-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
deprecate ood-portal.conf.j2 template #128
Comments
I seem to remember I've used this before for deprecated stuff - it's nastily noisy so should get some attention, but shouldn't actually break things: |
Am I missing something or is the task logic only in place to use the templates? I see the note about using the defaults with the [email protected], but won't running the configure option always copy the template? |
Templates in general, yes, but This is the config that drives this behavior and this is the default. Setting it to false, and using this library's
Hope that makes sense! |
That makes sense. Not to get too far into the weeds on this, but were do the files in default factor into the setup? I need to augment either the role or playbook to add in items which aren't covered in the role. One of the changes is I was just going to copy over the ood_portal.yml as opposed to using the template. Does the role have an option to do this? As always thanks for your work on this project! |
Got it. So the defaults in If you want default values - just don't supply any ood-ansible/templates/ood_portal.yml.j2 Lines 11 to 13 in a068982
|
Got it! This makes a lot more sense to me now, and I was able to mimic our existing configuration so perfect. I still need to add installing mellon (which is our auth method) and the various certificates around that and ssl. I think I can do this using the playbook which will invoke the role later on using includ_role https://docs.ansible.com/ansible/latest/user_guide/playbooks_reuse_roles.html unless there is an existing method to add those changes as well. |
Yea, we're a puppet shop, so I made this role initially to build from source - then started to use it to play around in GCP. Which is to say - there could be some preparatory steps missing. Looking back I have this playbook where I had some separate pre & post roles. I know for sure the pre roles setup let's encrypt certificates. My guess is you have to get this setup before we run this role because and the end of this role bouncing httpd is going to fail (because you're using configs for say mellon but you don't have actual libraries yet). - hosts: gcp_dev
roles:
- role: prep-ood-vm
- role: gke-users
# I'm generating certs on the fly in prep-ood-vm and setting them as facts, so that I can use them here.
- role: 'osc.open_ondemand'
import_role: 'prep-ood-vm'
- role: post-ood-vm |
Got it thanks. I appreciate your tolerance on the thread drift on this issue. If I end up finding any way to easily extend the role to include this I will see if I can push it back, but I'm probably just going to lump into an extended playbook at this point. |
NP at all. |
using |
We need to deprecate the use of
ood_portal.conf.j2
. I added it initially as a way for folks to write new directives but it's just too much to maintain. Folks should get by with just adding new conf files to conf.d.I don't know how to get ansible to signify that this is deprecated, but we should use that mechanism if it exists.
The text was updated successfully, but these errors were encountered: