Compare commits
14 Commits
1a83036506
...
83847d4f0e
Author | SHA1 | Date | |
---|---|---|---|
83847d4f0e | |||
a989d14fb2 | |||
1c1730e5c9 | |||
b5614dfee0 | |||
01392e4db0 | |||
0a89fca17e | |||
b139632903 | |||
b66113b84c | |||
0a1ddc63bf | |||
4e0c90f110 | |||
7ffa720824 | |||
fa742277b2 | |||
370fc65b23 | |||
489f9aa101 |
3
.gitignore
vendored
3
.gitignore
vendored
@ -5,3 +5,6 @@ roles/ednz_cloud.*
|
|||||||
vault_config.yml
|
vault_config.yml
|
||||||
consul_config.yml
|
consul_config.yml
|
||||||
**/certificates/**
|
**/certificates/**
|
||||||
|
**/secrets/credentials.yml
|
||||||
|
**/secrets/vault.yml
|
||||||
|
**/.ansible-vault
|
||||||
|
19
.pre-commit-config.yaml
Normal file
19
.pre-commit-config.yaml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
repos:
|
||||||
|
- repo: https://github.com/pre-commit/pre-commit-hooks
|
||||||
|
rev: v4.5.0
|
||||||
|
hooks:
|
||||||
|
- id: trailing-whitespace
|
||||||
|
- id: end-of-file-fixer
|
||||||
|
- repo: https://github.com/adrienverge/yamllint.git
|
||||||
|
rev: v1.35.1
|
||||||
|
hooks:
|
||||||
|
- id: yamllint
|
||||||
|
args: [-c=./.yamllint]
|
||||||
|
- repo: https://github.com/commitizen-tools/commitizen
|
||||||
|
rev: v3.24.0
|
||||||
|
hooks:
|
||||||
|
- id: commitizen
|
||||||
|
- id: commitizen-branch
|
||||||
|
stages:
|
||||||
|
- post-commit
|
||||||
|
- push
|
@ -1,6 +1,3 @@
|
|||||||
---
|
---
|
||||||
# - name: Include a playbook from a collection
|
|
||||||
# ansible.builtin.import_playbook: ednz_cloud.hashistack.generate_certs.yml
|
|
||||||
|
|
||||||
- name: Include a playbook from a collection
|
- name: Include a playbook from a collection
|
||||||
ansible.builtin.import_playbook: ednz_cloud.hashistack.deploy.yml
|
ansible.builtin.import_playbook: ednz_cloud.hashistack.deploy.yml
|
||||||
|
@ -2,6 +2,9 @@
|
|||||||
- name: Include certificate generation playbook
|
- name: Include certificate generation playbook
|
||||||
ansible.builtin.import_playbook: ednz_cloud.hashistack.generate_certs.yml
|
ansible.builtin.import_playbook: ednz_cloud.hashistack.generate_certs.yml
|
||||||
|
|
||||||
|
# - name: Include credentials generation playbook
|
||||||
|
# ansible.builtin.import_playbook: ednz_cloud.hashistack.generate_credentials.yml
|
||||||
|
|
||||||
- name: Include bootstrap playbook
|
- name: Include bootstrap playbook
|
||||||
ansible.builtin.import_playbook: ednz_cloud.hashistack.bootstrap.yml
|
ansible.builtin.import_playbook: ednz_cloud.hashistack.bootstrap.yml
|
||||||
|
|
||||||
|
@ -11,10 +11,6 @@
|
|||||||
file: tasks/load_vars.yml
|
file: tasks/load_vars.yml
|
||||||
tags:
|
tags:
|
||||||
- always
|
- always
|
||||||
# - haproxy
|
|
||||||
# - consul
|
|
||||||
# - vault
|
|
||||||
# - nomad
|
|
||||||
|
|
||||||
- name: "Deploy Consul Control Plane"
|
- name: "Deploy Consul Control Plane"
|
||||||
ansible.builtin.import_tasks:
|
ansible.builtin.import_tasks:
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
---
|
---
|
||||||
# hashistack deployment playbook
|
# hashistack generate certificates playbook
|
||||||
- name: "Generate certificates"
|
- name: "Generate certificates"
|
||||||
hosts: all
|
hosts: all
|
||||||
strategy: linear
|
strategy: linear
|
||||||
@ -272,4 +272,4 @@
|
|||||||
group: "{{ lookup('env', 'USER') }}"
|
group: "{{ lookup('env', 'USER') }}"
|
||||||
mode: "0644"
|
mode: "0644"
|
||||||
|
|
||||||
# - fail:
|
# - fail:
|
||||||
|
33
playbooks/generate_credentials.yml
Normal file
33
playbooks/generate_credentials.yml
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
---
|
||||||
|
# hashistack generate certificates playbook
|
||||||
|
- name: "Generate credentials"
|
||||||
|
hosts: localhost
|
||||||
|
strategy: linear
|
||||||
|
gather_facts: true
|
||||||
|
become: true
|
||||||
|
tasks:
|
||||||
|
- name: "Generate consul credentials"
|
||||||
|
block:
|
||||||
|
- name: "Generate consul root credentials"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_consul_root_token: "{{ lookup('password', '/dev/null chars=ascii_letters,digits') | to_uuid }}"
|
||||||
|
|
||||||
|
- name: "Generate consul agents credentials"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_consul_agents_token: "{{ lookup('password', '/dev/null chars=ascii_letters,digits') | to_uuid }}"
|
||||||
|
|
||||||
|
- name: "Generate nomad credentials"
|
||||||
|
block:
|
||||||
|
- name: "Generate nomad root credentials"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_nomad_root_token: "{{ lookup('password', '/dev/null chars=ascii_letters,digits') | to_uuid }}"
|
||||||
|
|
||||||
|
- name: "Write credentials file"
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: templates/credentials.yml.j2
|
||||||
|
dest: "{{ sub_configuration_directories['secrets'] }}/{{ configuration_credentials_vars_file }}"
|
||||||
|
owner: "{{ lookup('env', 'USER') }}"
|
||||||
|
group: "{{ lookup('env', 'USER') }}"
|
||||||
|
mode: '0644'
|
||||||
|
|
||||||
|
# - fail:
|
@ -3,7 +3,7 @@
|
|||||||
# helper options #
|
# helper options #
|
||||||
##################
|
##################
|
||||||
|
|
||||||
manage_pip_packages_allow_break_system_packages: true
|
manage_pip_packages_allow_break_system_packages: "{{ ansible_distribution == 'Debian' and ansible_distribution_version == '12' }}"
|
||||||
|
|
||||||
vault_versions:
|
vault_versions:
|
||||||
host: "{{ vault_version if vault_version != 'latest' else vault_version + '*' }}"
|
host: "{{ vault_version if vault_version != 'latest' else vault_version + '*' }}"
|
||||||
@ -19,12 +19,14 @@ nomad_versions:
|
|||||||
|
|
||||||
configuration_directory: "{{ lookup('env', 'PWD') }}/etc/hashistack"
|
configuration_directory: "{{ lookup('env', 'PWD') }}/etc/hashistack"
|
||||||
sub_configuration_directories:
|
sub_configuration_directories:
|
||||||
|
secrets: "{{ configuration_directory }}/secrets"
|
||||||
certificates: "{{ configuration_directory }}/certificates"
|
certificates: "{{ configuration_directory }}/certificates"
|
||||||
nomad_servers: "{{ configuration_directory }}/nomad_servers"
|
nomad_servers: "{{ configuration_directory }}/nomad_servers"
|
||||||
vault_servers: "{{ configuration_directory }}/vault_servers"
|
vault_servers: "{{ configuration_directory }}/vault_servers"
|
||||||
consul_servers: "{{ configuration_directory }}/consul_servers"
|
consul_servers: "{{ configuration_directory }}/consul_servers"
|
||||||
|
|
||||||
configuration_global_vars_file: "globals.yml"
|
configuration_global_vars_file: "globals.yml"
|
||||||
|
configuration_credentials_vars_file: "credentials.yml"
|
||||||
|
|
||||||
hashistack_remote_config_dir: "/etc/hashistack"
|
hashistack_remote_config_dir: "/etc/hashistack"
|
||||||
hashistack_remote_data_dir: "/opt/hashistack"
|
hashistack_remote_data_dir: "/opt/hashistack"
|
||||||
|
@ -83,7 +83,7 @@ hashi_consul_configuration:
|
|||||||
dns_config: "{{ consul_dns_configuration }}"
|
dns_config: "{{ consul_dns_configuration }}"
|
||||||
ports:
|
ports:
|
||||||
dns: 8600
|
dns: 8600
|
||||||
http: "{{ ('8500'|int) if not }}"
|
http: 8500 # "{{ ('8500'|int) if not }}"
|
||||||
https: -1
|
https: -1
|
||||||
grpc: 8502
|
grpc: 8502
|
||||||
grpc_tls: 8503
|
grpc_tls: 8503
|
||||||
|
@ -65,6 +65,7 @@ hashi_vault_extra_files_list: "{{ ([] +
|
|||||||
(vault_plugin_extra_files_dir if vault_enable_plugins else []) +
|
(vault_plugin_extra_files_dir if vault_enable_plugins else []) +
|
||||||
vault_extra_files_list)
|
vault_extra_files_list)
|
||||||
| unique
|
| unique
|
||||||
|
| sort
|
||||||
}}"
|
}}"
|
||||||
hashi_vault_extra_files_src: "{{ sub_configuration_directories.vault_servers }}/config"
|
hashi_vault_extra_files_src: "{{ sub_configuration_directories.vault_servers }}/config"
|
||||||
hashi_vault_extra_files_dst: "{{ hashi_vault_config_dir }}/config"
|
hashi_vault_extra_files_dst: "{{ hashi_vault_config_dir }}/config"
|
||||||
|
@ -305,6 +305,3 @@
|
|||||||
fail_msg: >-
|
fail_msg: >-
|
||||||
The python sdk for docker is really out of date, you need to install
|
The python sdk for docker is really out of date, you need to install
|
||||||
a more recent version of it in order to use this tool.
|
a more recent version of it in order to use this tool.
|
||||||
|
|
||||||
# - name: "Fail"
|
|
||||||
# fail:
|
|
||||||
|
@ -7,7 +7,7 @@
|
|||||||
|
|
||||||
- name: "Wait for consul cluster to initialize" # noqa: run-once[task]
|
- name: "Wait for consul cluster to initialize" # noqa: run-once[task]
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
url: "http://{{ api_interface_address }}:8500"
|
url: "http://{{ api_interface_address }}:8500" # TODO: this should be dynamic (http/https)
|
||||||
validate_certs: no
|
validate_certs: no
|
||||||
return_content: yes
|
return_content: yes
|
||||||
status_code:
|
status_code:
|
||||||
@ -19,6 +19,7 @@
|
|||||||
|
|
||||||
- name: "Initialize consul cluster" # noqa: run-once[task]
|
- name: "Initialize consul cluster" # noqa: run-once[task]
|
||||||
community.general.consul_acl_bootstrap:
|
community.general.consul_acl_bootstrap:
|
||||||
|
bootstrap_secret: "{{ _credentials.consul.root_token.secret_id }}"
|
||||||
host: "{{ hashi_consul_configuration['advertise_addr'] }}"
|
host: "{{ hashi_consul_configuration['advertise_addr'] }}"
|
||||||
port: 8500
|
port: 8500
|
||||||
scheme: http
|
scheme: http
|
||||||
@ -28,27 +29,27 @@
|
|||||||
register: _consul_init_secret
|
register: _consul_init_secret
|
||||||
when: hashi_consul_configuration.acl.enabled
|
when: hashi_consul_configuration.acl.enabled
|
||||||
|
|
||||||
- name: "Write consul configuration to file" # noqa: run-once[task] no-handler
|
# - name: "Write consul configuration to file" # noqa: run-once[task] no-handler
|
||||||
ansible.builtin.blockinfile:
|
# ansible.builtin.blockinfile:
|
||||||
marker: "## -- {root_token} ANSIBLE MANAGED BLOCK ##"
|
# marker: "## -- {root_token} ANSIBLE MANAGED BLOCK ##"
|
||||||
block: "{{
|
# block: "{{
|
||||||
{
|
# {
|
||||||
'root_token':{
|
# 'root_token':{
|
||||||
'accessor_id': _consul_init_secret.result.AccessorID,
|
# 'accessor_id': _consul_init_secret.result.AccessorID,
|
||||||
'secret_id': _consul_init_secret.result.SecretID
|
# 'secret_id': _consul_init_secret.result.SecretID
|
||||||
}
|
# }
|
||||||
} | to_nice_yaml
|
# } | to_nice_yaml
|
||||||
}}"
|
# }}"
|
||||||
path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
# path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
||||||
mode: "0644"
|
# mode: "0644"
|
||||||
when: _consul_init_secret.result is defined
|
# when: _consul_init_secret.result is defined
|
||||||
run_once: true
|
# run_once: true
|
||||||
delegate_to: localhost
|
# delegate_to: localhost
|
||||||
|
|
||||||
- name: "Load consul cluster variables"
|
# - name: "Load consul cluster variables"
|
||||||
ansible.builtin.include_vars:
|
# ansible.builtin.include_vars:
|
||||||
file: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
# file: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
||||||
name: _consul_cluster_config
|
# name: _consul_cluster_config
|
||||||
|
|
||||||
- name: "Create consul agents token"
|
- name: "Create consul agents token"
|
||||||
when:
|
when:
|
||||||
@ -57,14 +58,14 @@
|
|||||||
block:
|
block:
|
||||||
- name: "Create consul agents token" # noqa: run-once[task] no-handler
|
- name: "Create consul agents token" # noqa: run-once[task] no-handler
|
||||||
run_once: true
|
run_once: true
|
||||||
delegate_to: localhost
|
|
||||||
block:
|
block:
|
||||||
- name: "Create consul agent policy"
|
- name: "Create consul agent policy"
|
||||||
community.general.consul_policy:
|
community.general.consul_policy:
|
||||||
host: "{{ hashi_consul_configuration['advertise_addr'] }}"
|
token: "{{ _credentials.consul.root_token.secret_id }}"
|
||||||
token: "{{ _consul_cluster_config.root_token.secret_id }}"
|
host: "{{ api_interface_address }}"
|
||||||
port: 8500
|
port: 8500
|
||||||
scheme: http
|
scheme: http # TODO: this should be dynamic
|
||||||
|
validate_certs: false
|
||||||
state: present
|
state: present
|
||||||
name: agents-policy
|
name: agents-policy
|
||||||
rules: "{{ consul_default_agent_policy }}"
|
rules: "{{ consul_default_agent_policy }}"
|
||||||
@ -74,55 +75,65 @@
|
|||||||
vars:
|
vars:
|
||||||
consul_full_url: "http://{{ hashi_consul_configuration['advertise_addr'] }}:8500"
|
consul_full_url: "http://{{ hashi_consul_configuration['advertise_addr'] }}:8500"
|
||||||
consul_token_body:
|
consul_token_body:
|
||||||
|
Description: "Consul agents token"
|
||||||
|
SecretID: "{{ _credentials.consul.tokens.agent }}"
|
||||||
Policies:
|
Policies:
|
||||||
- ID: "{{ _consul_agent_policy.policy.ID }}"
|
- ID: "{{ _consul_agent_policy.policy.ID }}"
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
url: "{{ consul_full_url }}/v1/acl/token"
|
url: "{{ consul_full_url }}/v1/acl/token"
|
||||||
method: PUT
|
method: PUT
|
||||||
headers:
|
headers:
|
||||||
X-Consul-Token: "{{ _consul_cluster_config.root_token.secret_id }}"
|
X-Consul-Token: "{{ _credentials.consul.root_token.secret_id }}"
|
||||||
body: "{{ consul_token_body | to_json }}"
|
body: "{{ consul_token_body | to_json }}"
|
||||||
status_code:
|
status_code:
|
||||||
- 200
|
- 200
|
||||||
register: _consul_agent_token
|
register: _consul_agent_token
|
||||||
|
changed_when: _consul_agent_token.status == 200
|
||||||
|
|
||||||
- name: "Write consul agents token to file" # no-handler
|
- name: "Restart consul service"
|
||||||
ansible.builtin.blockinfile:
|
ansible.builtin.service:
|
||||||
marker: "## -- {tokens} ANSIBLE MANAGED BLOCK ##"
|
name: "consul_container"
|
||||||
block: "{{
|
state: restarted
|
||||||
{
|
throttle: 1
|
||||||
'tokens':{
|
when: _consul_agent_token.changed
|
||||||
'agent': _consul_agent_token.json.SecretID
|
|
||||||
}
|
|
||||||
} | to_nice_yaml
|
|
||||||
}}"
|
|
||||||
path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
|
||||||
mode: "0644"
|
|
||||||
when: "'OK' in _consul_agent_token.msg"
|
|
||||||
|
|
||||||
- name: "Merge token configuration"
|
# - name: "Write consul agents token to file" # no-handler
|
||||||
delegate_to: localhost
|
# ansible.builtin.blockinfile:
|
||||||
block:
|
# marker: "## -- {tokens} ANSIBLE MANAGED BLOCK ##"
|
||||||
- name: "Stat consul secrets file"
|
# block: "{{
|
||||||
ansible.builtin.stat:
|
# {
|
||||||
path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
# 'tokens':{
|
||||||
register: _consul_config_file
|
# 'agent': _consul_agent_token.json.SecretID
|
||||||
|
# }
|
||||||
|
# } | to_nice_yaml
|
||||||
|
# }}"
|
||||||
|
# path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
||||||
|
# mode: "0644"
|
||||||
|
# when: "'OK' in _consul_agent_token.msg"
|
||||||
|
|
||||||
- name: "Load consul secrets file"
|
# - name: "Merge token configuration"
|
||||||
ansible.builtin.include_vars:
|
# delegate_to: localhost
|
||||||
file: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
# block:
|
||||||
name: _consul_cluster_config
|
# - name: "Stat consul secrets file"
|
||||||
when: _consul_config_file.stat.exists
|
# ansible.builtin.stat:
|
||||||
|
# path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
||||||
|
# register: _consul_config_file
|
||||||
|
#
|
||||||
|
# - name: "Load consul secrets file"
|
||||||
|
# ansible.builtin.include_vars:
|
||||||
|
# file: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
||||||
|
# name: _consul_cluster_config
|
||||||
|
# when: _consul_config_file.stat.exists
|
||||||
|
#
|
||||||
|
# - name: "Merge token configuration"
|
||||||
|
# vars:
|
||||||
|
# _config_to_merge:
|
||||||
|
# acl:
|
||||||
|
# tokens: "{{ _consul_cluster_config.tokens }}"
|
||||||
|
# ansible.builtin.set_fact:
|
||||||
|
# hashi_consul_configuration: "{{ hashi_consul_configuration | default({}) | combine(_config_to_merge, recursive=true) }}"
|
||||||
|
# when: _consul_cluster_config.tokens is defined
|
||||||
|
|
||||||
- name: "Merge token configuration"
|
# - name: "Include ednz_cloud.hashistack.hashicorp_consul"
|
||||||
vars:
|
# ansible.builtin.include_role:
|
||||||
_config_to_merge:
|
# name: ednz_cloud.hashistack.hashicorp_consul
|
||||||
acl:
|
|
||||||
tokens: "{{ _consul_cluster_config.tokens }}"
|
|
||||||
ansible.builtin.set_fact:
|
|
||||||
hashi_consul_configuration: "{{ hashi_consul_configuration | default({}) | combine(_config_to_merge, recursive=true) }}"
|
|
||||||
when: _consul_cluster_config.tokens is defined
|
|
||||||
|
|
||||||
- name: "Include ednz_cloud.hashistack.hashicorp_consul"
|
|
||||||
ansible.builtin.include_role:
|
|
||||||
name: ednz_cloud.hashistack.hashicorp_consul
|
|
||||||
|
@ -36,35 +36,14 @@
|
|||||||
- name: "Consul | Merge token configuration"
|
- name: "Consul | Merge token configuration"
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
block:
|
block:
|
||||||
- name: "Consul | Stat consul secrets file"
|
|
||||||
ansible.builtin.stat:
|
|
||||||
path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
|
||||||
register: _consul_config_file
|
|
||||||
|
|
||||||
- name: "Consul | Load consul secrets file"
|
|
||||||
ansible.builtin.include_vars:
|
|
||||||
file: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
|
||||||
name: _consul_cluster_config
|
|
||||||
when: _consul_config_file.stat.exists
|
|
||||||
|
|
||||||
- name: "Consul | Merge token configuration"
|
- name: "Consul | Merge token configuration"
|
||||||
vars:
|
vars:
|
||||||
_config_to_merge:
|
_config_to_merge:
|
||||||
acl:
|
acl:
|
||||||
tokens: "{{ _consul_cluster_config.tokens }}"
|
tokens:
|
||||||
|
agent: "{{ _credentials.consul.tokens.agent }}"
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
hashi_consul_configuration: "{{ hashi_consul_configuration | default({}) | combine(_config_to_merge, recursive=true) }}"
|
hashi_consul_configuration: "{{ hashi_consul_configuration | default({}) | combine(_config_to_merge, recursive=true) }}"
|
||||||
when: _consul_cluster_config.tokens is defined
|
|
||||||
|
|
||||||
- name: "Consul | Create secrets file if not present"
|
|
||||||
ansible.builtin.file:
|
|
||||||
path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
|
||||||
state: touch
|
|
||||||
owner: "{{ lookup('env', 'USER') }}"
|
|
||||||
group: "{{ lookup('env', 'USER') }}"
|
|
||||||
mode: "0644"
|
|
||||||
run_once: true
|
|
||||||
when: not _consul_config_file.stat.exists
|
|
||||||
|
|
||||||
- name: "Consul | Merge extra configuration settings"
|
- name: "Consul | Merge extra configuration settings"
|
||||||
vars:
|
vars:
|
||||||
|
@ -12,14 +12,9 @@
|
|||||||
- name: "Register haproxy services in consul"
|
- name: "Register haproxy services in consul"
|
||||||
when: enable_consul | bool
|
when: enable_consul | bool
|
||||||
block:
|
block:
|
||||||
- name: "Load consul cluster variables"
|
|
||||||
ansible.builtin.include_vars:
|
|
||||||
file: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
|
|
||||||
name: _consul_cluster_config
|
|
||||||
|
|
||||||
- name: "Register haproxy services in consul"
|
- name: "Register haproxy services in consul"
|
||||||
community.general.consul:
|
community.general.consul:
|
||||||
token: "{{ _consul_cluster_config.root_token.secret_id }}"
|
token: "{{ _credentials.consul.root_token.secret_id }}"
|
||||||
service_name: haproxy
|
service_name: haproxy
|
||||||
service_port: 80
|
service_port: 80
|
||||||
interval: 20s
|
interval: 20s
|
||||||
|
@ -1,68 +1,20 @@
|
|||||||
---
|
---
|
||||||
# hashistack variable injection playbook
|
# hashistack variable injection playbook
|
||||||
- name: "Load global variables"
|
- name: "Load global variables"
|
||||||
block:
|
ansible.builtin.import_tasks:
|
||||||
- name: "Stat global configuration file"
|
file: misc/load_global_vars.yml
|
||||||
ansible.builtin.stat:
|
|
||||||
path: "{{ configuration_directory }}/{{ configuration_global_vars_file }}"
|
|
||||||
register: _global_config_file
|
|
||||||
delegate_to: localhost
|
|
||||||
|
|
||||||
- name: "Make sure global configuration file exists"
|
- name: "Load credentials variables"
|
||||||
ansible.builtin.assert:
|
ansible.builtin.import_tasks:
|
||||||
that:
|
file: misc/load_credentials_vars.yml
|
||||||
- _global_config_file.stat.exists
|
|
||||||
delegate_to: localhost
|
|
||||||
|
|
||||||
- name: "Load global variables"
|
|
||||||
ansible.builtin.include_vars:
|
|
||||||
dir: "{{ configuration_directory }}"
|
|
||||||
files_matching: "{{ configuration_global_vars_file }}"
|
|
||||||
depth: 1
|
|
||||||
delegate_to: localhost
|
|
||||||
|
|
||||||
- name: "Load group specific variables"
|
- name: "Load group specific variables"
|
||||||
block:
|
ansible.builtin.import_tasks:
|
||||||
- name: "Stat group specific config file"
|
file: misc/load_group_vars.yml
|
||||||
ansible.builtin.stat:
|
|
||||||
path: "{{ configuration_directory }}/{{ group_name }}/{{ configuration_global_vars_file }}"
|
|
||||||
register: _group_config_file
|
|
||||||
loop: "{{ group_names }}"
|
|
||||||
loop_control:
|
|
||||||
loop_var: group_name
|
|
||||||
|
|
||||||
- name: Load group specific variables
|
|
||||||
ansible.builtin.include_vars:
|
|
||||||
dir: "{{ configuration_directory }}/{{ item.group_name }}"
|
|
||||||
files_matching: "{{ configuration_global_vars_file }}"
|
|
||||||
depth: 1
|
|
||||||
loop: "{{ _group_config_file.results }}"
|
|
||||||
when: item.stat.exists
|
|
||||||
and item.group_name in group_names
|
|
||||||
loop_control:
|
|
||||||
loop_var: item
|
|
||||||
delegate_to: localhost
|
|
||||||
|
|
||||||
- name: "Load host specific variables"
|
- name: "Load host specific variables"
|
||||||
block:
|
ansible.builtin.import_tasks:
|
||||||
- name: "Stat host specific config file"
|
file: misc/load_host_vars.yml
|
||||||
ansible.builtin.stat:
|
|
||||||
path: "{{ configuration_directory }}/{{ group_name }}/{{ inventory_hostname }}/{{ configuration_global_vars_file }}"
|
|
||||||
register: _host_config_file
|
|
||||||
loop: "{{ group_names }}"
|
|
||||||
loop_control:
|
|
||||||
loop_var: group_name
|
|
||||||
delegate_to: localhost
|
|
||||||
|
|
||||||
- name: Load host specific variables
|
|
||||||
ansible.builtin.include_vars:
|
|
||||||
dir: "{{ configuration_directory }}/{{ item.group_name }}/{{ inventory_hostname }}"
|
|
||||||
files_matching: "{{ configuration_global_vars_file }}"
|
|
||||||
loop: "{{ _host_config_file.results }}"
|
|
||||||
when: item.stat.exists
|
|
||||||
loop_control:
|
|
||||||
loop_var: item
|
|
||||||
delegate_to: localhost
|
|
||||||
|
|
||||||
- name: "Ensure remote directories exists"
|
- name: "Ensure remote directories exists"
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
@ -77,72 +29,8 @@
|
|||||||
- "{{ hashistack_remote_data_dir }}"
|
- "{{ hashistack_remote_data_dir }}"
|
||||||
|
|
||||||
- name: "Load custom CA certificates"
|
- name: "Load custom CA certificates"
|
||||||
block:
|
ansible.builtin.import_tasks:
|
||||||
- name: "Check if CA directory exists"
|
file: misc/load_ca_certificates.yml
|
||||||
ansible.builtin.stat:
|
|
||||||
path: "{{ sub_configuration_directories['certificates'] }}/ca"
|
|
||||||
register: _hashistack_ca_directory
|
|
||||||
delegate_to: localhost
|
|
||||||
|
|
||||||
- name: "Find custom ca certificates to copy"
|
|
||||||
ansible.builtin.find:
|
|
||||||
paths: "{{ sub_configuration_directories['certificates'] }}/ca"
|
|
||||||
patterns: "*.crt"
|
|
||||||
register: _hashistack_cacert_files
|
|
||||||
delegate_to: localhost
|
|
||||||
when: _hashistack_ca_directory.stat.exists and _hashistack_ca_directory.stat.isdir
|
|
||||||
|
|
||||||
- ansible.builtin.debug:
|
|
||||||
msg: "{{ _hashistack_cacert_files }}"
|
|
||||||
|
|
||||||
- name: "Ensure remote ca directory exists"
|
|
||||||
ansible.builtin.file:
|
|
||||||
path: "{{ hashistack_remote_config_dir }}/ca"
|
|
||||||
state: directory
|
|
||||||
owner: root
|
|
||||||
group: root
|
|
||||||
mode: 0755
|
|
||||||
|
|
||||||
- name: "Copy custom ca certificates"
|
|
||||||
ansible.builtin.copy:
|
|
||||||
src: "{{ item.path }}"
|
|
||||||
dest: "{{ hashistack_remote_config_dir }}/ca/{{ item.path | basename }}"
|
|
||||||
owner: root
|
|
||||||
group: root
|
|
||||||
mode: 0644
|
|
||||||
loop: "{{ _hashistack_cacert_files.files }}"
|
|
||||||
register: _hashistack_copied_ca
|
|
||||||
|
|
||||||
- name: "Copy and update trust store"
|
|
||||||
block:
|
|
||||||
- name: "Copy ca certificates to /usr/loca/share/ca-certificates"
|
|
||||||
ansible.builtin.file:
|
|
||||||
state: link
|
|
||||||
src: "{{ item.dest }}"
|
|
||||||
dest: "/usr/local/share/ca-certificates/hashistack-customca-{{ item.dest | basename }}"
|
|
||||||
owner: root
|
|
||||||
group: root
|
|
||||||
loop: "{{ _hashistack_copied_ca.results }}"
|
|
||||||
register: _hashistack_usr_local_share_ca_certificates
|
|
||||||
|
|
||||||
- name: "Update the trust store"
|
|
||||||
ansible.builtin.command: update-ca-certificates
|
|
||||||
changed_when: false
|
|
||||||
when: _hashistack_usr_local_share_ca_certificates.changed
|
|
||||||
|
|
||||||
# - name: "Initialize list of CA certificates"
|
|
||||||
# ansible.builtin.set_fact:
|
|
||||||
# hashistack_cacert_extra_files: []
|
|
||||||
# delegate_to: localhost
|
|
||||||
|
|
||||||
# - name: "Add custom CA to list of extra certificates"
|
|
||||||
# ansible.builtin.set_fact:
|
|
||||||
# hashistack_cacert_extra_files: "{{
|
|
||||||
# hashistack_cacert_extra_files | default([])
|
|
||||||
# + [{'src': item.path, 'dest': '/etc/ssl/certs/hashistack-custom-' + item.path | basename}] }}"
|
|
||||||
# loop: "{{ _hashistack_cacert_files.files }}"
|
|
||||||
# delegate_to: localhost
|
|
||||||
# when: _hashistack_cacert_files.matched > 0
|
|
||||||
|
|
||||||
- name: "Merge consul configurations"
|
- name: "Merge consul configurations"
|
||||||
ansible.builtin.import_tasks:
|
ansible.builtin.import_tasks:
|
||||||
@ -157,10 +45,3 @@
|
|||||||
when:
|
when:
|
||||||
- enable_vault | bool
|
- enable_vault | bool
|
||||||
- "'vault_servers' in group_names"
|
- "'vault_servers' in group_names"
|
||||||
|
|
||||||
- debug:
|
|
||||||
msg: "{{ deploy_haproxy_frontends }}"
|
|
||||||
|
|
||||||
- debug:
|
|
||||||
msg: "{{ deploy_haproxy_backends }}"
|
|
||||||
# - fail:
|
|
||||||
|
216
playbooks/tasks/misc/load_all_vars.yml
Normal file
216
playbooks/tasks/misc/load_all_vars.yml
Normal file
@ -0,0 +1,216 @@
|
|||||||
|
---
|
||||||
|
# hashistack variable injection playbook
|
||||||
|
- name: "Load global variables"
|
||||||
|
block:
|
||||||
|
- name: "Stat global configuration file"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ configuration_directory }}/{{ configuration_global_vars_file }}"
|
||||||
|
register: _global_config_file
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Make sure global configuration file exists"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- _global_config_file.stat.exists
|
||||||
|
fail_msg: >-
|
||||||
|
Main configuration file {{ _global_config_file.stat.path }} was not found, cannot continue without it.
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Load global variables"
|
||||||
|
ansible.builtin.include_vars:
|
||||||
|
dir: "{{ configuration_directory }}"
|
||||||
|
files_matching: "{{ configuration_global_vars_file }}"
|
||||||
|
depth: 1
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Load credentials variables"
|
||||||
|
block:
|
||||||
|
- name: "Stat credentials file"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ sub_configuration_directories['secrets'] }}/{{ configuration_credentials_vars_file }}"
|
||||||
|
register: _credentials_file
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Stat vault credentials file"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ sub_configuration_directories['secrets'] }}/vault.yml"
|
||||||
|
register: _vault_credentials_file
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Make sure credentials file exists"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- _credentials_file.stat.exists
|
||||||
|
fail_msg: >-
|
||||||
|
Credentials file {{ _credentials_file.stat.path }} was not found, cannot continue without it.
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Load credentials variables"
|
||||||
|
ansible.builtin.include_vars:
|
||||||
|
dir: "{{ sub_configuration_directories['secrets'] }}"
|
||||||
|
files_matching: "{{ configuration_credentials_vars_file }}"
|
||||||
|
depth: 1
|
||||||
|
name: _credentials
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Load vault credentials if vault.yml exists"
|
||||||
|
ansible.builtin.include_vars:
|
||||||
|
dir: "{{ sub_configuration_directories['secrets'] }}"
|
||||||
|
files_matching: "vault.yml"
|
||||||
|
depth: 1
|
||||||
|
name: _vault_credentials
|
||||||
|
when: _vault_credentials_file.stat.exists
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Merge vault credentials into _credentials"
|
||||||
|
vars:
|
||||||
|
_config_to_merge:
|
||||||
|
vault: "{{ _vault_credentials }}"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_credentials: "{{ _credentials | combine(_vault_credentials, recursive=true) }}"
|
||||||
|
when: _vault_credentials_file.stat.exists
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Load group specific variables"
|
||||||
|
block:
|
||||||
|
- name: "Stat group specific config file"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ configuration_directory }}/{{ group_name }}/{{ configuration_global_vars_file }}"
|
||||||
|
register: _group_config_file
|
||||||
|
loop: "{{ group_names }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: group_name
|
||||||
|
|
||||||
|
- name: Load group specific variables
|
||||||
|
ansible.builtin.include_vars:
|
||||||
|
dir: "{{ configuration_directory }}/{{ item.group_name }}"
|
||||||
|
files_matching: "{{ configuration_global_vars_file }}"
|
||||||
|
depth: 1
|
||||||
|
loop: "{{ _group_config_file.results }}"
|
||||||
|
when: item.stat.exists
|
||||||
|
and item.group_name in group_names
|
||||||
|
loop_control:
|
||||||
|
loop_var: item
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Load host specific variables"
|
||||||
|
block:
|
||||||
|
- name: "Stat host specific config file"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ configuration_directory }}/{{ group_name }}/{{ inventory_hostname }}/{{ configuration_global_vars_file }}"
|
||||||
|
register: _host_config_file
|
||||||
|
loop: "{{ group_names }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: group_name
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: Load host specific variables
|
||||||
|
ansible.builtin.include_vars:
|
||||||
|
dir: "{{ configuration_directory }}/{{ item.group_name }}/{{ inventory_hostname }}"
|
||||||
|
files_matching: "{{ configuration_global_vars_file }}"
|
||||||
|
loop: "{{ _host_config_file.results }}"
|
||||||
|
when: item.stat.exists
|
||||||
|
loop_control:
|
||||||
|
loop_var: item
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Ensure remote directories exists"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
state: directory
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0755
|
||||||
|
recurse: yes
|
||||||
|
loop:
|
||||||
|
- "{{ hashistack_remote_config_dir }}"
|
||||||
|
- "{{ hashistack_remote_data_dir }}"
|
||||||
|
|
||||||
|
- name: "Load custom CA certificates"
|
||||||
|
block:
|
||||||
|
- name: "Check if CA directory exists"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ sub_configuration_directories['certificates'] }}/ca"
|
||||||
|
register: _hashistack_ca_directory
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Find custom ca certificates to copy"
|
||||||
|
ansible.builtin.find:
|
||||||
|
paths: "{{ sub_configuration_directories['certificates'] }}/ca"
|
||||||
|
patterns: "*.crt"
|
||||||
|
register: _hashistack_cacert_files
|
||||||
|
delegate_to: localhost
|
||||||
|
when: _hashistack_ca_directory.stat.exists and _hashistack_ca_directory.stat.isdir
|
||||||
|
|
||||||
|
- ansible.builtin.debug:
|
||||||
|
msg: "{{ _hashistack_cacert_files }}"
|
||||||
|
|
||||||
|
- name: "Ensure remote ca directory exists"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ hashistack_remote_config_dir }}/ca"
|
||||||
|
state: directory
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0755
|
||||||
|
|
||||||
|
- name: "Copy custom ca certificates"
|
||||||
|
ansible.builtin.copy:
|
||||||
|
src: "{{ item.path }}"
|
||||||
|
dest: "{{ hashistack_remote_config_dir }}/ca/{{ item.path | basename }}"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0644
|
||||||
|
loop: "{{ _hashistack_cacert_files.files }}"
|
||||||
|
register: _hashistack_copied_ca
|
||||||
|
|
||||||
|
- name: "Copy and update trust store"
|
||||||
|
block:
|
||||||
|
- name: "Copy ca certificates to /usr/loca/share/ca-certificates"
|
||||||
|
ansible.builtin.file:
|
||||||
|
state: link
|
||||||
|
src: "{{ item.dest }}"
|
||||||
|
dest: "/usr/local/share/ca-certificates/hashistack-customca-{{ item.dest | basename }}"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
loop: "{{ _hashistack_copied_ca.results }}"
|
||||||
|
register: _hashistack_usr_local_share_ca_certificates
|
||||||
|
|
||||||
|
- name: "Update the trust store"
|
||||||
|
ansible.builtin.command: update-ca-certificates
|
||||||
|
changed_when: false
|
||||||
|
when: _hashistack_usr_local_share_ca_certificates.changed
|
||||||
|
|
||||||
|
# - name: "Initialize list of CA certificates"
|
||||||
|
# ansible.builtin.set_fact:
|
||||||
|
# hashistack_cacert_extra_files: []
|
||||||
|
# delegate_to: localhost
|
||||||
|
|
||||||
|
# - name: "Add custom CA to list of extra certificates"
|
||||||
|
# ansible.builtin.set_fact:
|
||||||
|
# hashistack_cacert_extra_files: "{{
|
||||||
|
# hashistack_cacert_extra_files | default([])
|
||||||
|
# + [{'src': item.path, 'dest': '/etc/ssl/certs/hashistack-custom-' + item.path | basename}] }}"
|
||||||
|
# loop: "{{ _hashistack_cacert_files.files }}"
|
||||||
|
# delegate_to: localhost
|
||||||
|
# when: _hashistack_cacert_files.matched > 0
|
||||||
|
|
||||||
|
- name: "Merge consul configurations"
|
||||||
|
ansible.builtin.import_tasks:
|
||||||
|
file: "consul/consul_vars.yml"
|
||||||
|
when:
|
||||||
|
- enable_consul | bool
|
||||||
|
- "('consul_servers' in group_names) or ('consul_agents' in group_names)"
|
||||||
|
|
||||||
|
- name: "Merge vault configurations"
|
||||||
|
ansible.builtin.import_tasks:
|
||||||
|
file: "vault/vault_vars.yml"
|
||||||
|
when:
|
||||||
|
- enable_vault | bool
|
||||||
|
- "'vault_servers' in group_names"
|
||||||
|
|
||||||
|
- debug:
|
||||||
|
msg: "{{ deploy_haproxy_frontends }}"
|
||||||
|
|
||||||
|
- debug:
|
||||||
|
msg: "{{ deploy_haproxy_backends }}"
|
||||||
|
# - fail:
|
52
playbooks/tasks/misc/load_ca_certificates.yml
Normal file
52
playbooks/tasks/misc/load_ca_certificates.yml
Normal file
@ -0,0 +1,52 @@
|
|||||||
|
---
|
||||||
|
- name: "Check if CA directory exists"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ sub_configuration_directories['certificates'] }}/ca"
|
||||||
|
register: _hashistack_ca_directory
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Find custom ca certificates to copy"
|
||||||
|
ansible.builtin.find:
|
||||||
|
paths: "{{ sub_configuration_directories['certificates'] }}/ca"
|
||||||
|
patterns: "*.crt"
|
||||||
|
register: _hashistack_cacert_files
|
||||||
|
delegate_to: localhost
|
||||||
|
when: _hashistack_ca_directory.stat.exists and _hashistack_ca_directory.stat.isdir
|
||||||
|
|
||||||
|
- ansible.builtin.debug:
|
||||||
|
msg: "{{ _hashistack_cacert_files }}"
|
||||||
|
|
||||||
|
- name: "Ensure remote ca directory exists"
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ hashistack_remote_config_dir }}/ca"
|
||||||
|
state: directory
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0755
|
||||||
|
|
||||||
|
- name: "Copy custom ca certificates"
|
||||||
|
ansible.builtin.copy:
|
||||||
|
src: "{{ item.path }}"
|
||||||
|
dest: "{{ hashistack_remote_config_dir }}/ca/{{ item.path | basename }}"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0644
|
||||||
|
loop: "{{ _hashistack_cacert_files.files }}"
|
||||||
|
register: _hashistack_copied_ca
|
||||||
|
|
||||||
|
- name: "Copy and update trust store"
|
||||||
|
block:
|
||||||
|
- name: "Copy ca certificates to /usr/loca/share/ca-certificates"
|
||||||
|
ansible.builtin.file:
|
||||||
|
state: link
|
||||||
|
src: "{{ item.dest }}"
|
||||||
|
dest: "/usr/local/share/ca-certificates/hashistack-customca-{{ item.dest | basename }}"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
loop: "{{ _hashistack_copied_ca.results }}"
|
||||||
|
register: _hashistack_usr_local_share_ca_certificates
|
||||||
|
|
||||||
|
- name: "Update the trust store"
|
||||||
|
ansible.builtin.command: update-ca-certificates
|
||||||
|
changed_when: false
|
||||||
|
when: _hashistack_usr_local_share_ca_certificates.changed
|
50
playbooks/tasks/misc/load_credentials_vars.yml
Normal file
50
playbooks/tasks/misc/load_credentials_vars.yml
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
---
|
||||||
|
- name: "Stat credentials file"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ sub_configuration_directories['secrets'] }}/{{ configuration_credentials_vars_file }}"
|
||||||
|
register: _credentials_file
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Stat vault credentials file"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ sub_configuration_directories['secrets'] }}/vault.yml"
|
||||||
|
register: _vault_credentials_file
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Make sure credentials file exists"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- _credentials_file.stat.exists
|
||||||
|
fail_msg: >-
|
||||||
|
Credentials file {{ _credentials_file.stat.path }} was not found, cannot continue without it.
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Load credentials variables"
|
||||||
|
ansible.builtin.include_vars:
|
||||||
|
dir: "{{ sub_configuration_directories['secrets'] }}"
|
||||||
|
files_matching: "{{ configuration_credentials_vars_file }}"
|
||||||
|
depth: 1
|
||||||
|
name: _credentials
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Load vault credentials if vault.yml exists"
|
||||||
|
ansible.builtin.include_vars:
|
||||||
|
dir: "{{ sub_configuration_directories['secrets'] }}"
|
||||||
|
files_matching: "vault.yml"
|
||||||
|
depth: 1
|
||||||
|
name: _vault_credentials
|
||||||
|
when: _vault_credentials_file.stat.exists
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Merge vault credentials into _credentials"
|
||||||
|
vars:
|
||||||
|
_config_to_merge:
|
||||||
|
vault: "{{ _vault_credentials }}"
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
_credentials: "{{ _credentials | combine(_config_to_merge, recursive=true) }}"
|
||||||
|
when: _vault_credentials_file.stat.exists
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Debug _credentials"
|
||||||
|
ansible.builtin.debug:
|
||||||
|
msg: "{{ _credentials }}"
|
21
playbooks/tasks/misc/load_global_vars.yml
Normal file
21
playbooks/tasks/misc/load_global_vars.yml
Normal file
@ -0,0 +1,21 @@
|
|||||||
|
---
|
||||||
|
- name: "Stat global configuration file"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ configuration_directory }}/{{ configuration_global_vars_file }}"
|
||||||
|
register: _global_config_file
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Make sure global configuration file exists"
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- _global_config_file.stat.exists
|
||||||
|
fail_msg: >-
|
||||||
|
Main configuration file {{ _global_config_file.stat.path }} was not found, cannot continue without it.
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: "Load global variables"
|
||||||
|
ansible.builtin.include_vars:
|
||||||
|
dir: "{{ configuration_directory }}"
|
||||||
|
files_matching: "{{ configuration_global_vars_file }}"
|
||||||
|
depth: 1
|
||||||
|
delegate_to: localhost
|
20
playbooks/tasks/misc/load_group_vars.yml
Normal file
20
playbooks/tasks/misc/load_group_vars.yml
Normal file
@ -0,0 +1,20 @@
|
|||||||
|
---
|
||||||
|
- name: "Stat group specific config file"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ configuration_directory }}/{{ group_name }}/{{ configuration_global_vars_file }}"
|
||||||
|
register: _group_config_file
|
||||||
|
loop: "{{ group_names }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: group_name
|
||||||
|
|
||||||
|
- name: Load group specific variables
|
||||||
|
ansible.builtin.include_vars:
|
||||||
|
dir: "{{ configuration_directory }}/{{ item.group_name }}"
|
||||||
|
files_matching: "{{ configuration_global_vars_file }}"
|
||||||
|
depth: 1
|
||||||
|
loop: "{{ _group_config_file.results }}"
|
||||||
|
when: item.stat.exists
|
||||||
|
and item.group_name in group_names
|
||||||
|
loop_control:
|
||||||
|
loop_var: item
|
||||||
|
delegate_to: localhost
|
19
playbooks/tasks/misc/load_host_vars.yml
Normal file
19
playbooks/tasks/misc/load_host_vars.yml
Normal file
@ -0,0 +1,19 @@
|
|||||||
|
---
|
||||||
|
- name: "Stat host specific config file"
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ configuration_directory }}/{{ group_name }}/{{ inventory_hostname }}/{{ configuration_global_vars_file }}"
|
||||||
|
register: _host_config_file
|
||||||
|
loop: "{{ group_names }}"
|
||||||
|
loop_control:
|
||||||
|
loop_var: group_name
|
||||||
|
delegate_to: localhost
|
||||||
|
|
||||||
|
- name: Load host specific variables
|
||||||
|
ansible.builtin.include_vars:
|
||||||
|
dir: "{{ configuration_directory }}/{{ item.group_name }}/{{ inventory_hostname }}"
|
||||||
|
files_matching: "{{ configuration_global_vars_file }}"
|
||||||
|
loop: "{{ _host_config_file.results }}"
|
||||||
|
when: item.stat.exists
|
||||||
|
loop_control:
|
||||||
|
loop_var: item
|
||||||
|
delegate_to: localhost
|
@ -20,8 +20,8 @@
|
|||||||
|
|
||||||
- name: "Write vault configuration to file" # noqa: run-once[task] no-handler
|
- name: "Write vault configuration to file" # noqa: run-once[task] no-handler
|
||||||
ansible.builtin.copy:
|
ansible.builtin.copy:
|
||||||
content: "{{ _vault_init_secret.state | to_nice_yaml}}"
|
content: "{{ _vault_init_secret.state | to_nice_yaml(indent=2) }}"
|
||||||
dest: "{{ sub_configuration_directories.vault_servers }}/vault_config.yml"
|
dest: "{{ sub_configuration_directories.secrets }}/vault.yml"
|
||||||
owner: "{{ lookup('env', 'USER') }}"
|
owner: "{{ lookup('env', 'USER') }}"
|
||||||
group: "{{ lookup('env', 'USER') }}"
|
group: "{{ lookup('env', 'USER') }}"
|
||||||
mode: "0644"
|
mode: "0644"
|
||||||
@ -29,16 +29,20 @@
|
|||||||
run_once: true
|
run_once: true
|
||||||
delegate_to: localhost
|
delegate_to: localhost
|
||||||
|
|
||||||
|
# - name: "Load vault cluster variables necessary for unseal operation"
|
||||||
|
# ansible.builtin.include_vars:
|
||||||
|
# file: "{{ sub_configuration_directories.vault_servers }}/vault_config.yml"
|
||||||
|
# name: _vault_cluster_config
|
||||||
|
|
||||||
- name: "Load vault cluster variables necessary for unseal operation"
|
- name: "Load vault cluster variables necessary for unseal operation"
|
||||||
ansible.builtin.include_vars:
|
ansible.builtin.import_tasks:
|
||||||
file: "{{ sub_configuration_directories.vault_servers }}/vault_config.yml"
|
file: ../misc/load_credentials_vars.yml
|
||||||
name: _vault_cluster_config
|
|
||||||
|
|
||||||
- name: "Unseal the bootstrap node" # noqa: run-once[task] no-handler
|
- name: "Unseal the bootstrap node" # noqa: run-once[task] no-handler
|
||||||
ednz_cloud.hashistack.vault_unseal:
|
ednz_cloud.hashistack.vault_unseal:
|
||||||
api_url: "{{ hashi_vault_configuration['api_addr'] }}"
|
api_url: "{{ hashi_vault_configuration['api_addr'] }}"
|
||||||
tls_verify: "{{ vault_tls_verify }}"
|
tls_verify: "{{ vault_tls_verify }}"
|
||||||
key_shares: "{{ _vault_cluster_config['keys'] }}"
|
key_shares: "{{ _credentials.vault['keys'] }}"
|
||||||
run_once: true
|
run_once: true
|
||||||
delegate_to: "{{ groups['vault_servers'] | first }}"
|
delegate_to: "{{ groups['vault_servers'] | first }}"
|
||||||
when: _vault_init_secret.changed
|
when: _vault_init_secret.changed
|
||||||
@ -48,7 +52,7 @@
|
|||||||
ednz_cloud.hashistack.vault_unseal:
|
ednz_cloud.hashistack.vault_unseal:
|
||||||
api_url: "{{ hashi_vault_configuration['api_addr'] }}"
|
api_url: "{{ hashi_vault_configuration['api_addr'] }}"
|
||||||
tls_verify: "{{ vault_tls_verify }}"
|
tls_verify: "{{ vault_tls_verify }}"
|
||||||
key_shares: "{{ _vault_cluster_config['keys'] }}"
|
key_shares: "{{ _credentials.vault['keys'] }}"
|
||||||
retries: 5
|
retries: 5
|
||||||
delay: 5
|
delay: 5
|
||||||
until: _unseal_status.changed or not _unseal_status.failed
|
until: _unseal_status.changed or not _unseal_status.failed
|
||||||
|
8
playbooks/templates/credentials.yml.j2
Normal file
8
playbooks/templates/credentials.yml.j2
Normal file
@ -0,0 +1,8 @@
|
|||||||
|
---
|
||||||
|
consul:
|
||||||
|
root_token:
|
||||||
|
secret_id: "{{ _consul_root_token }}"
|
||||||
|
tokens:
|
||||||
|
agent: "{{ _consul_agents_token }}"
|
||||||
|
nomad:
|
||||||
|
root_token: "{{ _nomad_root_token }}"
|
Loading…
Reference in New Issue
Block a user