Child pages
  • Upgrade to OpenTUSK 5.0

Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  • Git clone  OpenTUSK 5.0 from github into /usr/local/tusk as either root user or a user with sudo privilege.   We will change ownerships to tusk user in the 'create_system_account' script.
Code Block
> sudo -u <your-userid> mkdir -p /usr/local/tusk/conf    ### We create both tusk and tusk/conf directories as yourself
> cd /usr/local/tusk
> sudo git clone git://github.com/opentusk/opentusk.git opentusk

...

  • Git clone  tusk, apache, shibboleth configurations into "/usr/local/tusk/conf" directory  if you have "conf" repository.   Otherwise, copy them from the old server.
Code Block
> cd /etc/httpd/conf.d/
> sudo mv ssl.conf ssl.conf.orig
> sudo ln -s /usr/local/tusk/conf/etc/httpd/conf.d/ssl.conf .
> sudo ln -s /usr/local/tusk/conf/etc/httpd/conf.d/tusk_base.conf .
> sudo ln -s /usr/local/tusk/conf/etc/httpd/conf.d/tusk_http.conf .
> sudo ln -s /usr/local/tusk/conf/etc/httpd/conf.d/tusk_https.conf .
> sudo ln -s /usr/local/tusk/conf/etc/httpd/conf.d/tusk_logging.conf .git clone your-git-conf-repo:opentusk/conf.git conf


  • Symbolic link the cloned directory to current  and setup install setttings in a YML file

Code Block
> cd /usr/local/tusk
> ln -s onentusk current
> cd current/install
> cp templates/conf/tusk/tusk_install.yml  /usr/local/tusk/conf/tusk_install.yml
> Modify conf/tusk_install.yml  appropriately.  This will be used for installation setup
> cd centos
> ln -s /usr/local/tusk/conf/tusk_install.yml
.


  • Run install script.  This will create tusk/apache users if not yet created, install required yum packages and install Perl/CPAN modules.  The Perl/CPAN installation takes some time but be careful to enter your passwords a few times correctly.

...

  • Create data directories IF you need data/content directories  directories  (Optional)
Code Block
../scripts/create_directories

...

  • Create SSL certificates  IF you need to generate ones.  Be sure to put some info including domain, country, state, etc in install_tusk.ymlyml  (Optional)
Code Block
./create_ssl_cert

...

  • Install shib IF you use Shibboleth authentication (Optional)
Code Block
> ./install_shib

## if your shib settings are in /usr/local/tusk/conf/etc/shibboleth
>  cd /etc/shibboleth

##  Remove or rename these files before soft linking them to /etc/shibboleth directory.
> sudo ln -s /usr/local/tusk/conf/etc/shibboleth/attribute-map.xml .
> sudo ln -s /usr/local/tusk/conf/etc/shibboleth/shibboleth2.xml .
> sudo ln -s /usr/local/tusk/conf/etc/shibboleth/tusk-idp.xml .
> sudo ln -s /usr/local/tusk/conf/etc/shibboleth/tuskLogout.html .

## start shib
> sudo systemctl start shibd.service

## troubleshooting
> shibd -t    ## find any shib errors
> LD_LIBRARY_PATH=/opt/shibboleth/lib64 shibd -t   ## get a critical message about libcurl
### error messages are in /var/log/shibboleth/shibd.log 



  • Setup Apache configurations
Code Block
> cd /etc/httpd/conf.d/
> sudo mv ssl.conf ssl.conf.orig
> sudo ln -s /usr/local/tusk/conf/etc/httpd/conf.d/ssl.conf .
> sudo ln -s /usr/local/tusk/conf/etc/httpd/conf.d/tusk_base.conf .
> sudo ln -s /usr/local/tusk/conf/etc/httpd/conf.d/tusk_http.conf .
> sudo ln -s /usr/local/tusk/conf/etc/httpd/conf.d/tusk_https.conf .
> sudo ln -s /usr/local/tusk/conf/etc/httpd/conf.d/tusk_logging.conf .