This repo is an in-house project made with ♥ that tries to make our live easier. You don't know how much time we wasted doing this stuff by hand few years ago. So, be patient, we are still working on it.
Features:
- Deployment server: Ubuntu 12.04 LTS
In order to provision. First we have to generate our ssh keys. Then copy your SSH public key and put into your remote repository for SSH deployment. I forgot, we will use SSH agent forwarding strategy to deploy our keys.
$ cat ~/.ssh/id_rsa.pub
This procedure is executed just once.
Set your local environment with the variables below. I strongly recommend to use virtualenvwrapper for this purpose. I am using it and all my virtualenv variables are set into the postactivate script.
# Linux User.
export USER=mynewuser
...
Check this out in order to generate user passwords.
...
export PASSWORD='$6$rounds=100000$.8vhLbNWv7YaHkVb$ALN9H7/4qzVPO83eT1tiT5o4EI9EpBuOo6B53JYcDEXU5Tn2ZMbdlxOCkCaHDnDeJenURpZaX5L3GGlW03s/d1'
export ROOT_PASSWORD='$6$rounds=100000$.8vhLbNWv7YaHkVb$ALN9H7/4qzVPO83eT1tiT5o4EI9EpBuOo6B53JYcDEXU5Tn2ZMbdlxOCkCaHDnDeJenURpZaX5L3GGlW03s/d1'
# Api keys local filepath.
export API_KEY_LOCALPATH='~/projects/django-provision/provisioning/config_keys'
# RSA keys for SSH authentication.
export RSA_PUB_KEY_LOCALPATH='~/.ssh/id_rsa.pub'
export RSA_PRIV_KEY_LOCALPATH='~/.ssh/id_rsa'
# Postgres rol.
export POSTGRES_ROLE=mynewrol
...
Check this out to generate encrypted passwords.
...
export POSTGRES_ROLE_PASSWORD=mypassword
# Postgres database.
export DB_NAME=mydb
export DB_HOST=localhost
export DB_PORT=5432
# Git Repo.
export REPOSITORY="[email protected]:username/myrepo.git"
export REPOSITORY_NAME="myrepo"
export DEPLOYMENT_BRANCH="master"
export REMOTE_HOST="remote-host.com"
All these enviroment variables are mapped into the file provisioning/group_vars/all. So you are free to modify it.
# Bringing VM 'default' up with 'virtualbox' provider.
$ vagrant up
# Provision our VM with ansible.
$ vagrant provision
More info:
Before this step, you need to set your inventory. Then, go inside the directory named provisioning and let the hacking begin with this command.
$ ansible-playbook -vvvv -u remote_user_name --sudo site.yml
# Examples:
$ ansible-playbook -vvvv -u root --sudo site.yml
$ ansible-playbook -vvvv -u dgnest --sudo site.yml
Inside out guest machine (vagrant) run su newuser to login as our deployment user (newuser). Finally enter to the virtualenv and run the basics.
$ cd ~ && source venv/bin/activate
# Go inside your repo.
$ python manage.py runserver localhost:9000
To check in the browser's host machine:
192.168.33.10