Hello all,

The Puppet Server team is hoping to start working soon on 
https://tickets.puppetlabs.com/browse/SERVER-297 but would first like to 
solicit feedback on our intended approach.  SERVER-297 concerns how Puppet 
Server handles environment variables with respect to the Ruby code it 
executes.

For some background…

During the initial development of Puppet Server, a conscious decision was 
made to shield any Ruby code being executed within Puppet Server’s Java 
process from directly inheriting any shell environment variables.  The 
primary factor motivating this decision was a fear about the potential 
contamination of the Puppet Server JRuby runtime by shell environment 
variables configured for execution under MRI Ruby.

For example, gems with native C extensions require different 
implementations for the MRI vs. JRuby execution environments.  Assuming the 
default value for a system's GEM_HOME environment variable, if defined, 
would most commonly contain a path under which MRI-compatible gems reside, 
we thought it would be better for the JRuby-based Puppet Server to maintain 
its own setting for this path which would be completely independent from 
the shell environment.  This is captured under a setting called “gem-home” 
in the “jruby-puppet” section of the “puppetserver.conf” file. 
 Effectively, the value for this “gem-home” setting is injected into the 
configuration of the JRuby container in Puppet Server such that Ruby code 
sees it as the value of the GEM_HOME "environment variable”.

In current Puppet Server code, GEM_HOME is the only “environment variable” 
that any Ruby code would see.  All other environment variables which may 
have been active in the shell under which the Puppet Server process was 
launched - PATH, USER, etc. - are removed / not made visible to any Ruby 
code running within the Puppet Server process.

We realized later, however, that by not providing a mechanism for Puppet 
Server to configure other environment variables into a JRuby container that 
some Ruby code would be impossible to configure under Puppet Server.  For 
example, assume that your Puppet code needed to make use of a gem that is 
designed to only be able to read its configuration from an environment 
variable called FOO.  Under current Puppet Server code, it would not be 
possible for the gem to get a value for this variable.

To address this use case while preserving the ability to avoid 
contaminating the JRuby environment with content intended only for use with 
MRI Ruby, we’ve discussed the possibility of adding an “environment 
variable” map to the “jruby-puppet” section of the “puppetserver.conf” file.

For example, assume that an init script had defined a shell environment 
variable as….

  export FOO=for_mri_ruby

… whereas the “jruby-puppet” section of Puppet Server’s “puppetserver.conf” 
file were to have:
  jruby-puppet {
    gem-home: /var/lib/puppet/jruby-gems 
    environment-variables: { 
      FOO: for_jruby 
    }
    ...
  } 


When the gem mentioned earlier were to access ENV[‘FOO’] while running 
under Puppet Server, the gem would get a value of “for_jruby”.  This would 
happen because the source of the environment variable for the JRuby 
container would be drawn from the configuration file as opposed to the 
actual shell environment.

Encapsulating the JRuby “environment variable” definition in a 
configuration file as opposed to the actual shell environment could also 
set a nice precedent for future use cases, purely speculative today, where 
individual JRuby containers might need to have completely unique 
characteristics from one another.  For example, one JRuby container could 
maintain a set of “environment variables” appropriate for "Ruby 1.9.3” 
execution vs. another container, potentially running in the same Java 
process, could use a different set of variables appropriate for “Ruby 2.2”. 
 Note that we don’t have any formal plans in place to develop toward this 
specific use case at this time.

While we are leaning toward a config-file driven approach, we would be 
interested in hearing of any specific use cases you may know of where this 
may be insufficient.  We would specifically be interested in any use cases 
which suggest that some affordance in the design should be made to allow 
for some (or all?) variables seen by Ruby code to be drawn from the actual 
shell environment, as opposed to just a configuration file.  As mentioned 
earlier, we’re a bit leery of opening up the possibility of having Ruby 
code running under JRuby inherit shell environment variables because of 
potential MRI / JRuby contamination issues.  However, we want to ensure 
that we’re not being short-sighted by letting this concern preclude other 
valuable use cases.

Thanks!

— Jeremy

-- 
You received this message because you are subscribed to the Google Groups 
"Puppet Developers" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to puppet-dev+unsubscr...@googlegroups.com.
To view this discussion on the web visit 
https://groups.google.com/d/msgid/puppet-dev/450061ec-ea4d-4753-9831-ea9ed76f7349%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to