Skip to content
Snippets Groups Projects
Commit a63997c9 authored by Magnus Svensson's avatar Magnus Svensson
Browse files

Disable most of app management for now.

parent 4cb3145e
No related branches found
No related tags found
2 merge requests!37Test,!36Devel
Pipeline #58674 passed
...@@ -34,7 +34,7 @@ class aim_control( ...@@ -34,7 +34,7 @@ class aim_control(
String $skadereg_ro_user = 'skadereg_ro', String $skadereg_ro_user = 'skadereg_ro',
){ ){
::users::liu_user { users::liu_user {
'samla949': 'samla949':
commonname => 'Samuel Larsson', commonname => 'Samuel Larsson',
shell => '/bin/bash', shell => '/bin/bash',
...@@ -62,38 +62,38 @@ class aim_control( ...@@ -62,38 +62,38 @@ class aim_control(
'apache', 'apache',
], ],
require => [ require => [
::Users::Liu_user['samla949'], Users::Liu_user['samla949'],
], ],
} }
include aim_control::firewall include aim_control::firewall
include apache #include apache
include aim_control::remirepo include liurepo::remi
class { 'apache::mod::php': # class { 'apache::mod::php':
package_name => 'php74', # package_name => 'php74',
php_version => '7', # php_version => '7',
} # }
include apache::mod::rewrite # include apache::mod::rewrite
package { # package {
'php74-php-pdo': # 'php74-php-pdo':
ensure => installed; # ensure => installed;
'php74-php-mbstring': # 'php74-php-mbstring':
ensure => installed; # ensure => installed;
'php74-php-mysqlnd': # 'php74-php-mysqlnd':
ensure => installed; # ensure => installed;
'php74-php-common': # 'php74-php-common':
ensure => installed; # ensure => installed;
'php74-php': # 'php74-php':
ensure => installed; # ensure => installed;
} # }
file { '/etc/httpd/modules/libphp7.so': # file { '/etc/httpd/modules/libphp7.so':
ensure => link, # ensure => link,
target => '/opt/remi/php74/root/usr/lib64/httpd/modules/libphp7.so', # target => '/opt/remi/php74/root/usr/lib64/httpd/modules/libphp7.so',
before => Service['httpd'], # before => Service['httpd'],
} # }
include certdist include certdist
...@@ -101,131 +101,131 @@ class aim_control( ...@@ -101,131 +101,131 @@ class aim_control(
$chain = "/etc/pki/tls/certs/chain-${facts['networking']['fqdn']}.pem" $chain = "/etc/pki/tls/certs/chain-${facts['networking']['fqdn']}.pem"
$key = "/etc/pki/tls/private/${facts['networking']['fqdn']}.key" $key = "/etc/pki/tls/private/${facts['networking']['fqdn']}.key"
apache::vhost { 'default:80': # apache::vhost { 'default:80':
servername => $facts['networking']['fqdn'], # servername => $facts['networking']['fqdn'],
default_vhost => true, # default_vhost => true,
port => '80', # port => '80',
docroot => '/var/www/html', # docroot => '/var/www/html',
redirect_status => 'permanent', # redirect_status => 'permanent',
redirect_dest => "https://${facts['networking']['fqdn']}/", # redirect_dest => "https://${facts['networking']['fqdn']}/",
} # }
apache::vhost { "${facts['networking']['fqdn']}:443": # apache::vhost { "${facts['networking']['fqdn']}:443":
servername => $facts['networking']['fqdn'], # servername => $facts['networking']['fqdn'],
port => '443', # port => '443',
ssl => true, # ssl => true,
ssl_cert => $cert, # ssl_cert => $cert,
ssl_chain => $chain, # ssl_chain => $chain,
ssl_key => $key, # ssl_key => $key,
headers => ['Set Strict-Transport-Security "max-age=31536000"',], # headers => ['Set Strict-Transport-Security "max-age=31536000"',],
docroot => '/var/www/skadereg/public', # docroot => '/var/www/skadereg/public',
docroot_owner => 'apache', # docroot_owner => 'apache',
docroot_group => 'skadereg', # docroot_group => 'skadereg',
directories => [ # directories => [
{ # {
path => '/var/www/skadereg/public', # path => '/var/www/skadereg/public',
allow_override => [ 'ALL' ], # allow_override => [ 'ALL' ],
directoryindex => 'index.php', # directoryindex => 'index.php',
} # }
], # ],
} # }
file { '/var/www/skadereg/': # file { '/var/www/skadereg/':
ensure => directory, # ensure => directory,
owner => 'apache', # owner => 'apache',
group => 'skadereg', # group => 'skadereg',
mode => '0770', # mode => '0770',
recurse => true, # recurse => true,
} # }
-> vcsrepo { '/var/www/skadereg': # -> vcsrepo { '/var/www/skadereg':
ensure => latest, # ensure => latest,
before => File['/var/www/skadereg/public'], # before => File['/var/www/skadereg/public'],
provider => git, # provider => git,
source => 'git@gitlab.liu.se:aim-control/laravel.git', # source => 'git@gitlab.liu.se:aim-control/laravel.git',
user => 'apache', # user => 'apache',
group => 'skadereg', # group => 'skadereg',
} # }
-> file { '/var/www/skadereg/.env': # -> file { '/var/www/skadereg/.env':
ensure => file, # ensure => file,
owner => 'apache', # owner => 'apache',
group => 'skadereg', # group => 'skadereg',
mode => '0660', # mode => '0660',
content => template("${module_name}/dotenv.erb"), # content => template("${module_name}/dotenv.erb"),
} # }
exec { 'artisan migrate': # exec { 'artisan migrate':
command => 'php artisan migrate --force -n', # command => 'php artisan migrate --force -n',
cwd => '/var/www/skadereg', # cwd => '/var/www/skadereg',
path => [ '/opt/remi/php74/root/bin/' ], # path => [ '/opt/remi/php74/root/bin/' ],
refreshonly => true, # refreshonly => true,
group => 'skadereg', # group => 'skadereg',
user => 'apache', # user => 'apache',
subscribe => [ Vcsrepo['/var/www/skadereg'], File[ '/var/www/skadereg' ], ], # subscribe => [ Vcsrepo['/var/www/skadereg'], File[ '/var/www/skadereg' ], ],
} # }
cron { 'artisan schedule:run': # cron { 'artisan schedule:run':
minute => '*', # minute => '*',
hour => '*', # hour => '*',
monthday => '*', # monthday => '*',
month => '*', # month => '*',
weekday => '*', # weekday => '*',
user => 'apache', # user => 'apache',
environment => [ 'PATH=/opt/remi/php74/root/bin:/usr/bin:/bin', 'SHELL=/bin/bash' ], # environment => [ 'PATH=/opt/remi/php74/root/bin:/usr/bin:/bin', 'SHELL=/bin/bash' ],
command => 'php /var/www/skadereg/artisan schedule:run &> /dev/null', # command => 'php /var/www/skadereg/artisan schedule:run &> /dev/null',
} # }
$db_name = 'homestead' # $db_name = 'homestead'
class { 'mysql::server': # class { 'mysql::server':
root_password => $mysql_password, # root_password => $mysql_password,
databases => { # databases => {
$db_name => { # $db_name => {
ensure => present, # ensure => present,
charset => 'utf8', # charset => 'utf8',
}, # },
}, # },
users => { # users => {
"${skadereg_ro_user}@%" => { # "${skadereg_ro_user}@%" => {
ensure => present, # ensure => present,
password_hash => mysql_password($skadereg_ro_password), # password_hash => mysql_password($skadereg_ro_password),
}, # },
}, # },
grants => { # grants => {
'root@%/*.*' => { # 'root@%/*.*' => {
ensure => present, # ensure => present,
options => ['GRANT'], # options => ['GRANT'],
privileges => ['ALL'], # privileges => ['ALL'],
table => '*.*', # table => '*.*',
user => 'root@%', # user => 'root@%',
}, # },
}, # },
override_options => { # override_options => {
mysqld => { # mysqld => {
'bind-address' => '0.0.0.0', # 'bind-address' => '0.0.0.0',
port => 33060, # port => 33060,
}, # },
}, # },
} # }
['entries', 'guardian_confirmations', 'users'].each |String $table| { # ['entries', 'guardian_confirmations', 'users'].each |String $table| {
mysql_grant { "${skadereg_ro_user}@%/${db_name}.${table}": # mysql_grant { "${skadereg_ro_user}@%/${db_name}.${table}":
ensure => present, # ensure => present,
privileges => ['SELECT'], # privileges => ['SELECT'],
table => "${db_name}.${table}", # table => "${db_name}.${table}",
user => "${skadereg_ro_user}@%", # user => "${skadereg_ro_user}@%",
} # }
} # }
class { 'mysql::server::backup': # class { 'mysql::server::backup':
backupuser => 'backupuser', # backupuser => 'backupuser',
backuppassword => $mysql_backup_password, # backuppassword => $mysql_backup_password,
backupdir => '/root/mysql_backups', # backupdir => '/root/mysql_backups',
backupdirmode => '700', # backupdirmode => '700',
backupdirowner => 'root', # backupdirowner => 'root',
backupdirgroup => 'root', # backupdirgroup => 'root',
backuprotate => '7', # backuprotate => '7',
time => ['1','0'], # time => ['1','0'],
} # }
} }
class aim_control::remirepo(
) {
package { 'remi-release' :
ensure => 'installed',
provider => 'yum',
source => 'https://rpms.remirepo.net/enterprise/remi-release-7.rpm',
notify => Exec[ 'enable remi' ],
}
exec { 'enable remi' :
command => 'yum-config-manager --enable remi-php74',
path => ['/bin', '/usr/bin' ],
refreshonly => true,
creates => '/opt/remi',
}
}
# frozen_string_literal: true
require 'spec_helper'
describe 'aim_control::remirepo' do
on_supported_os.each do |os, os_facts|
context "on #{os}" do
let(:facts) { os_facts }
it { is_expected.to compile }
end
end
end
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment