/bin/dep ensure",
refreshonly => true,
} ~>
exec { "go-cryptoportfolio-app":
cwd => $cf_front_app_api_workdir,
user => $user,
environment => ["HOME=${home}"],
command => "/usr/bin/make build",
refreshonly => true,
}
# Static pages
file { $cf_front_app_static_conf:
owner => $user,
group => $group,
mode => "0600",
content => template("role/cryptoportfolio/static_conf.env.erb"),
before => Exec["web-cryptoportfolio-build"],
}
exec { "web-cryptoportfolio-dependencies":
cwd => "${cf_front_app}/cmd/web",
user => $user,
environment => ["HOME=${home}"],
command => "/usr/bin/make install",
refreshonly => true,
require => [Package["npm"], Package["nodejs"], Package["yarn"]]
} ~>
exec { "web-cryptoportfolio-build":
cwd => "${cf_front_app}/cmd/web",
user => $user,
environment => ["HOME=${home}"],
path => ["${cf_front_app}/cmd/web/node_modules/.bin/", "/usr/bin"],
command => "/usr/bin/make static ENV=${env}",
refreshonly => true,
}
# Slack logger
$slack_logger = lookup("role::cryptoportfolio::front::slack_logger")
$slack_logger_username = lookup("role::cryptoportfolio::front::slack_logger_username", { "default_value" => "Logger" })
unless empty($slack_logger) {
file { "/usr/local/bin/api_logger":
mode => "0755",
content => template("role/cryptoportfolio/api_logger.py.erb"),
notify => Service["cryptoportfolio-log"],
}
->
file { "/etc/systemd/system/cryptoportfolio-log.service":
mode => "0644",
owner => "root",
group => "root",
content => template("role/cryptoportfolio/cryptoportfolio-log.service.erb"),
notify => [
Exec["systemctl daemon-reload"],
Service["cryptoportfolio-log"]
]
}
->
service { 'cryptoportfolio-log':
enable => true,
ensure => "running",
require => [
Service["cryptoportfolio-app"],
],
}
}
unless empty($webhook_url) {
exec { "front-slack-notify":
refreshonly => true,
environment => [
"P_PROJECT=Front",
"P_WEBHOOK=${webhook_url}",
"P_VERSION=${front_version}",
"P_HOST=${web_host}",
"P_HTTPS=${web_ssl}",
],
command => "/usr/local/bin/slack-notify",
require => File["/usr/local/bin/slack-notify"],
subscribe => [Exec["go-cryptoportfolio-app"], Exec["web-cryptoportfolio-build"]],
}
}
}
|