diff --git a/roles/fortress_module/files/fortress.properties b/roles/fortress_module/files/fortress.properties new file mode 100644 index 0000000000000000000000000000000000000000..7cb41c08c8fe5cd49183b210fe404d9745759058 --- /dev/null +++ b/roles/fortress_module/files/fortress.properties @@ -0,0 +1,55 @@ +# Host name and port of LDAP DIT: +host=10.0.2.2 +port=10389 + +# Options are openldap or apacheds (default): +ldap.server.type=openldap + +# Audit only works if ldap.server.type == openldap: +enable.audit=true + +# Used for SSL Connection to LDAP Server: +enable.ldap.ssl=true +#enable.ldap.ssl.debug=${enable.ldap.ssl.debug} +#trust.store=${trust.store} +#trust.store.password=${trust.store.password} +#trust.store.set.prop=${trust.store.set.prop} + +# Used for SSL Demo with Tomcat: +#key.store=${key.store} +#key.store.password=${key.store.password} + +# These credentials are used for read/write access to all nodes under suffix: +admin.user=cn=admin,dc=psu,dc=edu +# LDAP admin root pass is encrypted using 'encrypt' target in build.xml: +admin.pw=secret + +# This is min/max settings for LDAP administrator pool connections that have read/write access to all nodes under suffix: +min.admin.conn=1 +max.admin.conn=10 + +# This is min/max connection pool settings for LDAP User authentication connection pool: +min.user.conn=1 +max.user.conn=10 + +# This node contains fortress properties stored on behalf of connecting LDAP clients: +config.realm=DEFAULT +config.root=ou=Config,dc=psu,dc=edu + +# enable this to see trace statements when connection pool allocates new connections: +debug.ldap.pool=true + +# Default for pool reconnect flag is false: +enable.pool.reconnect=true + +crypto.prop=${crypto.prop} + +ehcache.config.file=ehcache.xml + +# If for any reason echcache must be DISABLED for DSD, make sure this parameter is set to 'true' which is the default. Otherwise performance penalty will be incurred during multi-role activations. +disable.dsd.cache=false + +# This will override default LDAP manager implementations for the RESTful ones: +enable.mgr.impl.rest=false + +GroupTest=org.apache.directory.fortress.core.group.GroupAntTest diff --git a/roles/fortress_module/files/module.xml b/roles/fortress_module/files/module.xml new file mode 100644 index 0000000000000000000000000000000000000000..6ad1d10a359fb42412d2c1bdcacf3d8173e0f20d --- /dev/null +++ b/roles/fortress_module/files/module.xml @@ -0,0 +1,6 @@ + + + + + + diff --git a/roles/fortress_module/tasks/main.yml b/roles/fortress_module/tasks/main.yml new file mode 100644 index 0000000000000000000000000000000000000000..ceb5f9c8a1d4185eb60b703a6c8855aa7545468e --- /dev/null +++ b/roles/fortress_module/tasks/main.yml @@ -0,0 +1,13 @@ +--- +# file: roles/fortress_module/tasks/main.yml + +- name: create the module directory + file: path=/opt/wildfly/modules/edu/psu/swe/api/main + owner={{ ansible_local.build_vars.wildfly.wildfly_user }} group={{ ansible_local.build_vars.wildfly.wildfly_group }} state=directory mode=0755 + +- name: copy the jboss cli scripts to the remote host's deployment directory + copy: src="{{ item }}" dest=/opt/wildfly/modules/edu/psu/swe/api/main + with_items: + - module.xml + - fortress.properties +