summaryrefslogtreecommitdiffstats
path: root/roles/openshift-apps
diff options
context:
space:
mode:
authorKevin Fenzi <kevin@scrye.com>2017-08-23 21:22:20 +0000
committerKevin Fenzi <kevin@scrye.com>2017-08-23 21:22:24 +0000
commitd23122bf18b2defaabd7fc156dc6effc311d240b (patch)
tree34c75df8dd342c8a3018dd6db10e81183c281632 /roles/openshift-apps
parent31e8e228218732e11c72c40913291a24e2445694 (diff)
downloadansible-d23122bf18b2defaabd7fc156dc6effc311d240b.tar.gz
ansible-d23122bf18b2defaabd7fc156dc6effc311d240b.tar.xz
ansible-d23122bf18b2defaabd7fc156dc6effc311d240b.zip
try and clean up templates
Diffstat (limited to 'roles/openshift-apps')
-rw-r--r--roles/openshift-apps/waiverdb/files/deploymentconfig.yml10
-rw-r--r--roles/openshift-apps/waiverdb/files/route.yml4
-rw-r--r--roles/openshift-apps/waiverdb/files/service.yml2
-rw-r--r--roles/openshift-apps/waiverdb/templates/client_secrets.json13
-rw-r--r--roles/openshift-apps/waiverdb/templates/configmap.yml4
-rw-r--r--roles/openshift-apps/waiverdb/templates/secret.yml20
6 files changed, 45 insertions, 8 deletions
diff --git a/roles/openshift-apps/waiverdb/files/deploymentconfig.yml b/roles/openshift-apps/waiverdb/files/deploymentconfig.yml
index 61003293b..d495589df 100644
--- a/roles/openshift-apps/waiverdb/files/deploymentconfig.yml
+++ b/roles/openshift-apps/waiverdb/files/deploymentconfig.yml
@@ -2,7 +2,7 @@
apiVersion: v1
kind: DeploymentConfig
metadata:
- name: waiverdb-stg-web
+ name: waiverdb-web
labels:
app: waiverdb
service: web
@@ -33,12 +33,12 @@ spec:
- name: DATABASE_PASSWORD
valueFrom:
secretKeyRef:
- name: waiverdb-stg-secret
+ name: waiverdb-secret
key: database-password
- name: SECRET_KEY
valueFrom:
secretKeyRef:
- name: waiverdb-stg-secret
+ name: waiverdb-secret
key: flask-secret-key
readinessProbe:
timeoutSeconds: 1
@@ -58,10 +58,10 @@ spec:
volumes:
- name: config-volume
configMap:
- name: waiverdb-stg-configmap
+ name: waiverdb-configmap
- name: secret-volume
secret:
- secretName: waiverdb-stg-secret
+ secretName: waiverdb-secret
triggers:
- type: ImageChange
imageChangeParams:
diff --git a/roles/openshift-apps/waiverdb/files/route.yml b/roles/openshift-apps/waiverdb/files/route.yml
index 47b0848c3..4f77d8730 100644
--- a/roles/openshift-apps/waiverdb/files/route.yml
+++ b/roles/openshift-apps/waiverdb/files/route.yml
@@ -1,7 +1,7 @@
apiVersion: v1
kind: Route
metadata:
- name: waiverdb-stg-web
+ name: waiverdb-web
labels:
app: waiverdb
spec:
@@ -10,7 +10,7 @@ spec:
targetPort: web
to:
kind: Service
- name: waiverdb-stg-web
+ name: waiverdb-web
tls:
termination: edge
insecureEdgeTerminationPolicy: Redirect
diff --git a/roles/openshift-apps/waiverdb/files/service.yml b/roles/openshift-apps/waiverdb/files/service.yml
index a0390f981..aab5f637a 100644
--- a/roles/openshift-apps/waiverdb/files/service.yml
+++ b/roles/openshift-apps/waiverdb/files/service.yml
@@ -1,7 +1,7 @@
apiVersion: v1
kind: Service
metadata:
- name: waiverdb-stg-web
+ name: waiverdb-web
labels:
app: waiverdb
spec:
diff --git a/roles/openshift-apps/waiverdb/templates/client_secrets.json b/roles/openshift-apps/waiverdb/templates/client_secrets.json
index 24b9e9bfd..f6c8ab4b2 100644
--- a/roles/openshift-apps/waiverdb/templates/client_secrets.json
+++ b/roles/openshift-apps/waiverdb/templates/client_secrets.json
@@ -1,3 +1,4 @@
+{% if env == 'staging' %}
{"web": {
"redirect_uris": ["https://waiverdb-waiverdb.app.os.stg.fedoraproject.org/"],
"token_uri": "https://id.stg.fedoraproject.org/openidc/Token",
@@ -8,3 +9,15 @@
"token_introspection_uri": "https://id.stg.fedoraproject.org/openidc/TokenInfo"
}
}
+{% else %}
+{"web": {
+ "redirect_uris": ["https://waiverdb-waiverdb.app.os.fedoraproject.org/"],
+ "token_uri": "https://id.fedoraproject.org/openidc/Token",
+ "auth_uri": "https://id.fedoraproject.org/openidc/Authorization",
+ "client_id": "waiverdb",
+ "client_secret": "{{waiverdb_oidc_secret}}",
+ "userinfo_uri": "https://id.fedoraproject.org/openidc/UserInfo",
+ "token_introspection_uri": "https://id.fedoraproject.org/openidc/TokenInfo"
+ }
+}
+{% endif %}
diff --git a/roles/openshift-apps/waiverdb/templates/configmap.yml b/roles/openshift-apps/waiverdb/templates/configmap.yml
index 7de26756d..046a2c6ea 100644
--- a/roles/openshift-apps/waiverdb/templates/configmap.yml
+++ b/roles/openshift-apps/waiverdb/templates/configmap.yml
@@ -1,7 +1,11 @@
apiVersion: v1
kind: ConfigMap
metadata:
+{% if env == 'staging' %}
name: waiverdb-stg-configmap
+{% else %}
+ name: waiverdb-configmap
+{% endif %}
labels:
app: waiverdb
data:
diff --git a/roles/openshift-apps/waiverdb/templates/secret.yml b/roles/openshift-apps/waiverdb/templates/secret.yml
index da4675653..2321dc01f 100644
--- a/roles/openshift-apps/waiverdb/templates/secret.yml
+++ b/roles/openshift-apps/waiverdb/templates/secret.yml
@@ -1,10 +1,15 @@
apiVersion: v1
kind: Secret
metadata:
+{% if env == 'staging' %}
name: "waiverdb-stg-secret"
+{% else %}
+ name: "waiverdb-secret"
+{% endif %}
labels:
app: "waiverdb"
stringData:
+{% if env == 'staging' %}
flask-secret-key: "{{stg_waiverdb_secret_key}}"
database-password: "{{stg_waiverdb_db_password}}"
# This is the same non-secret config we have committed
@@ -18,3 +23,18 @@ stringData:
"client_secret": "qgz8Bzjg6nO7JWCXoB0o8L49KfI5atLF",
"userinfo_uri": "https://iddev.fedorainfracloud.org/openidc/UserInfo",
"token_introspection_uri": "https://iddev.fedorainfracloud.org/openidc/TokenInfo"}}
+{% else %}
+ flask-secret-key: "{{prod_waiverdb_secret_key}}"
+ database-password: "{{prod_waiverdb_db_password}}"
+ # This is the same non-secret config we have committed
+ # as conf/client_secrets.json for using in dev environments.
+ client_secrets.json: |-
+ {"web": {
+ "redirect_uris": ["https://waiverdb-waiverdb.app.os.fedoraproject.org/"],
+ "token_uri": "https://iddev.fedorainfracloud.org/openidc/Token",
+ "auth_uri": "https://iddev.fedorainfracloud.org/openidc/Authorization",
+ "client_id": "D-e69a1ac7-30fa-4d18-9001-7468c4f34c3c",
+ "client_secret": "qgz8Bzjg6nO7JWCXoB0o8L49KfI5atLF",
+ "userinfo_uri": "https://iddev.fedorainfracloud.org/openidc/UserInfo",
+ "token_introspection_uri": "https://iddev.fedorainfracloud.org/openidc/TokenInfo"}}
+{% endif %}