Commit 0a14a69ed49fa0ec739078a69db208cde2d7abc2
1 parent
508d4866
Exists in
master
and in
17 other branches
Remove more stuff we do not need right now
Showing
2 changed files
with
3 additions
and
122 deletions
Show diff stats
files/gitlab-cookbooks/gitlab/libraries/chef_server.rb
| ... | ... | @@ -24,13 +24,8 @@ require 'securerandom' |
| 24 | 24 | module ChefServer |
| 25 | 25 | extend(Mixlib::Config) |
| 26 | 26 | |
| 27 | - chef_server_webui Mash.new | |
| 28 | - lb Mash.new | |
| 29 | 27 | postgresql Mash.new |
| 30 | - bootstrap Mash.new | |
| 31 | - nginx Mash.new | |
| 32 | 28 | node nil |
| 33 | - notification_email nil | |
| 34 | 29 | |
| 35 | 30 | class << self |
| 36 | 31 | |
| ... | ... | @@ -58,9 +53,6 @@ module ChefServer |
| 58 | 53 | File.open("/etc/chef-server/chef-server-secrets.json", "w") do |f| |
| 59 | 54 | f.puts( |
| 60 | 55 | Chef::JSONCompat.to_json_pretty({ |
| 61 | - 'chef_server_webui' => { | |
| 62 | - 'cookie_secret' => ChefServer['chef_server_webui']['cookie_secret'], | |
| 63 | - }, | |
| 64 | 56 | 'postgresql' => { |
| 65 | 57 | 'sql_password' => ChefServer['postgresql']['sql_password'], |
| 66 | 58 | 'sql_ro_password' => ChefServer['postgresql']['sql_ro_password'] |
| ... | ... | @@ -75,16 +67,11 @@ module ChefServer |
| 75 | 67 | def generate_hash |
| 76 | 68 | results = { "chef_server" => {} } |
| 77 | 69 | [ |
| 78 | - "chef_server_webui", | |
| 79 | - "lb", | |
| 80 | - "postgresql", | |
| 81 | - "nginx", | |
| 82 | - "bootstrap" | |
| 70 | + "postgresql" | |
| 83 | 71 | ].each do |key| |
| 84 | 72 | rkey = key.gsub('_', '-') |
| 85 | 73 | results['chef_server'][rkey] = ChefServer[key] |
| 86 | 74 | end |
| 87 | - results['chef_server']['notification_email'] = ChefServer['notification_email'] | |
| 88 | 75 | |
| 89 | 76 | results |
| 90 | 77 | end | ... | ... |
files/gitlab-cookbooks/gitlab/libraries/helper.rb
| ... | ... | @@ -76,119 +76,13 @@ end |
| 76 | 76 | class OmnibusHelper |
| 77 | 77 | |
| 78 | 78 | def self.should_notify?(service_name) |
| 79 | - File.symlink?("/opt/chef-server/service/#{service_name}") && service_up?(service_name) | |
| 79 | + File.symlink?("/opt/gitlab/service/#{service_name}") && service_up?(service_name) | |
| 80 | 80 | end |
| 81 | 81 | |
| 82 | 82 | def self.service_up?(service_name) |
| 83 | - o = Mixlib::ShellOut.new("/opt/chef-server/bin/chef-server-ctl status #{service_name}") | |
| 83 | + o = Mixlib::ShellOut.new("/opt/gitlab/bin/gitlab-ctl status #{service_name}") | |
| 84 | 84 | o.run_command |
| 85 | 85 | o.exitstatus == 0 |
| 86 | 86 | end |
| 87 | 87 | |
| 88 | - # generate a certificate signed by the opscode ca key | |
| 89 | - # | |
| 90 | - # === Returns | |
| 91 | - # [cert, key] | |
| 92 | - # | |
| 93 | - def self.gen_certificate | |
| 94 | - key = OpenSSL::PKey::RSA.generate(2048) | |
| 95 | - public_key = key.public_key | |
| 96 | - cert_uuid = UUIDTools::UUID.random_create | |
| 97 | - common_name = "URI:http://opscode.com/GUIDS/#{cert_uuid}" | |
| 98 | - info = [["C", "US"], ["ST", "Washington"], ["L", "Seattle"], ["O", "Opscode, Inc."], ["OU", "Certificate Service"], ["CN", common_name]] | |
| 99 | - cert = OpenSSL::X509::Certificate.new | |
| 100 | - cert.subject = OpenSSL::X509::Name.new(info) | |
| 101 | - cert.issuer = ca_certificate.subject | |
| 102 | - cert.not_before = Time.now | |
| 103 | - cert.not_after = Time.now + 10 * 365 * 24 * 60 * 60 # 10 years | |
| 104 | - cert.public_key = public_key | |
| 105 | - cert.serial = 1 | |
| 106 | - cert.version = 3 | |
| 107 | - | |
| 108 | - ef = OpenSSL::X509::ExtensionFactory.new | |
| 109 | - ef.subject_certificate = cert | |
| 110 | - ef.issuer_certificate = ca_certificate | |
| 111 | - cert.extensions = [ | |
| 112 | - ef.create_extension("basicConstraints","CA:FALSE",true), | |
| 113 | - ef.create_extension("subjectKeyIdentifier", "hash") | |
| 114 | - ] | |
| 115 | - cert.sign(ca_keypair, OpenSSL::Digest::SHA1.new) | |
| 116 | - | |
| 117 | - return cert, key | |
| 118 | - end | |
| 119 | - | |
| 120 | - ###################################################################### | |
| 121 | - # | |
| 122 | - # the following is the Opscode CA key and certificate, copied from | |
| 123 | - # the cert project(s) | |
| 124 | - # | |
| 125 | - ###################################################################### | |
| 126 | - | |
| 127 | - def self.ca_certificate | |
| 128 | - @_ca_cert ||= | |
| 129 | - begin | |
| 130 | - cert_string = <<-EOCERT | |
| 131 | ------BEGIN CERTIFICATE----- | |
| 132 | -MIIDyDCCAzGgAwIBAwIBATANBgkqhkiG9w0BAQUFADCBnjELMAkGA1UEBhMCVVMx | |
| 133 | -EzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxFjAUBgNVBAoM | |
| 134 | -DU9wc2NvZGUsIEluYy4xHDAaBgNVBAsME0NlcnRpZmljYXRlIFNlcnZpY2UxMjAw | |
| 135 | -BgNVBAMMKW9wc2NvZGUuY29tL2VtYWlsQWRkcmVzcz1hdXRoQG9wc2NvZGUuY29t | |
| 136 | -MB4XDTA5MDUwNjIzMDEzNVoXDTE5MDUwNDIzMDEzNVowgZ4xCzAJBgNVBAYTAlVT | |
| 137 | -MRMwEQYDVQQIDApXYXNoaW5ndG9uMRAwDgYDVQQHDAdTZWF0dGxlMRYwFAYDVQQK | |
| 138 | -DA1PcHNjb2RlLCBJbmMuMRwwGgYDVQQLDBNDZXJ0aWZpY2F0ZSBTZXJ2aWNlMTIw | |
| 139 | -MAYDVQQDDClvcHNjb2RlLmNvbS9lbWFpbEFkZHJlc3M9YXV0aEBvcHNjb2RlLmNv | |
| 140 | -bTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAlKTCZPmifZe9ruxlQpWRj+yx | |
| 141 | -Mxt6+omH44jSfj4Obrnmm5eqVhRwjSfHOq383IeilFrNqC5VkiZrlLh8uhuTeaCy | |
| 142 | -PE1eED7DZOmwuswTui49DqXiVE39jB6TnzZ3mr6HOPHXtPhSzdtILo18RMmgyfm/ | |
| 143 | -csrwct1B3GuQ9LSVMXkCAwEAAaOCARIwggEOMA8GA1UdEwEB/wQFMAMBAf8wHQYD | |
| 144 | -VR0OBBYEFJ228MdlU86GfVLsQx8rleAeM+eLMA4GA1UdDwEB/wQEAwIBBjCBywYD | |
| 145 | -VR0jBIHDMIHAgBSdtvDHZVPOhn1S7EMfK5XgHjPni6GBpKSBoTCBnjELMAkGA1UE | |
| 146 | -BhMCVVMxEzARBgNVBAgMCldhc2hpbmd0b24xEDAOBgNVBAcMB1NlYXR0bGUxFjAU | |
| 147 | -BgNVBAoMDU9wc2NvZGUsIEluYy4xHDAaBgNVBAsME0NlcnRpZmljYXRlIFNlcnZp | |
| 148 | -Y2UxMjAwBgNVBAMMKW9wc2NvZGUuY29tL2VtYWlsQWRkcmVzcz1hdXRoQG9wc2Nv | |
| 149 | -ZGUuY29tggEBMA0GCSqGSIb3DQEBBQUAA4GBAHJxAnwTt/liAMfZf5Khg7Mck4f+ | |
| 150 | -IkO3rjoI23XNbVHlctTOieSwzRZtBRdNOTzQvzzhh1KKpl3Rt04rrRPQvDeO/Usm | |
| 151 | -pVr6g+lk2hhDgKKeR4J7qXZmlemZTrFZoobdoijDaOT5NuqkGt5ANdTqzRwbC9zQ | |
| 152 | -t6vXSWGCFoo4AEic | |
| 153 | ------END CERTIFICATE----- | |
| 154 | -EOCERT | |
| 155 | - OpenSSL::X509::Certificate.new(cert_string) | |
| 156 | - end | |
| 157 | - end | |
| 158 | - | |
| 159 | - def self.ca_keypair | |
| 160 | - @_ca_key ||= | |
| 161 | - begin | |
| 162 | - keypair_string = <<-EOKEY | |
| 163 | ------BEGIN RSA PRIVATE KEY----- | |
| 164 | -MIICWwIBAAKBgQCUpMJk+aJ9l72u7GVClZGP7LEzG3r6iYfjiNJ+Pg5uueabl6pW | |
| 165 | -FHCNJ8c6rfzch6KUWs2oLlWSJmuUuHy6G5N5oLI8TV4QPsNk6bC6zBO6Lj0OpeJU | |
| 166 | -Tf2MHpOfNneavoc48de0+FLN20gujXxEyaDJ+b9yyvBy3UHca5D0tJUxeQIDAQAB | |
| 167 | -AoGAYAPRIeJyiIfk2cIPYqQ0g3BTwfyFQqJl6Z7uwOca8YEZqfWc7L+FOFiyg3/x | |
| 168 | -rw3aAdRptbJASgiRQ16sCpdXeaRFY5gcO2MnqmCyoyp2//zhdFReSC+Akim1UPtG | |
| 169 | -5SqqdV9I0TBl+1JlMiivn677mXGij+qyQjSWxW2pGVsbTSUCQQDDLb/DgoD0+N6O | |
| 170 | -FIoJ/Mh5cgIxQhqXu/dylEv/I3goSJdXPAqhsnsa6zYQGdftnvMK1ZXS/hYL4i06 | |
| 171 | -w9lKDV8PAkEAwvaz1oUtXLNfYYAF42c1BoBhqCzjXSzMWPu5BlWQzSsdzgVgDuX3 | |
| 172 | -LlkiIdRtMcMaNskaBTtIClCxaEm3rUnm9wJAEOp2JEu7QYAQSeAd1p/CAESRTBOe | |
| 173 | -mmgAGj4gGAzK7TLdawIZKcp+QOcB2INk44NTLS01vwOmhYEkymMPAgwGoQJAKimq | |
| 174 | -GMFyXvLXtME4BMbEG+TVucYDYZoXk0LU776/cu9ZIb3d2Tr4asiR7hj/iFx2JdT1 | |
| 175 | -0J3SZZCv3SrcExjBXwJABS3/iQroe24tvrmyy4tc5YG5ygIRaBUCs6dn0fbisX/9 | |
| 176 | -K1oq5Lnwimy4l2NI0o/lxIqnwFilACjs3tuXH1OhMA== | |
| 177 | ------END RSA PRIVATE KEY----- | |
| 178 | -EOKEY | |
| 179 | - OpenSSL::PKey::RSA.new(keypair_string) | |
| 180 | - end | |
| 181 | - end | |
| 182 | - | |
| 183 | - def self.erl_atom_or_string(term) | |
| 184 | - case term | |
| 185 | - when Symbol | |
| 186 | - term | |
| 187 | - when String | |
| 188 | - "\"#{term}\"" | |
| 189 | - else | |
| 190 | - "undefined" | |
| 191 | - end | |
| 192 | - end | |
| 193 | 88 | end |
| 194 | - | ... | ... |