Files @ 7977a2033d9a
Branch filter:

Location: majic-ansible-roles/roles/wsgi_website/tasks/main.yml - annotation

branko
Noticket: Fixed ldap_permissions module - if no olcAccess rules are defined, assume empty list (otherwise we get key lookup exception).
981584549895
981584549895
981584549895
3af07319e2f3
981584549895
981584549895
981584549895
981584549895
ed37f9854bfb
981584549895
3af07319e2f3
3af07319e2f3
e15b53d59517
3af07319e2f3
e15b53d59517
e15b53d59517
e15b53d59517
e15b53d59517
e15b53d59517
e15b53d59517
e15b53d59517
981584549895
b757d690af42
b757d690af42
b757d690af42
b757d690af42
981584549895
a40cf7a468ea
4a3c8915f967
981584549895
981584549895
981584549895
981584549895
981584549895
981584549895
4a3c8915f967
4a3c8915f967
4a3c8915f967
4a3c8915f967
4a3c8915f967
4a3c8915f967
981584549895
981584549895
922cda0a1834
9f9dbcb79909
9f9dbcb79909
981584549895
db91799cc8fa
db91799cc8fa
db91799cc8fa
db91799cc8fa
981584549895
981584549895
981584549895
981584549895
981584549895
922cda0a1834
5a15eda01800
981584549895
a77fff9fcd91
a77fff9fcd91
a77fff9fcd91
a77fff9fcd91
981584549895
981584549895
981584549895
981584549895
5a15eda01800
922cda0a1834
5a15eda01800
9f9dbcb79909
9f9dbcb79909
5a15eda01800
981584549895
922cda0a1834
5a15eda01800
9f9dbcb79909
9f9dbcb79909
981584549895
981584549895
922cda0a1834
981584549895
922cda0a1834
9f9dbcb79909
9f9dbcb79909
981584549895
981584549895
981584549895
981584549895
981584549895
981584549895
9fa438ee34c0
981584549895
981584549895
981584549895
981584549895
981584549895
981584549895
9fa438ee34c0
981584549895
981584549895
981584549895
981584549895
981584549895
981584549895
981584549895
981584549895
d26fe0368a4b
18cd76ec050d
d26fe0368a4b
d26fe0368a4b
d26fe0368a4b
d26fe0368a4b
d26fe0368a4b
18cd76ec050d
d26fe0368a4b
d26fe0368a4b
d26fe0368a4b
d26fe0368a4b
981584549895
981584549895
981584549895
981584549895
981584549895
981584549895
981584549895
981584549895
981584549895
981584549895
981584549895
7387caca37f3
7387caca37f3
7387caca37f3
7387caca37f3
7387caca37f3
7387caca37f3
---

- set_fact:
    admin: "admin-{{ fqdn | replace('.', '_') }}"
    user: "web-{{ fqdn | replace('.', '_') }}"
    home: "/var/www/{{ fqdn }}"

- name: Create WSGI website group
  group: name="{{ user }}" gid="{{ uid | default(omit) }}" state=present

- name: Create WSGI website admin user
  user: name="{{ admin }}" uid="{{ admin_uid | default(omit) }}" group="{{ user }}"
        shell=/bin/bash createhome=yes home="{{ home }}" state=present

- name: Set-up directory for storing user profile configuration files
  file: path="{{ home }}/.profile.d" state=directory
        owner="{{ admin }}" group="{{ user }}" mode=750

- name: Deploy profile configuration file for auto-activating the virtual environment
  copy: src="profile_virtualenv.sh" dest="{{ home }}/.profile.d/virtualenv.sh"
        owner="root" group="{{ user }}" mode="640"

- name: Deploy profile configuration file for setting environment variables
  template: src="environment.sh.j2" dest="{{ home }}/.profile.d/environment.sh"
            owner="root" group="{{ user }}" mode=640

- name: Create WSGI website user
  user: name="{{ user }}" uid="{{ uid | default(omit) }}" group="{{ user }}" comment="umask=0007"
        system=yes createhome=no state=present home="{{ home }}"

- name: Add nginx user to website group
  user: name="www-data" groups="{{ user }}" append="yes"
  notify:
    - Restart nginx

# Ownership set to root so Postfix would not check if correct user owns the
# file.
- name: Set-up forwarding for mails delivered to local application user/admin
  template: src="forward.j2" dest="{{ home }}/.forward"
            owner="root" group="{{ user }}" mode=640

- name: Install extra packages for website
  apt: name="{{ item }}" state=present
  with_items: "{{ packages }}"
  notify:
    - "Restart website {{ fqdn }}"

- name: Set-up MariaDB mysql_config symbolic link for compatibility (workaround for Debian bug 766996)
  file: src="/usr/bin/mariadb_config" dest="/usr/bin/mysql_config" state=link
  when: "'libmariadb-client-lgpl-dev-compat' in packages"

- name: Create directory for storing the Python virtual environment
  file: path="{{ home }}/virtualenv" state=directory
        owner="{{ admin }}" group="{{ user }}" mode="2750"

- name: Create Python virtual environment
  become_user: "{{ admin }}"
  command: /usr/bin/virtualenv --prompt "({{ fqdn }})" "{{ home }}/virtualenv" creates="{{ home }}/virtualenv/bin/activate"

- name: Configure project directory for the Python virtual environment
  template: src="venv_project.j2" dest="{{ home }}/virtualenv/.project"
            owner="{{ admin }}" group="{{ user }}" mode="640"

- name: Deploy virtualenv wrapper
  template: src="venv_exec.j2" dest="{{ home }}/virtualenv/bin/exec"
            owner="{{ admin }}" group="{{ user }}" mode="750"

- name: Install futures package for use with Gunicorn thread workers
  become_user: "{{ admin }}"
  pip: name=futures version="{{ futures_version }}" state=present virtualenv="{{ home }}/virtualenv"
  notify:
    - "Restart website {{ fqdn }}"

- name: Install Gunicorn in Python virtual environment
  become_user: "{{ admin }}"
  pip: name=gunicorn version="{{ gunicorn_version }}" state=present virtualenv="{{ home }}/virtualenv"
  notify:
    - "Restart website {{ fqdn }}"

- name: Install additional packages in Python virtual environment
  become_user: "{{ admin }}"
  pip: name="{{ item }}" state=present virtualenv="{{ home }}/virtualenv"
  with_items: "{{ virtualenv_packages }}"
  notify:
    - "Restart website {{ fqdn }}"

- name: Deploy systemd socket configuration for website
  template: src="systemd_wsgi_website.socket.j2" dest="/etc/systemd/system/{{ fqdn }}.socket"
            owner=root group=root mode=644
  notify:
    - Reload systemd
    - "Restart website {{ fqdn }}"

- name: Deploy systemd service configuration for website
  template: src="systemd_wsgi_website.service.j2" dest="/etc/systemd/system/{{ fqdn }}.service"
            owner=root group=root mode=644
  notify:
    - Reload systemd
    - "Restart website {{ fqdn }}"

- name: Enable the website service
  service: name="{{ fqdn }}" enabled=yes state=started

- name: Create directory where static files can be served from
  file: path="{{ home }}/htdocs/" state=directory
        owner="{{ admin }}" group="{{ user }}" mode="2750"

- name: Deploy nginx TLS private key for website
  copy: dest="/etc/ssl/private/{{ fqdn }}_https.key" content="{{ https_tls_key }}"
        mode=640 owner=root group=root
  notify:
    - Restart nginx

- name: Deploy nginx TLS certificate for website
  copy: dest="/etc/ssl/certs/{{ fqdn }}_https.pem" content="{{ https_tls_certificate }}"
        mode=644 owner=root group=root
  notify:
    - Restart nginx

- name: Deploy nginx configuration file for website
  template: src="nginx_site.j2" dest="/etc/nginx/sites-available/{{ fqdn }}"
            owner=root group=root mode=640 validate="/usr/local/bin/nginx_verify_site.sh -n '{{ fqdn }}' %s"
  notify:
    - Restart nginx

- name: Enable nginx website
  file: src="/etc/nginx/sites-available/{{ fqdn }}" dest="/etc/nginx/sites-enabled/{{ fqdn }}"
        state=link
  notify:
    - Restart nginx

- name: Explicitly run all handlers
  include: ../handlers/main.yml
  when: "handlers | default(False) | bool() == True"
  tags:
    - handlers