feat(consul): start creation of agents token, merge it with primary config if already present
This commit is contained in:
parent
ef24cee9df
commit
d9ff21db6f
@ -18,10 +18,6 @@
|
|||||||
ansible.builtin.debug:
|
ansible.builtin.debug:
|
||||||
msg: "{{ hashi_vault_configuration }}"
|
msg: "{{ hashi_vault_configuration }}"
|
||||||
|
|
||||||
- name: "Debug"
|
|
||||||
ansible.builtin.debug:
|
|
||||||
msg: "{{ hashi_consul_configuration }}"
|
|
||||||
|
|
||||||
# - ansible.builtin.fail:
|
# - ansible.builtin.fail:
|
||||||
|
|
||||||
- name: "Consul"
|
- name: "Consul"
|
||||||
@ -35,22 +31,39 @@
|
|||||||
ansible.builtin.include_role:
|
ansible.builtin.include_role:
|
||||||
name: ednz_cloud.hashistack.hashicorp_consul
|
name: ednz_cloud.hashistack.hashicorp_consul
|
||||||
|
|
||||||
|
- name: "Wait for consul cluster to initialize" # noqa: run-once[task]
|
||||||
|
ansible.builtin.wait_for:
|
||||||
|
timeout: 15
|
||||||
|
delegate_to: localhost
|
||||||
|
run_once: true
|
||||||
|
|
||||||
- name: "Initialize consul cluster" # noqa: run-once[task]
|
- name: "Initialize consul cluster" # noqa: run-once[task]
|
||||||
ednz_cloud.hashistack.consul_acl_bootstrap:
|
community.general.consul_acl_bootstrap:
|
||||||
api_addr: "{{ hashi_consul_configuration['advertise_addr'] }}"
|
host: "{{ hashi_consul_configuration['advertise_addr'] }}"
|
||||||
|
port: 8500
|
||||||
|
scheme: http
|
||||||
|
state: present
|
||||||
run_once: true
|
run_once: true
|
||||||
delegate_to: "{{ groups['consul_servers'] | first }}"
|
delegate_to: "{{ groups['consul_servers'] | first }}"
|
||||||
retries: 5
|
# retries: 5
|
||||||
delay: 5
|
# delay: 5
|
||||||
register: _consul_init_secret
|
register: _consul_init_secret
|
||||||
until: not _consul_init_secret.failed
|
# until: _consul_init_secret.result is defined
|
||||||
|
when: hashi_consul_configuration.acl.enabled
|
||||||
|
|
||||||
- name: "Write consul configuration to file" # noqa: run-once[task] no-handler
|
- name: "Write consul configuration to file" # noqa: run-once[task] no-handler
|
||||||
ansible.builtin.copy:
|
ansible.builtin.copy:
|
||||||
content: "{{ _consul_init_secret.state | to_nice_yaml}}"
|
content: "{{
|
||||||
|
{
|
||||||
|
'root_token':{
|
||||||
|
'accessor_id': _consul_init_secret.result.AccessorID,
|
||||||
|
'secret_id': _consul_init_secret.result.SecretID
|
||||||
|
}
|
||||||
|
} | to_nice_yaml
|
||||||
|
}}"
|
||||||
dest: "{{ sub_configuration_directories.consul_servers }}/consul_config"
|
dest: "{{ sub_configuration_directories.consul_servers }}/consul_config"
|
||||||
mode: '0644'
|
mode: '0644'
|
||||||
when: _consul_init_secret.changed
|
when: _consul_init_secret.result is defined
|
||||||
run_once: true
|
run_once: true
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
|
|
||||||
@ -59,6 +72,54 @@
|
|||||||
file: "{{ sub_configuration_directories.consul_servers }}/consul_config"
|
file: "{{ sub_configuration_directories.consul_servers }}/consul_config"
|
||||||
name: _consul_cluster_config
|
name: _consul_cluster_config
|
||||||
|
|
||||||
|
- name: "Create consul agents token" # noqa: run-once[task] no-handler
|
||||||
|
# when:
|
||||||
|
# - _consul_init_secret.changed
|
||||||
|
# - consul_acl_configuration.enabled
|
||||||
|
run_once: true
|
||||||
|
delegate_to: localhost
|
||||||
|
block:
|
||||||
|
- name: "Create consul agent policy"
|
||||||
|
community.general.consul_policy:
|
||||||
|
host: "{{ hashi_consul_configuration['advertise_addr'] }}"
|
||||||
|
token: "{{ _consul_cluster_config.root_token.secret_id }}"
|
||||||
|
port: 8500
|
||||||
|
scheme: http
|
||||||
|
state: present
|
||||||
|
name: agents-policy
|
||||||
|
rules: "{{ consul_default_agent_policy }}"
|
||||||
|
register: _consul_agent_policy
|
||||||
|
|
||||||
|
- name: "Debug Policy"
|
||||||
|
ansible.builtin.debug:
|
||||||
|
msg: "{{ _consul_agent_policy }}"
|
||||||
|
|
||||||
|
# - fail:
|
||||||
|
|
||||||
|
- name: "Create consul agents token"
|
||||||
|
community.general.consul_token:
|
||||||
|
host: "localhost" # "{{ hashi_consul_configuration['advertise_addr'] }}"
|
||||||
|
token: "{{ _consul_cluster_config.root_token.secret_id }}"
|
||||||
|
port: 8500
|
||||||
|
scheme: http
|
||||||
|
state: present
|
||||||
|
local: true
|
||||||
|
policies:
|
||||||
|
- id: _consul_agent_policy.policy.ID
|
||||||
|
register: _consul_agent_token
|
||||||
|
|
||||||
|
- name: "Write consul agents token to file" # no-handler
|
||||||
|
ansible.builtin.copy:
|
||||||
|
content: "{{
|
||||||
|
{
|
||||||
|
'tokens':{
|
||||||
|
'agent': _consul_agent_token.token.SecretID
|
||||||
|
}
|
||||||
|
} | to_nice_yaml
|
||||||
|
}}"
|
||||||
|
dest: "{{ sub_configuration_directories.consul_servers }}/consul_config"
|
||||||
|
mode: '0644'
|
||||||
|
when: _consul_agent_token.changed
|
||||||
|
|
||||||
- name: "Vault"
|
- name: "Vault"
|
||||||
when:
|
when:
|
||||||
|
@ -67,9 +67,103 @@ vault_required_ports: [8200, 8201]
|
|||||||
consul_required_ports: [8300, 8301, 8302, 8500, 8501, 8502, 8503, 8600]
|
consul_required_ports: [8300, 8301, 8302, 8500, 8501, 8502, 8503, 8600]
|
||||||
nomad_required_ports: []
|
nomad_required_ports: []
|
||||||
|
|
||||||
##########################
|
#####################################################
|
||||||
# Nomad options ##########
|
# #
|
||||||
##########################
|
# HAProxy Configuration #
|
||||||
|
# #
|
||||||
|
#####################################################
|
||||||
|
|
||||||
|
deploy_haproxy_deploy_method: host # deployment method, either host or docker
|
||||||
|
deploy_haproxy_version: "2.8"
|
||||||
|
|
||||||
|
deploy_haproxy_env_variables: {}
|
||||||
|
deploy_haproxy_start_service: true
|
||||||
|
deploy_haproxy_cert_dir: ""
|
||||||
|
deploy_haproxy_extra_container_volumes: []
|
||||||
|
deploy_haproxy_global:
|
||||||
|
- log /dev/log local0
|
||||||
|
- log /dev/log local1 notice
|
||||||
|
- stats socket {{ deploy_haproxy_socket }} level admin
|
||||||
|
- chroot {{ deploy_haproxy_chroot }}
|
||||||
|
- daemon
|
||||||
|
- description hashistack haproxy
|
||||||
|
|
||||||
|
deploy_haproxy_defaults:
|
||||||
|
- log global
|
||||||
|
- mode http
|
||||||
|
- option httplog
|
||||||
|
- option dontlognull
|
||||||
|
- timeout connect 5000
|
||||||
|
- timeout client 5000
|
||||||
|
- timeout server 5000
|
||||||
|
|
||||||
|
deploy_haproxy_frontends:
|
||||||
|
[]
|
||||||
|
# - name: default
|
||||||
|
# options:
|
||||||
|
# - description default frontend
|
||||||
|
# - mode http
|
||||||
|
# - bind :80
|
||||||
|
# - default_backend default
|
||||||
|
|
||||||
|
deploy_haproxy_backends:
|
||||||
|
[]
|
||||||
|
# - name: default
|
||||||
|
# options:
|
||||||
|
# - description default backend
|
||||||
|
# - option forwardfor
|
||||||
|
# - option httpchk
|
||||||
|
# - http-check send meth GET uri /
|
||||||
|
# - server srv_nginx1 172.17.0.4:80 check inter 5s
|
||||||
|
# - server srv_nginx2 172.17.0.3:80 check inter 5s
|
||||||
|
|
||||||
|
deploy_haproxy_listen:
|
||||||
|
- name: monitoring
|
||||||
|
options:
|
||||||
|
- bind :9000
|
||||||
|
- mode http
|
||||||
|
- option httpchk
|
||||||
|
- stats enable
|
||||||
|
- stats uri /stats
|
||||||
|
- stats refresh 30s
|
||||||
|
- stats show-desc
|
||||||
|
- stats show-legends
|
||||||
|
- stats auth admin:password
|
||||||
|
- http-check send meth GET uri /health ver HTTP/1.1 hdr Host localhost
|
||||||
|
- http-check expect status 200
|
||||||
|
- acl health_check_ok nbsrv() ge 1
|
||||||
|
- monitor-uri /health
|
||||||
|
- http-request use-service prometheus-exporter if { path /metrics }
|
||||||
|
|
||||||
|
deploy_keepalived_deploy_method: "host"
|
||||||
|
deploy_keepalived_version: "latest"
|
||||||
|
deploy_keepalived_start_service: true
|
||||||
|
deploy_keepalived_env_variables: {}
|
||||||
|
|
||||||
|
deploy_keepalived_vrrp_instance_name: "{{ ansible_hostname }}"
|
||||||
|
deploy_keepalived_interface: "{{ ansible_default_ipv4.interface }}"
|
||||||
|
deploy_keepalived_state: "BACKUP"
|
||||||
|
deploy_keepalived_router_id: 50
|
||||||
|
deploy_keepalived_priority: 100
|
||||||
|
deploy_keepalived_advert_interval: 1
|
||||||
|
deploy_keepalived_unicast_source: "{{ ansible_default_ipv4.address }}"
|
||||||
|
deploy_keepalived_unicast_peers: []
|
||||||
|
deploy_keepalived_auth_passwd: "password"
|
||||||
|
deploy_keepalived_virtual_ips:
|
||||||
|
- 192.168.1.100/32
|
||||||
|
deploy_keepalived_notify_script: notify.sh
|
||||||
|
|
||||||
|
deploy_keepalived_custom_scripts_src:
|
||||||
|
deploy_keepalived_extra_container_volumes: []
|
||||||
|
|
||||||
|
deploy_keepalived_use_custom_config: false
|
||||||
|
deploy_keepalived_custom_config_src:
|
||||||
|
|
||||||
|
#####################################################
|
||||||
|
# #
|
||||||
|
# Nomad Configuration #
|
||||||
|
# #
|
||||||
|
#####################################################
|
||||||
|
|
||||||
hashi_nomad_cni_plugins_install: true
|
hashi_nomad_cni_plugins_install: true
|
||||||
hashi_nomad_start_service: true
|
hashi_nomad_start_service: true
|
||||||
@ -84,9 +178,11 @@ hashi_nomad_extra_files_src: /tmp/extra_files
|
|||||||
hashi_nomad_extra_files_dst: /etc/nomad.d/extra_files
|
hashi_nomad_extra_files_dst: /etc/nomad.d/extra_files
|
||||||
hashi_nomad_configuration: {}
|
hashi_nomad_configuration: {}
|
||||||
|
|
||||||
##########################
|
#####################################################
|
||||||
# Consul options #########
|
# #
|
||||||
##########################
|
# Consul Configuration #
|
||||||
|
# #
|
||||||
|
#####################################################
|
||||||
|
|
||||||
consul_domain: consul
|
consul_domain: consul
|
||||||
consul_datacenter: dc1
|
consul_datacenter: dc1
|
||||||
@ -117,6 +213,17 @@ consul_acl_configuration:
|
|||||||
default_policy: "deny" # can be allow or deny
|
default_policy: "deny" # can be allow or deny
|
||||||
enable_token_persistence: true
|
enable_token_persistence: true
|
||||||
|
|
||||||
|
consul_default_agent_policy: |
|
||||||
|
agent_prefix "" {
|
||||||
|
policy = "write"
|
||||||
|
}
|
||||||
|
node_prefix "" {
|
||||||
|
policy = "write"
|
||||||
|
}
|
||||||
|
service_prefix "" {
|
||||||
|
policy = "read"
|
||||||
|
}
|
||||||
|
|
||||||
##########################
|
##########################
|
||||||
# consul DNS configuration
|
# consul DNS configuration
|
||||||
##########################
|
##########################
|
||||||
@ -202,9 +309,11 @@ hashi_consul_configuration:
|
|||||||
hashi_consul_configuration_string: |
|
hashi_consul_configuration_string: |
|
||||||
bootstrap_expect: {{ (groups['consul_servers'] | length) }}
|
bootstrap_expect: {{ (groups['consul_servers'] | length) }}
|
||||||
|
|
||||||
##########################
|
#####################################################
|
||||||
# Vault options ##########
|
# #
|
||||||
##########################
|
# Vault Configuration #
|
||||||
|
# #
|
||||||
|
#####################################################
|
||||||
|
|
||||||
vault_cluster_name: vault
|
vault_cluster_name: vault
|
||||||
vault_enable_ui: true
|
vault_enable_ui: true
|
||||||
|
@ -305,5 +305,5 @@
|
|||||||
The python sdk for docker is really out of date, you need to install
|
The python sdk for docker is really out of date, you need to install
|
||||||
a more recent version of it in order to use this tool.
|
a more recent version of it in order to use this tool.
|
||||||
|
|
||||||
- name: "Fail"
|
# - name: "Fail"
|
||||||
fail:
|
# fail:
|
||||||
|
@ -20,6 +20,36 @@
|
|||||||
}}"
|
}}"
|
||||||
when: consul_address_configuration is defined
|
when: consul_address_configuration is defined
|
||||||
|
|
||||||
|
- name: "Consul | Merge token configuration"
|
||||||
|
delegate_to: localhost
|
||||||
|
block:
|
||||||
|
- name: "Consul | Stat consul secrets file"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ sub_configuration_directories.consul_servers }}/consul_config"
|
||||||
|
register: _consul_config_file
|
||||||
|
|
||||||
|
- name: "Consul | Load consul secrets file"
|
||||||
|
ansible.builtin.include_vars:
|
||||||
|
file: "{{ sub_configuration_directories.consul_servers }}/consul_config"
|
||||||
|
name: _consul_cluster_config
|
||||||
|
when: _consul_config_file.stat.exists
|
||||||
|
|
||||||
|
- name: "Consul | Merge token configuration"
|
||||||
|
vars:
|
||||||
|
_config_to_merge:
|
||||||
|
acl:
|
||||||
|
tokens:
|
||||||
|
agent: "{{ _consul_cluster_config.consul_agent_token }}"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
hashi_consul_configuration: "{{ hashi_consul_configuration | default({}) | combine(_config_to_merge, recursive=true) }}"
|
||||||
|
when: _consul_cluster_config.consul_agent_token is defined
|
||||||
|
|
||||||
|
- name: Debug token config
|
||||||
|
ansible.builtin.debug:
|
||||||
|
msg: "{{ hashi_consul_configuration }}"
|
||||||
|
|
||||||
|
# - fail:
|
||||||
|
|
||||||
- name: "Consul | Merge extra configuration settings"
|
- name: "Consul | Merge extra configuration settings"
|
||||||
vars:
|
vars:
|
||||||
_config_to_merge: "{{ consul_extra_configuration }}"
|
_config_to_merge: "{{ consul_extra_configuration }}"
|
||||||
|
Loading…
Reference in New Issue
Block a user