CloudBees CI Configuration Bundle Composition

The YAML based configuration of a controller is described in a collection of files referred to as a Configuration as Code (CasC) for Controllers bundle that we will refer to as just configuration bundle for most of this workshop. The CloudBees CI Operations Center can store as many different configuration bundles as needed to represent any unique requirements between different controllers.

This lab will explore the composition of a CloudBees CI configuration bundle, to include the manual updating of a configuration bundle contents and updating a configuration bundle from the bundle export of an existing controller.

Configuration Bundle Composition Overview

A configuration bundle may consist of the following YAML file types:

  • bundle (required) - This file is an index file that describes the bundle, references the other files in the bundle and must be named bundle.yaml. Any files not listed in this file will not be included in the controller bundle (even if it is in the bundle’s directory). It also (optionally) allows you to specify an availabilityPattern which is a regular expression that controls what controllers can use the bundle based on their location on Operations Center and the jcascMergeStrategy property, which we will explore in the Bundle Inheritance lab.
  • jcasc (optional) - These files contain the Jenkins configuration (global configuration, credentials, plugin configuration, etc), as defined by the Jenkins Configuration as Code plugin.
  • plugins (optional) - This file contains a list of all the plugins to be installed on the controller. Plugins that are not in the CloudBees Assurance Program (CAP) have to be added with a Plugin Catalog and to this file.
  • catalog (optional) - This file defines the catalog of versioned plugins outside of the CloudBees Assurance Program (CAP) that are available for installation on the controller. An optional location can also be specified for plugins that are not available in the standard update centers. Adding plugins to a catalog only makes them available to install and they still must be added to the plugins file above.
  • rbac (optional) - This file defines the RBAC groups and roles at the root level of a controller.
  • items (optional) - These files define items (folders, jobs, etc), and, optionally, RBAC for folders to be created on the controller.
  • variables: (Optional) This file defines variables that can be used in the jcasc, items, and rbac yaml files. You may also use variables defined as JCasC secrets or regular environment properties defined on the controller.

You may have noticed that all the file types except for the bundle file are optional and wonder if it would make sense to have a configuration bundle that only had a bundle file. We will see in a later lab that it can be useful with bundle inheritance.

In this lab we will explore the configuration bundle assigned to your Ops controller when it was dynamically provisioned.

  1. Navigate to your ops-controller repository in your workshop GitHub Organization. ops-controller repository
  2. Open the bundle folder and then click on the bundle.yaml file. Its contents will mostly match the following (the id, description and availabilityPattern will be unique to each attendee):
apiVersion: "1"
version: "1"
id: "cbci-casc-workshop-ops-controller"
description: "CloudBees CI configuration bundle for the cbci-casc-workshop ops-controller Controller"
availabilityPattern: "cloudbees-ci-casc-workshop/cbci-casc-workshop/ops-controller"
jcasc:
  - "jenkins.yaml"
plugins:
  - "plugins.yaml"
items:
  - "items.yaml"

It is important that the bundle file is named exactly bundle.yaml otherwise the bundle will not be useable.

  1. Return to the bundle folder of your ops-controller repository and click on the jenkins.yaml file. The name of this file must match the file name listed under jcasc in the bundle.yaml file. Its contents will match the following:
jenkins:
  globalNodeProperties:
  - envVars:
      env:
      - key: "GITHUB_ORGANIZATION"
        value: "${GITHUB_ORGANIZATION}"
      - key: "GITHUB_REPOSITORY"
        value: "ops-controller"
      - key: "GITHUB_USER"
        value: "${GITHUB_USER}"
      - key: "BUNDLE_ID"
        value: "${CASC_BUNDLE_ID}"
  quietPeriod: 0
  systemMessage: 'Jenkins configured using CloudBees CI CasC v1'
notificationConfiguration:
  enabled: true
  router: "operationsCenter"
unclassified:
  hibernationConfiguration:
    activities:
    - "build"
    - "web"
    enabled: true
    gracePeriod: 1500
  gitHubConfiguration:
    apiRateLimitChecker: ThrottleForNormalize
  gitHubPluginConfig:
    hookSecretConfigs:
    - credentialsId: "cloudbees-ci-workshop-github-webhook-secret"
  globalDefaultFlowDurabilityLevel:
    durabilityHint: PERFORMANCE_OPTIMIZED
  globallibraries:
    libraries:
    - defaultVersion: "main"
      name: "pipeline-library"
      retriever:
        modernSCM:
          scm:
            github:
              credentialsId: "cloudbees-ci-casc-workshop-github-app"
              repoOwner: "${GITHUB_ORGANIZATION}"
              repository: "pipeline-library"
  headerLabel:
    text: "${GITHUB_APP}-bundle-v1"
credentials:
  system:
    domainCredentials:
    - credentials:
      - string:
          description: "CasC Update Secret"
          id: "casc-update-secret"
          scope: GLOBAL
          secret: "${cbciCascWorkshopControllerProvisionSecret}"
      - string:
          description: "Webhook secret for CloudBees CI Workshop GitHub App"
          id: "cloudbees-ci-workshop-github-webhook-secret"
          scope: SYSTEM
          secret: "${gitHubWebhookSecret}"
      - gitHubApp:
          apiUri: "https://api.github.com"
          appID: "${cbciCascWorkshopGitHubAppId}"
          description: "CloudBees CI CasC Workshop GitHub App credential"
          id: "cloudbees-ci-casc-workshop-github-app"
          owner: "${GITHUB_ORGANIZATION}"
          privateKey: "${cbciCascWorkshopGitHubAppPrivateKey}"
  1. The gitHubApp credential is unique to your workshop GitHub Organization. But also notice the variable substitution for the privateKey field of that credential - the value in the jenkins.yaml file is the ${gitHubAppPrivateKey} variable. Of course you wouldn’t want to store a secure secret directly in a JCasC yaml file, especially if it is to be stored in source control. However, JCasC supports several ways to pass secrets more securely. For this workshop we are passing secrets by mounting secret volumes using the Kubernetes Secrets Store CSI driver with the Google Secret Manager provider. This allows us to manage secrets with the Google Secret Manager in GCP and to mount those secrets as files in the directory on your controller configured for JCasC to read secret variables, with the file name being the variable name and the file contents being the secret value. Other, less sensitive, variables may be configured as controller environment properties such as the ${GITHUB_ORGANIZATION} placeholder above.

There are also Kubernetes Secrets Store CSI providers for AWS Secrets Manager, Azure Key Vault and HashiCorp Vault.

  1. Return to the bundle folder of your ops-controller repository and click on the plugins.yaml file. The name of this file must match the file name listed under plugins in the bundle.yaml file. Its contents will match the following:
plugins:
- id: antisamy-markup-formatter
- id: cloudbees-casc-client
- id: cloudbees-casc-items-api
- id: cloudbees-casc-items-commons
- id: cloudbees-casc-items-controller
- id: cloudbees-github-reporting
- id: cloudbees-groovy-view
- id: cloudbees-monitoring
- id: cloudbees-pipeline-policies
- id: cloudbees-restricted-credentials
- id: cloudbees-slack
- id: cloudbees-template
- id: cloudbees-view-creation-filter
- id: cloudbees-workflow-template
- id: cloudbees-workflow-ui
- id: configuration-as-code
- id: git
- id: github-branch-source
- id: managed-master-hibernation
- id: notification-api
- id: operations-center-cloud
- id: operations-center-notification
- id: pipeline-event-step
- id: pipeline-model-extensions
- id: pipeline-stage-view
- id: warnings-ng
- id: workflow-aggregator
- id: workflow-cps-checkpoint
# non-cap plugins
  1. Return to the bundle folder of your ops-controller repository and click on the items.yaml file. The name of this file must match the file name listed under items in the bundle.yaml file. Its contents will match the following. Also note the removeStrategy configuration at the top, this specifies the strategy to handle existing configuration when a new configuration is applied, and is required for all items files (NONE is currently the only strategy available for items, while sync and update are the two removeStrategy values available for rbac):
removeStrategy:
  rbac: SYNC
  items: NONE
items:
- kind: folder
  name: controller-jobs
  items:
  - kind: organizationFolder
    name: controller-casc-update
    disabled: false
    navigators:
    - github:
        apiUri: https://api.github.com
        traits:
        - gitHubBranchDiscovery:
            strategyId: 1
        - headWildcardFilter:
            excludes: ''
            includes: main
        repoOwner: ${GITHUB_ORGANIZATION}
        credentialsId: cloudbees-ci-casc-workshop-github-app
    projectFactories:
    - customMultiBranchProjectFactory:
        factory:
          customBranchProjectFactory:
            marker: Jenkinsfile
            definition:
              cpsScmFlowDefinition:
                scriptPath: controller-casc-update
                scm:
                  gitSCM:
                    userRemoteConfigs:
                    - userRemoteConfig:
                        credentialsId: cloudbees-ci-casc-workshop-github-app
                        url: https://github.com/${GITHUB_ORGANIZATION}/ops-controller.git
                    branches:
                    - branchSpec:
                        name: '*/main'
                lightweight: true
    properties:
    - suppressFolderAutomaticTriggering:
        strategy: INDEXING
        branches: .*

Note the ${GITHUB_ORGANIZATION} variable.

  1. There is one more configuration file at the top level of your ops-controller repository. The controller.yaml file represents the CloudBees CI managed controller that was provisioned for you as part of the workshop setup. It has the same format as the items.yaml we reviewed above. However, it is applied to Operations Center with the CloudBees CI CasC HTTP API instead of being applied to your managed controller. Its contents will match the following (except for the REPLACE_... placeholders):
removeStrategy:
  rbac: SYNC
  items: NONE
items:
- kind: folder
  name: REPLACE_FOLDER_NAME
  groups:
  - members:
      users:
      - REPLACE_GITHUB_USERNAME
      - REPLACE_GITHUB_USERNAME-admin
    roles:
    - name: browse
      grantedAt: current
    - name: workshop-admin
      grantedAt: child
    name: Team Administrators
  filteredRoles:
  - workshop-admin
  - browse
  items:
  - kind: managedController
    name: REPLACE_CONTROLLER_NAME
    properties:
    - healthReporting:
        enabled: true
    - configurationAsCode:
        bundle: REPLACE_GITHUB_ORG-REPLACE_CONTROLLER_NAME
    configuration:
      kubernetes:
        memory: 4000
        cpus: 1.0
        clusterEndpointId: default
        disk: 10
        storageClassName: premium-rwo
        domain: REPLACE_GITHUB_ORG-REPLACE_CONTROLLER_NAME
        namespace: controllers
        yaml: |
          kind: "StatefulSet"
          spec:
            template:
              metadata:
                labels:
                  networking/allow-internet-access: "true"
              spec:
                containers:
                - name: "jenkins"
                  env:
                  - name: "SECRETS"
                    value: "/var/jenkins_home/jcasc_secrets"
                  - name: "GITHUB_ORGANIZATION"
                    value: "REPLACE_GITHUB_ORG"
                  - name: "GITHUB_USER"
                    value: "REPLACE_GITHUB_USERNAME"
                  - name: "GITHUB_APP"
                    value: "REPLACE_GITHUB_APP"
                  - name: "CONTROLLER_SUBDOMAIN"
                    value: "REPLACE_GITHUB_ORG-REPLACE_CONTROLLER_NAME"
                  - name: "CASC_BUNDLE_ID"
                    value: "REPLACE_GITHUB_ORG-REPLACE_CONTROLLER_NAME"
                  volumeMounts:
                  - name: "jcasc-secrets"
                    mountPath: "/var/jenkins_home/jcasc_secrets"
                volumes:
                - name: "jcasc-secrets"
                  secret:
                    secretName: cbci-mc-secret          

Note the GITHUB_ORGANIZATION env name/value pair that we are leveraging as a replaced variable in your jenkins.yaml and items.yaml bundle files.

Creating/Updating a Configuration Bundle from a Bundle Export

As you can see from the bundle composition overview above, the YAML in the different configuration files can be somewhat complicated, and that is with only some of the bundle file types and a fairly simple set of configurations. Luckily, CloudBees CI Configuration as Code (CasC) for Controllers supports an export capability that allows you to export the current configuration from an existing controller. In this lab you will make configurations changes on your Ops controller using the UI and then use the export feature to copy new or updated configuration to the files in your ops-controller repository. First, we will add a new, non-CAP plugin and then we will add some properties to a folder - and we will use the CasC export functionality to copy the YAML for those updates to apply to the bundle in your ops-controller repository.

  1. Navigate to the top level of your Ops controller - it will be in the folder with the same name as your workshop GitHub Organization name (lower-cased), and you will see a folder named controller-jobs.

  2. At the top level of your Ops controller, click on the Mange Jenkins link in the left menu. Manage Jenkins link

  3. On the Manage Jenkins page click on Manage Plugins under the System Configuration section. Manage Plugins link

  4. On the Plugin Manager screen, click on the Available tab and enter Pipeline Util into the search box. Then check the Install checkbox for the Pipeline Utility Steps and then click the the Install without restart button.

  5. Once the Pipeline Utility Steps plugin is successfully installed, click on the Mange Jenkins link in the left menu. Install plugin

  6. On the Manage Jenkins page click on CloudBees Configuration as Code export and update under the System Configuration section. CloudBees CasC link

  7. Next, on the CloudBees Configuration as Code export and update page, under the Current configuration tab, click on the Visualize link for the plugin-catalog.yaml Filename. A plugin catalog is used to include plugins that are not in the CloudBees Assurance Program (CAP); tested and used by your software delivery workloads. Since the Pipeline Utility Steps plugin is not in CAP we must add a plugin catalog to our bundle that includes that plugin, so we may install it on our controllers with CasC. Plugin Catalog visualize link

  8. Although the intent of this lab is to show you how to export different CasC snippets and add them to an existing bundle, we have created GitHub Pull Requests for all the required changes in order to get through the material more efficiently, and it allows us to clearly see the difference between the old and updated bundle. So, navigate to your ops-controller repository in your workshop GitHub Organization and click on the Pull requests link. PR link

  9. On the next screen, click on the Bundle Export pull request (it is #1) and then click on the Files changed tab to review the requested configuration changes. PR Files Changed

  10. In the Files changed you will notice that we are adding the plugin-catalog.yaml file to the bundle folder and the contents match the export from your controller:

type: plugin-catalog
version: '1'
name: ops-controller
displayName: Autogenerated catalog from ops-controller
configurations:
- description: Exported plugins
  includePlugins:
    pipeline-utility-steps:
      version: 2.13.0
  1. You will also notice that there are changes for the plugins.yaml and bundle.yaml (we will review the changes to the items.yaml and jenkins.yaml later in this lab). Again, plugins in the plugin-catalog.yaml are not actually installed on a controller, rather they just extend what can be installed outside of CAP. In order for a plugin to be installed via a configuration bundle it must be added to the plugins.yaml file. Click on the plugins.yaml file and you will notice that we have added the following entry under the # non-cap plugins comment:
- id: pipeline-utility-steps
  1. Next, click on the bundle.yaml file and you will see that we added the following entry below the items entry:
catalog:
  - "plugin-catalog.yaml"

In order to have the plugin-catalog.yaml file be part of the configuration bundle assigned to your controller, it must be added to the bundle.yaml file.

In previous versions of CloudBees CI Configuration as Code (CasC) for Controllers the version field of the bundle.yaml file had to be modified in order for an update to be triggered for controllers using that bundle. This is no longer required, as any change in any file in a bundle will trigger a bundle update for any controllers using the updated bundle once those changes are copied to the JCasC bundle directory on Operations Center. However, it is still considered a best practice to increment the bundle version.

  1. Navigate back to the top level of your Ops controller and click on the controller-jobs folder.
  2. On the controller-jobs folder screen, click on the Configure left menu item. Configure folder
  3. Scroll to the bottom of the folder configuration and click on Restrict the kind of children in this folder - a CloudBees Folders Plus feature - and then select Freestyle project, Pipeline, Multibranch Pipeline and Organization Folder so only Jenkins Pipeline type jobs are allowed to be created in the folder; and then hit the Save button. Configure folder
  4. After the updated controller-jobs folder configuration has been saved, click on the Export CasC item link in the left menu. Folder updated
  5. On the Export CasC item page, scroll down to the properties section at the bottom (as highlighted below). This is the only fragment we need to add to the items.yaml file in the ops-controller repository. Copy folder properties
  6. Navigate back to the Bundle Export pull request Files changed tab on your ops-controller repository in your workshop GitHub Organization and click on the items.yaml file. Note that the update in GitHub looks slightly different than the snippet on the Export CasC item page. We moved the folder properties directly under the controller-jobs folder item, we removed hudson.model.FeeStyleProject from the allowedTypes and we removed the empty envVars and kubernetesFolderProperty properties. items.yaml changes
  7. Finally, click on the jenkins.yaml file and note that we updated the systemMessage to 'Jenkins configured using CloudBees CI CasC v2' and updated headerLabel text to "${GITHUB_APP}-bundle-v2". jenkins.yaml changes
  8. Once you have finished reviewing the changed files, click on the Conversation tab of the Bundle Export pull request, scroll down and click the green Merge pull request button and then click the Confirm merge button.

So, we have an updated configuration bundle based on bundle exports from our Ops controller. However, the updated bundle hasn’t actually been applied to your controller. In the next lab we will update the controller-casc-update job configuration so it will actually update the bundle files on Operations Center, that will in turn trigger an available update on your controller. After that, any time there is a commit to the main branch of your ops-controller repository, it will automatically become available as an update on your CloudBees CI controller.