-
Notifications
You must be signed in to change notification settings - Fork 3
/
provision-whydah.yml
157 lines (148 loc) · 3.75 KB
/
provision-whydah.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
---
# This playbook deploys Whydah to AWS AMI's
- name: Set up Standard server configuration
hosts:
- Whydah_UserIdentityBackend
- Whydah_SecurityTokenService
- Whydah_SSOLoginWebApp
- Whydah_UserAdminWebApp
- Whydah_TestWebApp
- Whydah_UserAdminService
sudo: true
roles:
- standard
tags:
standard
- name: Set up Whydah UserIdentityBackend
hosts: Whydah_UserIdentityBackend
sudo: true
roles:
- configuration
- file_transfer
- app
tags:
uib
vars:
username: UserIdentityBackend
group_id: net/whydah/identity
app_name: UserIdentityBackend
env_mode: PROD
env_vars: -DIAM_MODE=PROD
service_config_template: useridentitybackend.properties
service_config: useridentitybackend.PROD.properties
folders_to_copy: prodInitData
#verify_service_url: http://localhost:9995/uib/authenticate/application/
vars_files:
- vars/uib
tasks:
- name: Add UIB specific libraries
yum: name=openldap-clients state=present
- name: Create STS hazelcast file
hosts: Whydah_SecurityTokenService
sudo: true
roles:
- configuration
tags:
sts
vars:
username: SecurityTokenService
service_config_template: hazelcast.xml
service_config: hazelcast.xml
- name: Set up Whydah SecurityTokenService
hosts: Whydah_SecurityTokenService
sudo: true
roles:
- configuration
- app
tags:
sts
vars:
username: SecurityTokenService
group_id: net/whydah/token
app_name: SecurityTokenService
env_vars: -DIAM_MODE=PROD -Dhazelcast.config=hazelcast.xml
service_config_template: securitytokenservice.properties
service_config: securitytokenservice.PROD.properties
# verify_service_url: http://localhost:9998/tokenservice/
vars_files:
- vars/securityTokenService
- name: Set up Whydah SSOLoginWebApp
hosts: Whydah_SSOLoginWebApp
sudo: true
roles:
- configuration
- app
tags:
sso
vars:
username: SSOLoginWebApp
group_id: net/whydah/sso
app_name: SSOLoginWebApp
env_vars: -DIAM_MODE=PROD
service_config_template: ssologinservice.properties
service_config: ssologinservice.PROD.properties
verify_service_url: http://localhost:9997/sso/login
vars_files:
- vars/ssoLogin
- name: Set up Whydah UserAdminWebApp
hosts: Whydah_UserAdminWebApp
sudo: true
roles:
- configuration
- app
tags:
uawa
vars:
username: UserAdminWebApp
group_id: net/whydah/identity
app_name: UserAdminWebApp
env_vars: -DIAM_MODE=PROD
service_config_template: useradminwebapp.properties
service_config: useradminwebapp.PROD.properties
verify_service_url: http://localhost:9996/useradmin
vars_files:
- vars/userAdministration
- name: Set up Whydah UserAdminService
hosts: Whydah_UserAdminService
sudo: true
roles:
- configuration
- app
tags:
uas
vars:
username: UserAdminService
group_id: net/whydah/identity
app_name: UserAdminService
env_vars: -DIAM_MODE=PROD
service_config_template: useradminservice.properties
service_config: useradminservice.PROD.properties
verify_service_url: http://localhost:9992/useradminservice/1/1/user/ping/pong
vars_files:
- vars/userAdminService
- name: Set up Whydah TestWebApp
hosts: Whydah_TestWebApp
sudo: true
roles:
- configuration
- app
tags:
testapp
vars:
username: TestWebApp
group_id: net/whydah/sso/web
app_name: TestWebApp
env_vars: -DIAM_MODE=TEST
service_port: 9990
service_config_template: testwebapp.properties
service_config: testwebapp.TEST.properties
verify_service_url: http://localhost:9990/test/hello
vars_files:
- vars/testwebapp
- name: Set up Apache config
hosts: Whydah_SSOLoginWebApp
sudo: true
roles:
- apache
tags:
apache