Instructions for configuring EventQ to run behind TeamForge's
web server.
To provide a seamless experience for users, the EventQ HTTP(S) service is proxied through
TeamForge by default as of
TeamForge
version 8.1, meaning end users access EventQ using the TeamForge hostname
and port. This proxy configuration must be set up manually for those upgrading from EventQ
versions 1.4.1 or earlier. This document provides step-by-step instructions for configuring
the proxy. Failure to configure the proxy will interfere with functionality and is therefore
a required part of the upgrade process.
Assumptions - for purposes of this guide, assume the following:
- An existing TeamForge host using SSL named ctf.example.com
- An existing EventQ host using SSL named eventq.example.com
- All hosts have been upgraded to the target version (e.g. 16.7), see Upgrade EventQ
- All hosts are running SSL services on port 443
- Firewall permits traffic on port 443 between TeamForge and EventQ hosts
- Hosts have existing certificate files
- Certificate files are signed by "legitimate" CAs
- Hosts are otherwise using their 'standard' production installs (e.g., EventQ installs
nginx configs in /opt/collabnet/nginx/conf/collabnet-nginx.conf, TeamForge uses
/opt/collabnet, etc.)
- The user has sudo or equivalent access on both TeamForge and EventQ hosts
Prepare TeamForge (without certificate
validation)
-
Configure TeamForge site-options. Comment out the
ORC_SSL_CA_CERT_FILE token in the TeamForge host's
site-options.conf file if you are not enabling certificate
validation between EventQ and TeamForge.
Supply the following values to the TeamForge host's
site-options.conf (whichever file your host is using as the
source of its site options):
ORCHESTRATE_ENABLED=true
ORC_PROXIED_PATH=/orc
ORC_PORT=443
ORC_HOSTNAME=eventq.example.com
ORC_PROTOCOL=https
#ORC_SSL_CA_CERT_FILE
-
Re-create TeamForge runtime
Prepare TeamForge (with certificate validation)
-
Locate or create CA certificate files
If the TeamForge host does not already have a root CA bundle which can validate
EventQ's certificate, create or download such a file. Options include:
- For certificates that are signed by a common CA, this may already be installed by
the yum package 'ca-certificates';
- Obtain from a common source, such as
https://raw.githubusercontent.com/bagder/ca-bundle/master/ca-bundle.crt;
- If the certificate is self-signed, this file is likely the certificate
itself;
- Otherwise, this file can be created by concatenating the certificates of the CA
that signed EventQ's certificate, along with the certificates of all intermediary
signing CAs.
See
http://httpd.apache.org/docs/2.4/mod/mod_ssl.html#sslproxycacertificatefile for
more info on precisely what the root CA certificate file is expected to contain.
If the CA bundle file is not already available/accessible on the TeamForge host, copy
it to a suitable location on the TeamForge host, e.g.,
/var/ops/ssl/ca-bundle.crt.
-
Test the CA certicate file
The following is a simple command line sanity check, run from the TeamForge server.
[root@ctf.example.com]$ echo |openssl s_client -connect orc.example.com:443
-CAfile /var/ops/ssl/ca-bundle.crt > /dev/null depth=2 /C=US/O=GeoTrust
Inc./CN=GeoTrust Global CA verify return:1 depth=1 /C=US/O=GeoTrust, Inc./CN=RapidSSL
CA verify return:1 depth=0
/serialNumber=sXupsaptbZJc4PUuawYNAYey2fPMfuXA/OU=GT99362291/OU=See
www.rapidssl.com/resources/cps (c)14/OU=Domain Control Validated -
RapidSSL(R)/CN=*.example.com verify return:1 DONE
You are looking for the presence of verify return:1 in each step
of the certificate validation chain. If the certificate was unable to be validated you
may instead see:
[root@ctf.example.com]$ echo |openssl s_client -connect orc.example.com:443
-CAfile /var/ops/ssl/ca-bundle.crt > /dev/null verify error:num=20:unable to get local
issuer certificate verify return:0
-
Configure TeamForge site-options
Supply the following values to the TeamForge host's
site-options.conf (whichever file your host is using as the
source of its site options):
ORCHESTRATE_ENABLED=true
ORC_PROXIED_PATH=/orc
ORC_PORT=443
ORC_HOSTNAME=eventq.example.com
ORC_PROTOCOL=https
ORC_SSL_CA_CERT_FILE=/var/ops/ssl/ca-bundle.crt
-
Re-create TeamForge runtime
Prepare EventQ
-
Edit EventQ's nginx configuration
Edit /opt/collabnet/nginx/conf/collabnet-nginx.conf to have the
following (omitting the non-relevant bits):
...
server {
listen 443;
server_name eventq.example.com;
...
# Redirect root to /orc
location / {
rewrite ^ https://eventq.example.com:443/orc$request_uri? permanent;
}
}
...
# This provides a HTTP->HTTPS redirect for eventq
server {
listen 80;
server_name eventq.example.com;
...
# redirect 80 to 443
location / {
rewrite ^ https://eventq.example.com:443$request_uri? permanent;
}
}
passenger_pre_start https://eventq.example.com:80/orc/;
passenger_pre_start https://eventq.example.com:443/orc/;
...
-
Test nginx configuration
Test the edited configuration before restarting. The example below assumes a user
eventq with sudo access:
[eventq@eventq.example.com]# sudo /opt/collabnet/nginx/sbin/nginx -c
/opt/collabnet/nginx/conf/collabnet-nginx.conf -t nginx: the configuration file
/opt/collabnet/nginx/conf/collabnet-nginx.conf syntax is ok nginx: configuration file
/opt/collabnet/nginx/conf/collabnet-nginx.conf test is successful
-
Edit EventQ's defaults.yml
Edit EventQ's /opt/collabnet/eventq/config/defaults.yml to ensure
that the teamforge.production.server and
teamforge.production.iaf.orc_url have the correct proxied URLs
(omitting irrelevant bits):
...
teamforge:
production:
server: https://ctf.example.com
iaf:
...
orc_url: https://ctf.example.com/orc
...
-
Restart nginx
[eventq@eventq.example.com]#sudo service collabnet-nginx
restart
Update TeamForge's IAF settings
-
Update the existing IAF and Site-wide linked app
This assumes that the EventQ service runs under the user eventq on the eventq host, and
can bring up a rails console (hence use of sudo, and the console invocation). Use that
user to bring up a console, and manually call
CtfConfigurer.new.edit_iaf_application:
[eventq@eventq.example.com]#cd /opt/collabnet/eventq sudo su - eventq bundle
exec rails c production rb(main):003:0> CtfConfigurer.new.edit_iaf_application =>
{:set_integrated_application_icon_response=>nil}
-
Update existing Site-wide linked app
This step requires login to the TeamForge web application
-
In TeamForge, as a site-admin navigate to: .
-
Click the EventQ application to edit.
-
Edit the URL to the one being proxied
e.g., https://ctf.example.com/orc/users/auth/teamforge/callback
-
Save edits