Files
@ b68d19ad38a3
Branch filter:
Location: majic-ansible-roles/testsite/group_vars/all.yml - annotation
b68d19ad38a3
2.7 KiB
text/x-yaml
MAR-33: Added initial scaffolding for wsgi_website tests:
- Added Molecule configuration file.
- Implemented test playbook that sets-up three separate instances of WSGI
website in order to test all variations of parameters.
- Added name for the set_fact task.
- Fixed linting errors related to mode that lacks leading zero.
- Added skip_ansible_lint tag for command that creates the Python virtual
environment.
- Added missing become keyword wherever become_user is specified.
- Fixed invalid parameter name for specifying if HTTPS should be enforced or
not.
- Added small initial sample WSGI apps that get deployed.
- Added static/media sample files.
- Added TLS material.
- Added initial dummy test file.
- Added Molecule configuration file.
- Implemented test playbook that sets-up three separate instances of WSGI
website in order to test all variations of parameters.
- Added name for the set_fact task.
- Fixed linting errors related to mode that lacks leading zero.
- Added skip_ansible_lint tag for command that creates the Python virtual
environment.
- Added missing become keyword wherever become_user is specified.
- Fixed invalid parameter name for specifying if HTTPS should be enforced or
not.
- Added small initial sample WSGI apps that get deployed.
- Added static/media sample files.
- Added TLS material.
- Added initial dummy test file.
0c81b8598748 0f17841d0aad 0f17841d0aad 0f17841d0aad 0f17841d0aad 0f17841d0aad 0f17841d0aad 0f17841d0aad 0f17841d0aad 0f17841d0aad e705dde5e6c7 e705dde5e6c7 e705dde5e6c7 0c81b8598748 0c81b8598748 0c81b8598748 0c81b8598748 fe6cdb2443c7 fe6cdb2443c7 0c81b8598748 0c81b8598748 0c81b8598748 0c81b8598748 0c81b8598748 fe6cdb2443c7 fe6cdb2443c7 fe6cdb2443c7 0c81b8598748 0c81b8598748 0c81b8598748 0c81b8598748 21122b16bd6b 0c81b8598748 21122b16bd6b 0c81b8598748 0c81b8598748 b453b7fcb189 0c81b8598748 0c81b8598748 0079746d9a8b 21122b16bd6b 76ed37089b33 76ed37089b33 32f61f233098 941f4f372672 941f4f372672 941f4f372672 e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b e1f36d36827b 881a85f08e22 881a85f08e22 881a85f08e22 881a85f08e22 d61d01c00362 c6f217756635 881a85f08e22 c6f217756635 881a85f08e22 881a85f08e22 881a85f08e22 881a85f08e22 881a85f08e22 881a85f08e22 881a85f08e22 881a85f08e22 881a85f08e22 881a85f08e22 f4e9cd36dad4 f4e9cd36dad4 f4e9cd36dad4 f4e9cd36dad4 | ---
# Define domain for the test site that should be used.
testsite_domain: example.com
# Derive some additional values that will be used - basing them on domain.
testsite_domain_underscores: "{{ testsite_domain | regex_replace('\\.', '_') }}"
testsite_domain_alternative: "{{ testsite_domain | regex_replace('\\.[^.]+$', '.something') }}"
testsite_ldap_base: "{{ testsite_domain | regex_replace('\\.', ',dc=') | regex_replace('^', 'dc=') }}"
# Configuration for roles bootstrap and preseed.
ansible_key: "{{ lookup('file', '~/.ssh/id_rsa.pub') }}"
# Configuration for role 'common', shared across all servers.
os_users:
- name: admin
uid: 1000
additional_groups:
- sudo
authorized_keys:
- "{{ lookup('file', '~/.ssh/id_rsa.pub') }}"
password: '$6$/aerscJY6aevRG$ABBCymEDtk2mHW/dklre9dMEdgZNJvVHsGLCzgjGmy61FssZ.KW7ePcO2wsMGIkHcg3mZlrA4dhYh.APq9OQu0'
- name: johndoe
uid: 1001
additional_groups:
- office
- developer
password: '$6$cJnUatae7cMz23fl$O3HE2TslnEaKaTDSZnvuDDrfqILAiuMV1wOPGVnkUQFxUu3gIWZOyO7AI1OWYkqeQMVBiezpSqYNiQy6NF6bi0'
os_groups:
- name: office
gid: 1500
- name: developer
gid: 1501
common_packages:
- emacs24-nox
- screen
- debconf-utils
- colordiff
- unzip
ca_certificates:
"ca": "{{ lookup('file', inventory_dir + '/tls/ca.pem') }}"
incoming_connection_limit: 2/second
incoming_connection_limit_burst: 6
# Default LDAP client configuration.
ldap_client_config:
- comment: Set the base DN
option: BASE
value: "{{ testsite_ldap_base }}"
- comment: Set the default URI
option: URI
value: ldap://ldap.{{ testsite_domain }}/
- comment: Set the LDAP TLS truststore
option: TLS_CACERT
value: /etc/ssl/certs/ca.pem
- comment: Enforce TLS
option: TLS_REQCERT
value: demand
# Enable and configure backups
enable_backup: yes
backup_additional_encryption_keys:
- "{{ lookup('pipe', 'gpg2 --homedir \"' + inventory_dir + '/backup_keyring' + '\" --armor --export backup.' + testsite_domain ) }}"
backup_encryption_key: "{{ lookup('pipe', 'gpg2 --homedir \"' + inventory_dir + '/backup_keyring' + '\" --armor --export-secret-keys ' + ansible_fqdn ) }}"
backup_server: "backup.{{ testsite_domain }}"
backup_server_host_ssh_public_keys:
- "{{ lookup('file', inventory_dir + '/ssh/backup_server_dsa_key.pub') }}"
- "{{ lookup('file', inventory_dir + '/ssh/backup_server_rsa_key.pub') }}"
- "{{ lookup('file', inventory_dir + '/ssh/backup_server_ed25519_key.pub') }}"
- "{{ lookup('file', inventory_dir + '/ssh/backup_server_ecdsa_key.pub') }}"
backup_ssh_key: "{{ lookup('file', inventory_dir + '/ssh/' + ansible_fqdn) }}"
# Set-up prompt.
prompt_colour: light_purple
prompt_id: MAR
|