Skip to content
Snippets Groups Projects
Commit 057e1843 authored by Chris Hines's avatar Chris Hines
Browse files

fix conflict

parents bce5a23f c8ae66e1
No related branches found
No related tags found
No related merge requests found
...@@ -5,4 +5,4 @@ cityName: "Melbourne" ...@@ -5,4 +5,4 @@ cityName: "Melbourne"
organizationName: "Monash University" organizationName: "Monash University"
emailAddress: "default@default.org" emailAddress: "default@default.org"
organizationUnit: "defaultUnit" organizationUnit: "defaultUnit"
keySize: "512"
...@@ -6,9 +6,7 @@ ...@@ -6,9 +6,7 @@
- apache2 - apache2
- apache2-dev - apache2-dev
sudo: true sudo: true
-
name: "Setting default site"
lineinfile: dest=/etc/apache2/sites-available/000-default.conf regexp="#ServerName" line="ServerName {{ ansible_nodename }}" backrefs=yes
- -
name: "Setting default-ssl site" name: "Setting default-ssl site"
lineinfile: dest=/etc/apache2/sites-available/default-ssl.conf regexp="{{ item.regexp }}" line="{{ item.line }}" backrefs=yes lineinfile: dest=/etc/apache2/sites-available/default-ssl.conf regexp="{{ item.regexp }}" line="{{ item.line }}" backrefs=yes
...@@ -16,6 +14,7 @@ ...@@ -16,6 +14,7 @@
- { regexp : "^\\s+SSLCertificateFile", line : " SSLCertificateFile {{ x509_cert_file }}" } - { regexp : "^\\s+SSLCertificateFile", line : " SSLCertificateFile {{ x509_cert_file }}" }
- { regexp : "SSLCertificateKeyFile", line : " SSLCertificateKeyFile {{ x509_key_file }}" } - { regexp : "SSLCertificateKeyFile", line : " SSLCertificateKeyFile {{ x509_key_file }}" }
- { regexp : "SSLCACertificateFile", line : " SSLCACertificateFile {{ x509_cacert_file }}" } - { regexp : "SSLCACertificateFile", line : " SSLCACertificateFile {{ x509_cacert_file }}" }
sudo: true
- -
name: "Templating default-ssl site" name: "Templating default-ssl site"
template: src=default-ssl.j2 dest=/etc/apache2/sites-available/default-ssl.conf owner=www-data group=www-data template: src=default-ssl.j2 dest=/etc/apache2/sites-available/default-ssl.conf owner=www-data group=www-data
...@@ -24,11 +23,7 @@ ...@@ -24,11 +23,7 @@
name: "Templating default site" name: "Templating default site"
template: src=default.j2 dest=/etc/apache2/sites-available/000-default.conf owner=www-data group=www-data template: src=default.j2 dest=/etc/apache2/sites-available/000-default.conf owner=www-data group=www-data
sudo: true sudo: true
-
name: "Templating ssl configuration"
template: src=ssl.conf.j2 dest=/etc/apache2/mods-available/ssl.conf owner=www-data group=www-data
sudo: true
notify: restart apache2
- -
name: "Enable ssl module" name: "Enable ssl module"
apache2_module: state=present name=ssl apache2_module: state=present name=ssl
...@@ -38,6 +33,7 @@ ...@@ -38,6 +33,7 @@
name: "Enable default-ssl site" name: "Enable default-ssl site"
shell: a2ensite default-ssl shell: a2ensite default-ssl
sudo: true sudo: true
notify: restart apache2
- -
name: "Starting Apache2" name: "Starting Apache2"
......
...@@ -135,7 +135,7 @@ ...@@ -135,7 +135,7 @@
- karaage-cluster-tools - karaage-cluster-tools
- -
name: "Set Secret Key" name: "Set Secret Key"
lineinfile: dest=/etc/karaage3/settings.py regexp="SECRET_KEY = ''" line="SECRET_KEY = 'imkaraage'" state=present lineinfile: dest=/etc/karaage3/settings.py regexp="SECRET_KEY = ''" line="SECRET_KEY = '{{ karaageSecretKey }}'" state=present
sudo: true sudo: true
- -
......
...@@ -79,8 +79,8 @@ ADMINS = ( ...@@ -79,8 +79,8 @@ ADMINS = (
MANAGERS = ADMINS MANAGERS = ADMINS
{% if defaultProject is defined and defaultMachineCategory is defined %} {% if defaultProject is defined and defaultMachineCategory is defined %}
DEFAULT_PROJECT_PID = {{ defaultProject }} DEFAULT_PROJECT_PID = "{{ defaultProject }}"
DEFAULT_MACHINE_CATEGORY_NAME = {{ defaultMachineCategory }} DEFAULT_MACHINE_CATEGORY_NAME = "{{ defaultMachineCategory }}"
{% endif %} {% endif %}
# A dictionary containing the settings for all databases to be used with # A dictionary containing the settings for all databases to be used with
...@@ -270,7 +270,7 @@ LOGGING = { ...@@ -270,7 +270,7 @@ LOGGING = {
ACCOUNTS_EMAIL = '{{ karaageAdminEmail }}' ACCOUNTS_EMAIL = '{{ karaageAdminEmail }}'
# This organisation name, used in outgoing emails. # This organisation name, used in outgoing emails.
ACCOUNTS_ORG_NAME = 'Example' ACCOUNTS_ORG_NAME = '{{ karaageAcountName }}'
# Registration base URL - Used in email templates # Registration base URL - Used in email templates
# Uncomment to override default # Uncomment to override default
......
...@@ -75,7 +75,7 @@ SSLCryptoDevice builtin ...@@ -75,7 +75,7 @@ SSLCryptoDevice builtin
# General setup for the virtual host, inherited from global configuration # General setup for the virtual host, inherited from global configuration
#DocumentRoot "/var/www/html" #DocumentRoot "/var/www/html"
#ServerName www.example.com:443 ServerName {{ ansible_nodename }}.{{ ansible_domain }}:443
# Use separate log files for the SSL virtual host; note that LogLevel # Use separate log files for the SSL virtual host; note that LogLevel
# is not inherited from httpd.conf. # is not inherited from httpd.conf.
......
--- ---
apache_user: "{% if ansible_os_family == 'RedHat' %}apache{% else %}www-data{% endif %}" apache_user: "{% if ansible_os_family == 'RedHat' %}apache{% else %}www-data{% endif %}"
karaageSecretKey: "imkaraage"
...@@ -98,6 +98,11 @@ ...@@ -98,6 +98,11 @@
sudo: true sudo: true
when: ansible_os_family == 'RedHat' and ansible_distribution_major_version < '7' when: ansible_os_family == 'RedHat' and ansible_distribution_major_version < '7'
- name: enable ssl centos 7
lineinfile: regexp="^SLAPD_URLS=" state=present line="SLAPD_URLS='ldaps:/// ldapi:/// ldap:///'" dest=/etc/sysconfig/slapd
sudo: true
when: ansible_os_family == 'RedHat' and ansible_distribution_major_version >= '7'
- name: start ldap - name: start ldap
service: name=slapd state=restarted service: name=slapd state=restarted
sudo: true sudo: true
......
...@@ -2,6 +2,8 @@ ...@@ -2,6 +2,8 @@
character_set_server=utf8 character_set_server=utf8
default-storage-engine = innodb default-storage-engine = innodb
sql_mode = STRICT_ALL_TABLES sql_mode = STRICT_ALL_TABLES
log_warnings = 2
log_error = /var/log/mysql/error.log
[client] [client]
default-character-set = utf8 default-character-set = utf8
---
- name: "Restarting Apache"
service: name=apache2 state=restarted
sudo: true
- name: "Restarting shibboleth"
service: name=shibd state=restarted
sudo: true
...@@ -2,11 +2,13 @@ ...@@ -2,11 +2,13 @@
- -
name: "Copying the metadata.aaf.xml and aaf-metadata-cert.pem" name: "Copying the metadata.aaf.xml and aaf-metadata-cert.pem"
template: src="{{ item }}.j2" dest="/etc/shibboleth/{{ item }}" mode=0644 template: src="{{ item }}.j2" dest="/etc/shibboleth/{{ item }}" mode=0644
sudo: true
with_items: with_items:
- metadata.aaf.xml - metadata.aaf.xml
- aaf-metadata-cert.pem - aaf-metadata-cert.pem
- -
name: "Setting shibboleth2.xml sp.example.org" name: "Setting shibboleth2.xml sp.example.org"
sudo: true
replace: replace:
args: args:
dest: /etc/shibboleth/shibboleth2.xml dest: /etc/shibboleth/shibboleth2.xml
...@@ -17,6 +19,7 @@ ...@@ -17,6 +19,7 @@
- -
name: "Setting shibboleth2.xml handlerSSL" name: "Setting shibboleth2.xml handlerSSL"
sudo: true
replace: replace:
args: args:
dest: /etc/shibboleth/shibboleth2.xml dest: /etc/shibboleth/shibboleth2.xml
...@@ -26,6 +29,7 @@ ...@@ -26,6 +29,7 @@
- -
name: "Setting shibboleth2.xml supportContact" name: "Setting shibboleth2.xml supportContact"
sudo: true
replace: replace:
args: args:
dest: /etc/shibboleth/shibboleth2.xml dest: /etc/shibboleth/shibboleth2.xml
...@@ -35,6 +39,7 @@ ...@@ -35,6 +39,7 @@
- -
name: "Enabling MetadataProvider" name: "Enabling MetadataProvider"
sudo: true
replace: replace:
args: args:
dest: /etc/shibboleth/shibboleth2.xml dest: /etc/shibboleth/shibboleth2.xml
...@@ -43,6 +48,7 @@ ...@@ -43,6 +48,7 @@
- -
name: "Enabling MetadataProvider" name: "Enabling MetadataProvider"
sudo: true
replace: replace:
args: args:
dest: /etc/shibboleth/shibboleth2.xml dest: /etc/shibboleth/shibboleth2.xml
...@@ -50,6 +56,7 @@ ...@@ -50,6 +56,7 @@
replace: '</MetadataProvider>' replace: '</MetadataProvider>'
- -
name: "Setting shibboleth2.xml Federation URI" name: "Setting shibboleth2.xml Federation URI"
sudo: true
replace: replace:
args: args:
dest: /etc/shibboleth/shibboleth2.xml dest: /etc/shibboleth/shibboleth2.xml
...@@ -58,6 +65,7 @@ ...@@ -58,6 +65,7 @@
- -
name: "Setting shibboleth2.xml backingFilePath" name: "Setting shibboleth2.xml backingFilePath"
sudo: true
replace: replace:
args: args:
dest: /etc/shibboleth/shibboleth2.xml dest: /etc/shibboleth/shibboleth2.xml
...@@ -66,6 +74,7 @@ ...@@ -66,6 +74,7 @@
- -
name: "Setting shibboleth2.xml aaf Certificate" name: "Setting shibboleth2.xml aaf Certificate"
sudo: true
replace: replace:
args: args:
dest: /etc/shibboleth/shibboleth2.xml dest: /etc/shibboleth/shibboleth2.xml
...@@ -74,6 +83,7 @@ ...@@ -74,6 +83,7 @@
- -
name: "Setting shibboleth2.xml AAF Discovery URL" name: "Setting shibboleth2.xml AAF Discovery URL"
sudo: true
replace: replace:
args: args:
dest: /etc/shibboleth/shibboleth2.xml dest: /etc/shibboleth/shibboleth2.xml
...@@ -82,6 +92,7 @@ ...@@ -82,6 +92,7 @@
- -
name: "Setting shibboleth2.xml Credential Resolver" name: "Setting shibboleth2.xml Credential Resolver"
sudo: true
replace: replace:
args: args:
dest: /etc/shibboleth/shibboleth2.xml dest: /etc/shibboleth/shibboleth2.xml
...@@ -90,20 +101,26 @@ ...@@ -90,20 +101,26 @@
- -
name: "Templating attribute-map.xml" name: "Templating attribute-map.xml"
sudo: true
template: template:
args: args:
src: attribute-map.xml.j2 src: attribute-map.xml.j2
dest: /etc/shibboleth/attribute-map.xml dest: /etc/shibboleth/attribute-map.xml
notify:
- Restarting Apache
- Restarting shibboleth
- -
name: "Restarting Apache" name: "Starting Apache"
sudo: true
service: service:
args: args:
name: apache2 name: apache2
state: restarted state: started
- -
name: "Restarting shibboleth" name: "Starting shibboleth"
sudo: true
service: service:
args: args:
name: shibd name: shibd
state: restarted state: started
--- ---
- -
name: Install base packages - Debian name: Install base packages - Debian
sudo: true
apt: name={{ item }} state=present apt: name={{ item }} state=present
with_items: with_items:
- shibboleth-sp2-schemas - shibboleth-sp2-schemas
......
...@@ -50,7 +50,7 @@ export PKCS11_PIN="dummy" ...@@ -50,7 +50,7 @@ export PKCS11_PIN="dummy"
# down TLS negotiation performance # down TLS negotiation performance
# as well as the one-time DH parms # as well as the one-time DH parms
# generation process. # generation process.
export KEY_SIZE=512 export KEY_SIZE={{ keySize }}
# In how many days should the root CA key expire? # In how many days should the root CA key expire?
export CA_EXPIRE=3650 export CA_EXPIRE=3650
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment