From a422b80018c23518728f333e74cba7c01432f129 Mon Sep 17 00:00:00 2001 From: Ramy Mostafa Date: Tue, 21 Jan 2014 02:16:11 +0200 Subject: [PATCH] Add support for Vagrant + Rails Automation Script #134 --- deploy/ubunto/Vagrantfile | 22 ++++++++ deploy/ubunto/pg_hba.conf | 99 ++++++++++++++++++++++++++++++++++++ deploy/ubunto/railsScript.sh | 67 ++++++++++++++++++++++++ 3 files changed, 188 insertions(+) create mode 100644 deploy/ubunto/Vagrantfile create mode 100644 deploy/ubunto/pg_hba.conf create mode 100644 deploy/ubunto/railsScript.sh diff --git a/deploy/ubunto/Vagrantfile b/deploy/ubunto/Vagrantfile new file mode 100644 index 00000000..8f1150fe --- /dev/null +++ b/deploy/ubunto/Vagrantfile @@ -0,0 +1,22 @@ +# -*- mode: ruby -*- +# vi: set ft=ruby : +#CrowdHoster Vagrant Configuration File +Vagrant.configure("2") do |config| + # Every Vagrant virtual environment requires a box to build off of. + config.vm.box = "precise32" + + # The url from where the 'config.vm.box' box will be fetched if it + # doesn't already exist on the user's system. + config.vm.box_url = "http://files.vagrantup.com/precise32.box" + + + # Create a forwarded port mapping which allows access to a specific port + # within the machine from a port on the host machine. In the example below, + # accessing "localhost:8080" will access port 80 on the guest machine. + # config.vm.network :forwarded_port, guest: 80, host: 8080 + config.vm.network :forwarded_port, guest: 5000, host: 5050 + config.vm.provision :shell, :path => "https://raw2.github.com/rmostafa/Crowdhoster/master/railsScript.sh" +config.vm.provider "virtualbox" do |v| + v.customize ["modifyvm", :id, "--memory", "2500"] +end +end \ No newline at end of file diff --git a/deploy/ubunto/pg_hba.conf b/deploy/ubunto/pg_hba.conf new file mode 100644 index 00000000..e2e88588 --- /dev/null +++ b/deploy/ubunto/pg_hba.conf @@ -0,0 +1,99 @@ +# PostgreSQL Client Authentication Configuration File +# =================================================== +# +# Refer to the "Client Authentication" section in the PostgreSQL +# documentation for a complete description of this file. A short +# synopsis follows. +# +# This file controls: which hosts are allowed to connect, how clients +# are authenticated, which PostgreSQL user names they can use, which +# databases they can access. Records take one of these forms: +# +# local DATABASE USER METHOD [OPTIONS] +# host DATABASE USER ADDRESS METHOD [OPTIONS] +# hostssl DATABASE USER ADDRESS METHOD [OPTIONS] +# hostnossl DATABASE USER ADDRESS METHOD [OPTIONS] +# +# (The uppercase items must be replaced by actual values.) +# +# The first field is the connection type: "local" is a Unix-domain +# socket, "host" is either a plain or SSL-encrypted TCP/IP socket, +# "hostssl" is an SSL-encrypted TCP/IP socket, and "hostnossl" is a +# plain TCP/IP socket. +# +# DATABASE can be "all", "sameuser", "samerole", "replication", a +# database name, or a comma-separated list thereof. The "all" +# keyword does not match "replication". Access to replication +# must be enabled in a separate record (see example below). +# +# USER can be "all", a user name, a group name prefixed with "+", or a +# comma-separated list thereof. In both the DATABASE and USER fields +# you can also write a file name prefixed with "@" to include names +# from a separate file. +# +# ADDRESS specifies the set of hosts the record matches. It can be a +# host name, or it is made up of an IP address and a CIDR mask that is +# an integer (between 0 and 32 (IPv4) or 128 (IPv6) inclusive) that +# specifies the number of significant bits in the mask. A host name +# that starts with a dot (.) matches a suffix of the actual host name. +# Alternatively, you can write an IP address and netmask in separate +# columns to specify the set of hosts. Instead of a CIDR-address, you +# can write "samehost" to match any of the server's own IP addresses, +# or "samenet" to match any address in any subnet that the server is +# directly connected to. +# +# METHOD can be "trust", "reject", "md5", "password", "gss", "sspi", +# "krb5", "ident", "peer", "pam", "ldap", "radius" or "cert". Note that +# "password" sends passwords in clear text; "md5" is preferred since +# it sends encrypted passwords. +# +# OPTIONS are a set of options for the authentication in the format +# NAME=VALUE. The available options depend on the different +# authentication methods -- refer to the "Client Authentication" +# section in the documentation for a list of which options are +# available for which authentication methods. +# +# Database and user names containing spaces, commas, quotes and other +# special characters must be quoted. Quoting one of the keywords +# "all", "sameuser", "samerole" or "replication" makes the name lose +# its special character, and just match a database or username with +# that name. +# +# This file is read on server startup and when the postmaster receives +# a SIGHUP signal. If you edit the file on a running system, you have +# to SIGHUP the postmaster for the changes to take effect. You can +# use "pg_ctl reload" to do that. + +# Put your actual configuration here +# ---------------------------------- +# +# If you want to allow non-local connections, you need to add more +# "host" records. In that case you will also need to make PostgreSQL +# listen on a non-local interface via the listen_addresses +# configuration parameter, or via the -i or -h command line switches. + + + + +# DO NOT DISABLE! +# If you change this first entry you will need to make sure that the +# database superuser can access the database using some other method. +# Noninteractive access to all databases is required during automatic +# maintenance (custom daily cronjobs, replication, and similar tasks). +# +# Database administrative login by Unix domain socket +local all postgres peer + +# TYPE DATABASE USER ADDRESS METHOD + +# "local" is for Unix domain socket connections only +local all all trust +# IPv4 local connections: +host all all 127.0.0.1/32 trust +# IPv6 local connections: +host all all ::1/128 trust +# Allow replication connections from localhost, by a user with the +# replication privilege. +#local replication postgres peer +#host replication postgres 127.0.0.1/32 md5 +#host replication postgres ::1/128 md5 diff --git a/deploy/ubunto/railsScript.sh b/deploy/ubunto/railsScript.sh new file mode 100644 index 00000000..0b9fb2b1 --- /dev/null +++ b/deploy/ubunto/railsScript.sh @@ -0,0 +1,67 @@ +#!/bin/bash +{ +clear +echo "This script requires superuser access to install apt packages." +echo "You will be prompted for your password by sudo." +CrowdHoster_CUser=$USER +CrowdHoster_PWD=$(pwd) +echo "switching from $CrowdHoster_CUser to root" +# clear any previous sudo permission +sudo -k +# run inside sudo +sudo bash <