-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix and cleanup #303
Fix and cleanup #303
Conversation
…ck as it will crash the playbook on other jumphosts due to hard-coded values for airlock, re-organised and grouped common role used by all cluster machines, so they are deployed in parallel for faster deployments, inserted ldap-server role in the right place, so roles that depend on regular accounts and groups being present do not crash, added missing subgroup_directories and fuse-layer roles for UIs, use sys-admin-interface host group instead of removed slurm-management host group.
…ck as it will crash the playbook on other jumphosts due to hard-coded values for airlock, re-organised and grouped common role used by all cluster machines, so they are deployed in parallel for faster deployments, inserted ldap-server role in the right place, so roles that depend on regular accounts and groups being present do not crash, added missing subgroup_directories and fuse-layer roles for UIs, use sys-admin-interface host group instead of removed slurm-management host group.
…tent SSH connection.
…otocol to make it a real URI and remove hardcoded ldap:// or ldaps:// in various places, removed ldaps_uri variable, create private and primary groups for the home dirs of LDAP users just like for local users and fixed wrong local users/groups created on Hyperchicken that were conflicting with with LDAP entries.
…heck rule 701 related to Ansible Galaxy, which we do not use.
…e-role-playbooks subdir, so role can find the keys for the CA key pairs for ssh-host-key-signing.
@@ -10,7 +10,7 @@ ExecStartPre=-/usr/bin/docker kill %n | |||
ExecStartPre=-/usr/bin/docker rm %n | |||
ExecStartPre=/usr/bin/docker pull osixia/phpldapadmin:0.7.2 | |||
ExecStart=/usr/bin/docker run -i --name %n --network host \ | |||
--env PHPLDAPADMIN_LDAP_HOSTS={{ uri_ldap }} \ | |||
--env PHPLDAPADMIN_LDAP_HOSTS={{ ldap_uri | regex_replace('^ldaps?://','')}} \ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Not sure, but shouldn't this be "ldap" instead of "ldaps" in the regex pattern?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The ?
after the s
from ldaps
in the regex means match zero or one time, so the regex will match both ldap://
as well as ldaps://
and we do not need separate ldap_uri
and ldaps_uri
variables anymore: just ldap_uri
is enough and can use both plain and encrypted ldap traffic.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ok, thanks for the explanation :-)
Tested:
main
cluster.yml
play runs all the way from start until the end :)Changes:
spacewalk_client
role idempotent.geerlingguy.postfix
dependency that is no longer used.slurm-management
host group; usesys-admin-interface
instead for slurm-management role as well as various monitoring roles all of which are deployed on SAIs.README.md
for static inventories that got relocated to a subdir some time ago.cluster.yml
playbook:before trying to connect to the machines behind the jumphost,
which may otherwise fail when connection multiplexing is used.
grafany-proxy
onairlock
as it will crash the playbook on other jumphosts due to hard-coded values forairlock
ldap-server
role in the right place, so roles that depend on regular accounts and groups being present do not crashsubgroup_directories
andfuse-layer
roles for UIs.ldap_uri
variable,so it is a real URI and we do not need hardcoded protocols in plays anymore.
just like for local users and make this private groups the primary group of a user.
openldap
role.