Skip to content
Snippets Groups Projects
Select Git revision
  • 170f697d4da08ad455105fd8309dac6e18c6f53b
  • master default protected
  • devel
  • hruska-feature-clients-api
  • malostik-#5066-deduplicate-idea-ids
  • warden-postgresql-port
  • hruska-feature-#6799-filter-keys
  • hruska-feature-5066-duplicateIdeaID
  • warden-client-3.0-beta3
  • warden-server-3.0-beta3
  • warden-client-2.2-final
  • warden-server-2.2-final
  • warden-client-3.0-beta2
  • warden-server-3.0-beta2
  • warden-client-2.2
  • warden-server-2.2-patch3
  • warden-client-3.0-beta1
  • warden-server-3.0-beta1
  • warden-server-2.2-patch1
  • warden-client-3.0-beta0
  • warden-server-3.0-beta0
  • warden-server-2.2
  • warden-server-2.1-patch1
  • warden-client-2.1
  • warden-server-2.1
  • warden-server-2.1-beta6
  • warden-server-2.1-beta5
  • warden-server-2.1-beta4
28 results

warden-archive

  • Clone with SSH
  • Clone with HTTPS
  • EOSC Notebooks

    This directory has all the files to get started with a new deployment of EOSC Notebooks.

    Admin Environment Setup

    Hashicorp Vault

    Prepare environment for interrating with Hashicorp Vault:

    export VAULT_ADDR=https://secrets.egi.eu

    Login:

    # optional (values from environment)
    # read CLIENT_ID CLIENT_SECRET
    # export CLIENT_ID CLIENT_SECRET
    
    # login to vault
    ./vault-login.py

    Note: example commands to create secrets for "eosc-dev":

    prefix=/users/e1662e20-e34b-468c-b0ce-d899bc878364@egi.eu/eosc-dev
    vault kv put -mount secrets $prefix/FEDCLOUD_DYNAMIC_DNS $HOST1=$SECRET1 $HOST2=$SECRET2
    vault kv put -mount secrets $prefix/deployment-hub checkin_host=... client_id=... client_secret=...

    Inventory parameters

    Used parameters in ansible recipes:

    • mail_fromdomain: hostname in from header
    • mail_local: disable e-mail (only local delivery)
    • site_name: site identifier
    • vault_mount_point:: path to secrets in the Vault