entrypoint-provider 2.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273
  1. #!/bin/bash
  2. #
  3. # This file sets up the user to run in a cloud environment.
  4. # It provides dynamic inventory that works well when run in
  5. # a container environment by setting up a default inventory.
  6. # It assumes the user has provided a service account token
  7. # and ssh-privatekey file at "$(pwd)/inventory/dynamic/injected"
  8. # and automatically links any YAML files found into the group
  9. # vars directory, which allows the playbook to more easily be
  10. # run in containerized contexts.
  11. #
  12. # Currently GCP and Azure are supported.
  13. set -euo pipefail
  14. WORK=$(pwd)
  15. FILES="${WORK}/inventory/dynamic/injected"
  16. # Patch /etc/passwd file with the current user info.
  17. # The current user's entry must be correctly defined in this file in order for
  18. # the `ssh` command to work within the created container.
  19. if ! whoami &>/dev/null; then
  20. echo "${USER:-default}:x:$(id -u):$(id -g):Default User:$HOME:/sbin/nologin" >> /etc/passwd
  21. fi
  22. # Add any injected variable files into the group vars directory
  23. find "${FILES}" \( -name '*.yml' -or -name '*.yaml' -or -name vars \) -print0 | xargs -0 -L1 -I {} ln -fs {} "${WORK}/inventory/dynamic/${TYPE}/group_vars/all"
  24. # Avoid sudo when running locally - nothing in the image requires it.
  25. mkdir -p "${WORK}/inventory/dynamic/${TYPE}/host_vars/localhost"
  26. echo "ansible_become: no" > "${WORK}/inventory/dynamic/${TYPE}/host_vars/localhost/00_skip_root.yaml"
  27. if [[ -z "${ANSIBLE_CONFIG-}" ]]; then
  28. export ANSIBLE_CONFIG="${WORK}/inventory/dynamic/${TYPE}/ansible.cfg"
  29. fi
  30. # SSH requires the file to be owned by the current user, but Docker copies
  31. # files in as root. Put the file into the ssh dir with the right permissions
  32. if [[ -f "${FILES}/ssh-privatekey" ]]; then
  33. if [[ "$TYPE" == 'gcp' ]]; then
  34. keyfile="${HOME}/.ssh/google_compute_engine"
  35. else
  36. keyfile="${HOME}/.ssh/id_rsa"
  37. fi
  38. mkdir "${HOME}/.ssh"
  39. rm -f "${keyfile}"
  40. cat "${FILES}/ssh-privatekey" > "${keyfile}"
  41. chmod 0600 "${keyfile}"
  42. ssh-keygen -y -f "${keyfile}" > "${keyfile}.pub"
  43. fi
  44. if [[ "$TYPE" == 'gcp' ]]; then
  45. if [[ -f "${FILES}/gce.json" ]]; then
  46. gcloud auth activate-service-account --quiet --key-file="${FILES}/gce.json"
  47. else
  48. echo "No service account file found at ${FILES}/gce.json, bypassing login"
  49. fi
  50. fi
  51. if [[ "$TYPE" == 'azure' ]]; then
  52. if [[ -f "${FILES}/credentials" ]]; then
  53. set -a
  54. . "${FILES}/credentials"
  55. set +a
  56. az login --service-principal --username "$AZURE_CLIENT_ID" --password "$AZURE_SECRET" --tenant "$AZURE_TENANT" >/dev/null
  57. else
  58. echo "No service account file found at ${FILES}/credentials, bypassing login"
  59. fi
  60. fi
  61. exec "$@"