Skip to content
Snippets Groups Projects
Commit ca854b98 authored by Michiel de Jong's avatar Michiel de Jong
Browse files

move unsecure certs to Vagrantfile and activate default domain

parent f81673dc
No related branches found
No related tags found
No related merge requests found
...@@ -44,6 +44,7 @@ Vagrant.configure(VAGRANTFILE_API_VERSION) do |config| ...@@ -44,6 +44,7 @@ Vagrant.configure(VAGRANTFILE_API_VERSION) do |config|
core.vm.network :private_network, ip: "#{BASE_IP_ADDR}.#{i+1}" core.vm.network :private_network, ip: "#{BASE_IP_ADDR}.#{i+1}"
core.vm.synced_folder ".", "/data/infrastructure", id: "coreos-infrastructure", :nfs => true, :mount_options => ['nolock,vers=3,udp'] core.vm.synced_folder ".", "/data/infrastructure", id: "coreos-infrastructure", :nfs => true, :mount_options => ['nolock,vers=3,udp']
core.vm.provision :file, source: "./cloud-config", destination: "/tmp/vagrantfile-user-data" core.vm.provision :file, source: "./cloud-config", destination: "/tmp/vagrantfile-user-data"
core.vm.provision :shell, inline: "cp /data/infrastructure/scripts/unsecure-certs/*.pem /data/server-wide/haproxy/approved-certs"
core.vm.provision :shell, path: "./scripts/setup.sh" core.vm.provision :shell, path: "./scripts/setup.sh"
core.vm.provision :shell, inline: "etcdctl set /services/default '{\"app\":\"nginx\", \"hostname\":\"#{HOSTNAME}\"}'" core.vm.provision :shell, inline: "etcdctl set /services/default '{\"app\":\"nginx\", \"hostname\":\"#{HOSTNAME}\"}'"
core.vm.provision :shell, path: "./scripts/approve-user.sh", args: [HOSTNAME, "nginx"] core.vm.provision :shell, path: "./scripts/approve-user.sh", args: [HOSTNAME, "nginx"]
......
...@@ -15,8 +15,10 @@ docker pull indiehosters/mysql ...@@ -15,8 +15,10 @@ docker pull indiehosters/mysql
docker pull indiehosters/wordpress docker pull indiehosters/wordpress
docker pull indiehosters/nginx docker pull indiehosters/nginx
# Activate default domain
etcdctl set /services/default '{"app":"nginx", "hostname":"`hostname`"}'
# Configure and start HAproxy # Configure and start HAproxy
mkdir -p /data/server-wide/haproxy/approved-certs mkdir -p /data/server-wide/haproxy/approved-certs
cp /data/infrastructure/scripts/unsecure-certs/*.pem /data/server-wide/haproxy/approved-certs
systemctl enable haproxy.service systemctl enable haproxy.service
systemctl start haproxy.service systemctl start haproxy.service
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment