Note
This walkthrough assumes basic knowledge of Salt. To get up to speed, check out the Salt Walkthrough.
The gitfs backend allows Salt to serve files from git repositories. It can be
enabled by adding git
to the fileserver_backend
list, and
configuring one or more repositories in gitfs_remotes
.
Branches and tags become Salt fileserver environments.
Beginning with version 2014.7.0, both pygit2 and Dulwich are supported as
alternatives to GitPython. The desired provider can be configured using the
gitfs_provider
parameter in the master config file.
If gitfs_provider
is not configured, then Salt will prefer
pygit2 if a suitable version is available, followed by GitPython and
Dulwich.
Note
It is recommended to always run the most recent version of any the below dependencies. Certain features of gitfs may not be available without the most recent version of the chosen library.
The minimum supported version of pygit2 is 0.20.3. Availability for this version of pygit2 is still limited, though the SaltStack team is working to get compatible versions available for as many platforms as possible.
For the Fedora/EPEL versions which have a new enough version packaged, the following command would be used to install pygit2:
# yum install python-pygit2
Provided a valid version is packaged for Debian/Ubuntu (which is not currently the case), the package name would be the same, and the following command would be used to install it:
# apt-get install python-pygit2
If pygit2 is not packaged for the platform on which the Master is running, the pygit2 website has installation instructions here. Keep in mind however that following these instructions will install libgit2 and pygit2 without system packages. Additionally, keep in mind that SSH authentication in pygit2 requires libssh2 (not libssh) development libraries to be present before libgit2 is built.
GitPython 0.3.0 or newer is required to use GitPython for gitfs. For RHEL-based Linux distros, a compatible version is available in EPEL, and can be easily installed on the master using yum:
# yum install GitPython
Ubuntu 14.04 LTS and Debian Wheezy (7.x) also have a compatible version packaged:
# apt-get install python-git
If your master is running an older version (such as Ubuntu 12.04 LTS or Debian
Squeeze), then you will need to install GitPython using either pip or
easy_install (it is recommended to use pip). Version 0.3.2.RC1 is now marked as
the stable release in PyPI, so it should be a simple matter of running pip
install GitPython
(or easy_install GitPython
) as root.
Warning
Keep in mind that if GitPython has been previously installed on the master
using pip (even if it was subsequently uninstalled), then it may still
exist in the build cache (typically /tmp/pip-build-root/GitPython
) if
the cache is not cleared after installation. The package in the build cache
will override any requirement specifiers, so if you try upgrading to
version 0.3.2.RC1 by running pip install 'GitPython==0.3.2.RC1'
then it
will ignore this and simply install the version from the cache directory.
Therefore, it may be necessary to delete the GitPython directory from the
build cache in order to ensure that the specified version is installed.
Dulwich 0.9.4 or newer is required to use Dulwich as backend for gitfs.
Dulwich is available in EPEL, and can be easily installed on the master using yum:
# yum install python-dulwich
For APT-based distros such as Ubuntu and Debian:
# apt-get install python-dulwich
Important
If switching to Dulwich from GitPython/pygit2, or switching from
GitPython/pygit2 to Dulwich, it is necessary to clear the gitfs cache to
avoid unpredictable behavior. This is probably a good idea whenever
switching to a new gitfs_provider
, but it is less important
when switching between GitPython and pygit2.
Beginning in version 2015.5.0, the gitfs cache can be easily cleared using
the fileserver.clear_cache
runner.
salt-run fileserver.clear_cache backend=git
If the Master is running an earlier version, then the cache can be cleared
by removing the gitfs
and file_lists/gitfs
directories (both paths
relative to the master cache directory, usually
/var/cache/salt/master
).
rm -rf /var/cache/salt/master{,/file_lists}/gitfs
To use the gitfs backend, only two configuration changes are required on the master:
Include git
in the fileserver_backend
list in the master
config file:
fileserver_backend:
- git
Specify one or more git://
, https://
, file://
, or ssh://
URLs in gitfs_remotes
to configure which repositories to
cache and search for requested files:
gitfs_remotes:
- https://github.com/saltstack-formulas/salt-formula.git
SSH remotes can also be configured using scp-like syntax:
gitfs_remotes:
- [email protected]:user/repo.git
- ssh://[email protected]/path/to/repo.git
Information on how to authenticate to SSH remotes can be found here.
Note
Dulwich does not recognize ssh://
URLs, git+ssh://
must be used
instead. Salt version 2015.5.0 and later will automatically add the
git+
to the beginning of these URLs before fetching, but earlier
Salt versions will fail to fetch unless the URL is specified using
git+ssh://
.
Restart the master to load the new configuration.
Note
In a master/minion setup, files from a gitfs remote are cached once by the master, so minions do not need direct access to the git repository.
The gitfs_remotes
option accepts an ordered list of git remotes to
cache and search, in listed order, for requested files.
A simple scenario illustrates this cascading lookup behavior:
If the gitfs_remotes
option specifies three remotes:
gitfs_remotes:
- git://github.com/example/first.git
- https://github.com/example/second.git
- file:///root/third
And each repository contains some files:
first.git:
top.sls
edit/vim.sls
edit/vimrc
nginx/init.sls
second.git:
edit/dev_vimrc
haproxy/init.sls
third:
haproxy/haproxy.conf
edit/dev_vimrc
Salt will attempt to lookup the requested file from each gitfs remote repository in the order in which they are defined in the configuration. The git://github.com/example/first.git remote will be searched first. If the requested file is found, then it is served and no further searching is executed. For example:
Note
This example is purposefully contrived to illustrate the behavior of the gitfs backend. This example should not be read as a recommended way to lay out files and git repos.
The file:// prefix denotes a git repository in a local directory. However, it will still use the given file:// URL as a remote, rather than copying the git repo to the salt cache. This means that any refs you want accessible must exist as local refs in the specified repo.
Warning
Salt versions prior to 2014.1.0 are not tolerant of changing the
order of remotes or modifying the URI of existing remotes. In those
versions, when modifying remotes it is a good idea to remove the gitfs
cache directory (/var/cache/salt/master/gitfs
) before restarting the
salt-master service.
New in version 2014.7.0.
The following master config parameters are global (that is, they apply to all configured gitfs remotes):
gitfs_base
gitfs_root
gitfs_mountpoint
(new in 2014.7.0)gitfs_user
(pygit2 only, new in 2014.7.0)gitfs_password
(pygit2 only, new in 2014.7.0)gitfs_insecure_auth
(pygit2 only, new in 2014.7.0)gitfs_pubkey
(pygit2 only, new in 2014.7.0)gitfs_privkey
(pygit2 only, new in 2014.7.0)gitfs_passphrase
(pygit2 only, new in 2014.7.0)These parameters can now be overridden on a per-remote basis. This allows for a tremendous amount of customization. Here's some example usage:
gitfs_provider: pygit2
gitfs_base: develop
gitfs_remotes:
- https://foo.com/foo.git
- https://foo.com/bar.git:
- root: salt
- mountpoint: salt://foo/bar/baz
- base: salt-base
- http://foo.com/baz.git:
- root: salt/states
- user: joe
- password: mysupersecretpassword
- insecure_auth: True
Important
There are two important distinctions which should be noted for per-remote configuration:
gitfs_
removed from the beginning.In the example configuration above, the following is true:
develop
branch/tag as the
base
environment, while the second one will use the salt-base
branch/tag as the base
environment.salt
directory (and its
subdirectories), while the third remote will only serve files from the
salt/states
directory (and its subdirectories).salt://foo/bar/baz
, while the files from the first and third remotes
will be located under the root of the Salt fileserver namespace
(salt://
).The gitfs_root
parameter allows files to be served from a
subdirectory within the repository. This allows for only part of a repository
to be exposed to the Salt fileserver.
Assume the below layout:
.gitignore
README.txt
foo/
foo/bar/
foo/bar/one.txt
foo/bar/two.txt
foo/bar/three.txt
foo/baz/
foo/baz/top.sls
foo/baz/edit/vim.sls
foo/baz/edit/vimrc
foo/baz/nginx/init.sls
The below configuration would serve only the files under foo/baz
, ignoring
the other files in the repository:
gitfs_remotes:
- git://mydomain.com/stuff.git
gitfs_root: foo/baz
The root can also be configured on a per-remote basis.
New in version 2014.7.0.
The gitfs_mountpoint
parameter will prepend the specified path
to the files served from gitfs. This allows an existing repository to be used,
rather than needing to reorganize a repository or design it around the layout
of the Salt fileserver.
Before the addition of this feature, if a file being served up via gitfs was
deeply nested within the root directory (for example,
salt://webapps/foo/files/foo.conf
, it would be necessary to ensure that the
file was properly located in the remote repository, and that all of the the
parent directories were present (for example, the directories
webapps/foo/files/
would need to exist at the root of the repository).
The below example would allow for a file foo.conf
at the root of the
repository to be served up from the Salt fileserver path
salt://webapps/foo/files/foo.conf
.
gitfs_remotes:
- https://mydomain.com/stuff.git
gitfs_mountpoint: salt://webapps/foo/files
Mountpoints can also be configured on a per-remote basis.
Sometimes it may make sense to use multiple backends; for instance, if sls
files are stored in git but larger files are stored directly on the master.
The cascading lookup logic used for multiple remotes is also used with
multiple backends. If the fileserver_backend
option contains
multiple backends:
fileserver_backend:
- roots
- git
Then the roots
backend (the default backend of files in /srv/salt
) will
be searched first for the requested file; then, if it is not found on the
master, each configured git remote will be searched.
When using the gitfs backend, branches, and tags will be mapped to environments using the branch/tag name as an identifier.
There is one exception to this rule: the master
branch is implicitly mapped
to the base
environment.
So, for a typical base
, qa
, dev
setup, the following branches could
be used:
master
qa
dev
top.sls
files from different branches will be merged into one at runtime.
Since this can lead to overly complex configurations, the recommended setup is
to have the top.sls
file only in the master branch and use
environment-specific branches for state definitions.
To map a branch other than master
as the base
environment, use the
gitfs_base
parameter.
gitfs_base: salt-base
The base can also be configured on a per-remote basis.
New in version 2014.7.0.
The gitfs_env_whitelist
and gitfs_env_blacklist
parameters allow for greater control over which branches/tags are exposed as
fileserver environments. Exact matches, globs, and regular expressions are
supported, and are evaluated in that order. If using a regular expression,
^
and $
must be omitted, and the expression must match the entire
branch/tag.
gitfs_env_whitelist:
- base
- v1.*
- 'mybranch\d+'
Note
v1.*
, in this example, will match as both a glob and a regular
expression (though it will have been matched as a glob, since globs are
evaluated before regular expressions).
The behavior of the blacklist/whitelist will differ depending on which combination of the two options is used:
gitfs_env_whitelist
is used, then only branches/tags
which match the whitelist will be available as environmentsgitfs_env_blacklist
is used, then the branches/tags
which match the blacklist will not be available as environmentsNew in version 2014.7.0.
Both HTTPS and SSH authentication are supported as of version 0.20.3, which is the earliest version of pygit2 supported by Salt for gitfs.
Note
The examples below make use of per-remote configuration parameters, a feature new to Salt 2014.7.0. More information on these can be found here.
For HTTPS repositories which require authentication, the username and password can be provided like so:
gitfs_remotes:
- https://domain.tld/myrepo.git:
- user: git
- password: mypassword
If the repository is served over HTTP instead of HTTPS, then Salt will by
default refuse to authenticate to it. This behavior can be overridden by adding
an insecure_auth
parameter:
gitfs_remotes:
- http://domain.tld/insecure_repo.git:
- user: git
- password: mypassword
- insecure_auth: True
SSH repositories can be configured using the ssh://
protocol designation,
or using scp-like syntax. So, the following two configurations are equivalent:
ssh://git@github.com/user/repo.git
git@github.com:user/repo.git
Both gitfs_pubkey
and gitfs_privkey
(or their
per-remote counterparts) must be configured in
order to authenticate to SSH-based repos. If the private key is protected with
a passphrase, it can be configured using gitfs_passphrase
(or
simply passphrase
if being configured per-remote). For example:
gitfs_remotes:
- [email protected]:user/repo.git:
- pubkey: /root/.ssh/id_rsa.pub
- privkey: /root/.ssh/id_rsa
- passphrase: myawesomepassphrase
Finally, the SSH host key must be added to the known_hosts file.
With GitPython, only passphrase-less SSH public key authentication is supported. The auth parameters (pubkey, privkey, etc.) shown in the pygit2 authentication examples above do not work with GitPython.
gitfs_remotes:
- ssh://[email protected]/example/salt-states.git
Since GitPython wraps the git CLI, the private key must be located in
~/.ssh/id_rsa
for the user under which the Master is running, and should
have permissions of 0600
. Also, in the absence of a user in the repo URL,
GitPython will (just as SSH does) attempt to login as the current user (in
other words, the user under which the Master is running, usually root
).
If a key needs to be used, then ~/.ssh/config
can be configured to use
the desired key. Information on how to do this can be found by viewing the
manpage for ssh_config
. Here's an example entry which can be added to the
~/.ssh/config
to use an alternate key for gitfs:
Host github.com
IdentityFile /root/.ssh/id_rsa_gitfs
The Host
parameter should be a hostname (or hostname glob) that matches the
domain name of the git repository.
It is also necessary to add the SSH host key to the known_hosts file. The exception to this would be if strict host key
checking is disabled, which can be done by adding StrictHostKeyChecking no
to the entry in ~/.ssh/config
Host github.com
IdentityFile /root/.ssh/id_rsa_gitfs
StrictHostKeyChecking no
However, this is generally regarded as insecure, and is not recommended.
To use SSH authentication, it is necessary to have the remote repository's SSH
host key in the ~/.ssh/known_hosts
file. If the master is also a minion,
this can be done using the ssh.set_known_host
function:
# salt mymaster ssh.set_known_host user=root hostname=github.com
mymaster:
----------
new:
----------
enc:
ssh-rsa
fingerprint:
16:27:ac:a5:76:28:2d:36:63:1b:56:4d:eb:df:a6:48
hostname:
|1|OiefWWqOD4kwO3BhoIGa0loR5AA=|BIXVtmcTbPER+68HvXmceodDcfI=
key:
AAAAB3NzaC1yc2EAAAABIwAAAQEAq2A7hRGmdnm9tUDbO9IDSwBK6TbQa+PXYPCPy6rbTrTtw7PHkccKrpp0yVhp5HdEIcKr6pLlVDBfOLX9QUsyCOV0wzfjIJNlGEYsdlLJizHhbn2mUjvSAHQqZETYP81eFzLQNnPHt4EVVUh7VfDESU84KezmD5QlWpXLmvU31/yMf+Se8xhHTvKSCZIFImWwoG6mbUoWf9nzpIoaSjB+weqqUUmpaaasXVal72J+UX2B+2RPW3RcT0eOzQgqlJL3RKrTJvdsjE3JEAvGq3lGHSZXy28G3skua2SmVi/w4yCE6gbODqnTWlg7+wC604ydGXA8VJiS5ap43JXiUFFAaQ==
old:
None
status:
updated
If not, then the easiest way to add the key is to su to the user (usually
root
) under which the salt-master runs and attempt to login to the
server via SSH:
$ su
Password:
# ssh github.com
The authenticity of host 'github.com (192.30.252.128)' can't be established.
RSA key fingerprint is 16:27:ac:a5:76:28:2d:36:63:1b:56:4d:eb:df:a6:48.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added 'github.com,192.30.252.128' (RSA) to the list of known hosts.
Permission denied (publickey).
It doesn't matter if the login was successful, as answering yes
will write
the fingerprint to the known_hosts file.
To verify that the correct fingerprint was added, it is a good idea to look it up. One way to do this is to use nmap:
$ nmap github.com --script ssh-hostkey
Starting Nmap 5.51 ( http://nmap.org ) at 2014-08-18 17:47 CDT
Nmap scan report for github.com (192.30.252.129)
Host is up (0.17s latency).
Not shown: 996 filtered ports
PORT STATE SERVICE
22/tcp open ssh
| ssh-hostkey: 1024 ad:1c:08:a4:40:e3:6f:9c:f5:66:26:5d:4b:33:5d:8c (DSA)
|_2048 16:27:ac:a5:76:28:2d:36:63:1b:56:4d:eb:df:a6:48 (RSA)
80/tcp open http
443/tcp open https
9418/tcp open git
Nmap done: 1 IP address (1 host up) scanned in 28.78 seconds
Another way is to check one's own known_hosts file, using this one-liner:
$ ssh-keygen -l -f /dev/stdin <<<`ssh-keyscan -t rsa github.com 2>/dev/null` | awk '{print $2}'
16:27:ac:a5:76:28:2d:36:63:1b:56:4d:eb:df:a6:48
By default, Salt updates the remote fileserver backends every 60 seconds. However, if it is desirable to refresh quicker than that, the Reactor System can be used to signal the master to update the fileserver on each push, provided that the git server is also a Salt minion. There are three steps to this process:
On the master, create a file /srv/reactor/update_fileserver.sls, with the following contents:
update_fileserver:
runner.fileserver.update
Add the following reactor configuration to the master config file:
reactor:
- 'salt/fileserver/gitfs/update':
- /srv/reactor/update_fileserver.sls
On the git server, add a post-receive hook with the following contents:
#!/usr/bin/env sh
salt-call event.fire_master update salt/fileserver/gitfs/update
The update
argument right after event.fire_master
in this example can really be anything, as it
represents the data being passed in the event, and the passed data is ignored
by this reactor.
Similarly, the tag name salt/fileserver/gitfs/update
can be replaced by
anything, so long as the usage is consistent.
Git repositories can also be used to provide Pillar data, using the External Pillar system. Note that this is different from gitfs, and is not yet at feature parity with it.
To define a git external pillar, add a section like the following to the salt master config file:
ext_pillar:
- git: <branch> <repo> [root=<gitroot>]
Changed in version 2014.7.0: The optional root
parameter was added
The <branch>
param is the branch containing the pillar SLS tree. The
<repo>
param is the URI for the repository. To add the
master
branch of the specified repo as an external pillar source:
ext_pillar:
- git: master https://domain.com/pillar.git
Use the root
parameter to use pillars from a subdirectory of a git
repository:
ext_pillar:
- git: master https://domain.com/pillar.git root=subdirectory
More information on the git external pillar can be found in the
salt.pillar.git_pillar docs
.
In versions 0.16.3 and older, when using the git fileserver backend, certain versions of GitPython may generate errors when fetching, which Salt fails to catch. While not fatal to the fetch process, these interrupt the fileserver update that takes place before custom types are synced, and thus interrupt the sync itself. Try disabling the git fileserver backend in the master config, restarting the master, and attempting the sync again.
This issue is worked around in Salt 0.16.4 and newer.