Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Discussion on adding custom resources types to manage tokens, users, groups, projects #395

Open
tuxmea opened this issue Nov 7, 2021 · 11 comments
Assignees
Labels
enhancement New feature or request needs-feedback Further information is requested

Comments

@tuxmea
Copy link
Member

tuxmea commented Nov 7, 2021

I am considering adding custom types and providers to manage gitlab internal configs.

What is the best way to interact from a custom type/provider with gitlab?

At the moment I see two ways:

  1. executing gitlab-rails runner
  2. communicate with api

gitlab-rails command

The gitlab-rails command can be run as root user. No further authentication required.
This allows to check existing and add new tokens, users, groups, projects.

But: the command is very slow.

api

Communication with api needs a token.
root token can be managed using gitlab-rails only.
other user tokens can be managed using the root token.

all other resource types will need an autorequire on the gitlab_token type.

But: where to store the root api token itself so it can be used by all other resource types?
In puppet cache dir?
or is it possible to pass a variable from one provider to another one without again running the gitlab-rails command?

@tuxmea tuxmea added enhancement New feature or request needs-feedback Further information is requested labels Nov 7, 2021
@bastelfreak
Copy link
Member

@baurmatt can you take a look at well? Do you have any opinions on that topic?

@baurmatt
Copy link
Contributor

baurmatt commented Nov 9, 2021

I've never really used the gitlab-rails runner command so I had to check it out on our system:

$ time gitlab-rails runner 'puts Rails.env'
production

real	0m44.396s
user	0m36.290s
sys	0m5.594s

This is our production Gitlab (8 CPU/32GB RAM). To be honest, I don't see how this can be successfully integrated. Even if all resource creation requests would share one gitlab-rails runner session this would be to long IMHO.

So from my point of view the only option is the API - even thought that the API token handling might be a manual step.

Regarding the storage location of the token: I don't like to put relevant things in the cache dir. I would prefer to just store it in /etc/gitlab with the restrictive permissions. This might be "ok" because an attacker who can access this file will also be able to just use gitlab-rails runner/console. From a design perspective it would be also nice to store the token in the PuppetDB because in a "classic" web setup this would be the place where state is persistent. Though I don't know how to implement this.

@tuxmea
Copy link
Member Author

tuxmea commented Nov 9, 2021

@baurmatt many thanks for your feedback.

How about the following idea:
gitlab_token type/provider check if the token file exists in /etc/gitlab/.
If the file exists it does not do anything.
If the file is missing, the token will be created using gitlab-rails runner command and written to the file.

This will allow us to do a complete automated setup.

Usage of the gitlab_token type will be optional.
All other types/providers use the token file and API calls.

@baurmatt
Copy link
Contributor

baurmatt commented Nov 9, 2021

Sounds good! Looking forward to the implementation! :)

@tuxmea
Copy link
Member Author

tuxmea commented Nov 9, 2021

@baurmatt
List of types and properties:

  1. gitlab_token:
  • newproperty: user - String
  • newproperty: key - String
  • newproperty: scope - Array[String]
  1. gitlab_user
  • newproperty: username - String
  • newproperty: realname - String
  • newproperty: password (optional) - String
  • newproperty: confirmed - Boolean
  • newproperty email - String
  1. gitlab_group
  • newproperty: name - Strig
  • newproperty: member_role - Hash (user: role mapping)
  1. gitlab_project
  • newproperty: name - String
  • newproperty: group - String
  • newproperty: origin_url - Optional[String]

@baurmatt
Copy link
Contributor

baurmatt commented Nov 9, 2021

@tuxmea You probably want email - String for gitlab_user as well.

Beside this it looks like a good start! 👍

@alexjfisher
Copy link
Member

If using the API, could these types be used to manage projects/groups etc. on gitlab.com ? That might be useful to some people? (In which case you probably don't want to implement instances?? and you shouldn't expect gitlab-rails command to be available?)

For the api settings file, (assuming you don't want to make the credentials parameters of each of the individual resources), you can do confine :exists => '/path/to/api_settings.yaml' in the providers and all types can also have

autorequire(:file) do
 '/path/to/api_settings.yaml'
end

I'd then probably provide a class that users can use to create this file. eg. the user would do something like...

class { 'gitlab::api_settings':
  server => 'https://gitlab.com',
  token => Sensitive($my_api_token),
}

gitlab_project { 'my_project':
  group => 'some/group',
}

# etc.

(With the gitlab_group type, dunno if groups need to know about their parent groups - perhaps so they can autorequire them?)

Finally, I've used the gitlab gem before with good results. Maybe the provider should make use of this? (The module could offer to install it and the providers can confine themselves based on whether it's installed yet)

@tuxmea
Copy link
Member Author

tuxmea commented Mar 1, 2022

@alexjfisher sounds like a good idea. But: where can we receive the API token from? Or how to set the token explicitly?
Using gitlab gem also came into my mind. But the same question: how to set or generate the API token?

@baurmatt
Copy link
Contributor

baurmatt commented Mar 1, 2022

The token needs to be provided manually. If you don't want this, you could automate it with a local command as described here. This token would than be saved to e.g. /etc/gitlab/$user-token and loaded by the provider.

@alexjfisher
Copy link
Member

I guess for use with gitlab.com it would have to be manually provided, but if using the module to deploy your own gitlab installation, then being able to automatically generate it would be better.

@baurmatt
Copy link
Contributor

baurmatt commented Mar 1, 2022

Is there an advantage to using these types/providers instead of the official Gitlab Terraform Provider on gitlab.com? While thinking about it... Is it worth developing custom types/provider at all? What would be the benefit?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request needs-feedback Further information is requested
Projects
None yet
Development

No branches or pull requests

4 participants