fxa/packages/123done/ansible
Danny Coates 1dd1b038d4
refactor(config): replace 127.0.0.1 with localhost
why, after all these years?

because there's a few annoying cases where the loopback
makes dev harder. When you try to test a flow from a not
local machine, like a tv, mobile device, or a saucelabs
proxy session. With localhost it's easy enough to forward
but loopback not so much

enough is enough
2020-04-15 13:55:42 -07:00
..
env fix(ansible): fix issuer_uri 2018-05-01 17:38:21 -07:00
playbooks refactor(config): replace 127.0.0.1 with localhost 2020-04-15 13:55:42 -07:00
templates fix(ansible): cleanup fixes, and config for 123done-nightly mozilla/123done#161) r=vladikoff 2017-04-19 11:04:03 -04:00
Makefile feat(ansible): ansible configuration to deploy {123done,321done}-stage.dev.lcip.org 2016-03-06 11:54:15 -08:00
README.md fix(ansible): cleanup fixes, and config for 123done-nightly mozilla/123done#161) r=vladikoff 2017-04-19 11:04:03 -04:00
ansible.cfg feat(ansible): ansible configuration to deploy {123done,321done}-stage.dev.lcip.org 2016-03-06 11:54:15 -08:00
defaults.yml fix(ansible): cleanup fixes, and config for 123done-nightly mozilla/123done#161) r=vladikoff 2017-04-19 11:04:03 -04:00
hosts fix(ansible): better hint where python interpreter is 2018-05-01 17:37:47 -07:00

README.md

The command make stack=one23done-stage key=yourkeyname trusted_client_id="dead..." trusted_client_secret="beef..." untrusted_client_id="feed..." untrusted_client_secret="deaf..." will create an EC2+ELB instance [1] with the following attributes:

  • builds and runs 123done (https://github.com/mozilla/123done) webserver as both trusted (123done) and untrusted (321done), using the oauth branch
  • an AWS ELB serving both port 80, and port 443 traffic with a SSL certificate for *.dev.lcip.org
  • registers 123done-stage.dev.lcip.org and 321done-stage.dev.lcip.org in DNS as CNAMES to the ELB
  • node processes managed by supervisorctl
  • ssh access: use ssh ec2-user@meta-123done-stage.dev.lcip.org; 123done/321done code is under /home/app

[1] assumes you have AWS access keys set up in mozilla's cloudservices-aws-dev IAM, but this ansible code should be not hard to re-use in some other IAM