Compare commits

...

14 Commits

Author SHA1 Message Date
83847d4f0e Merge pull request 'feature/generate-credentials' (#5) from feature/generate-credentials into main
Reviewed-on: ansible-collections/hashistack#5
2024-05-03 22:32:17 +00:00
a989d14fb2 chore: remove some unused code, ignore more testing files 2024-05-04 00:31:30 +02:00
1c1730e5c9 fix: vault extra files list not being idempotent between runs 2024-05-03 23:53:57 +02:00
b5614dfee0 fix: various fixes to accomodate the new pre-generated credentials 2024-05-03 22:31:38 +02:00
01392e4db0 feat: add new way of loading vars following move to misc task group 2024-05-03 22:30:40 +02:00
0a89fca17e fix(tests): update converge and prepare playbook for test suite 2024-05-03 22:29:33 +02:00
b139632903 chore: add pre-commit file 2024-05-03 22:28:46 +02:00
b66113b84c fix: various small issues on generate playbooks 2024-05-03 22:27:42 +02:00
0a1ddc63bf feat(consul): utilize the new pre-generated credentials on consul deployment 2024-05-03 22:26:30 +02:00
4e0c90f110 fix: various inconsistencies and idempotence issues related to variable computing 2024-05-03 22:25:03 +02:00
7ffa720824 feat: update vault deployment to utilize the new variable loading solution 2024-05-03 22:23:47 +02:00
fa742277b2 feat: split load_vars play into multiple specific plays 2024-05-03 22:22:59 +02:00
370fc65b23 feat: generate credentials.yml from template 2024-05-03 00:34:11 +02:00
489f9aa101 feat: add playbook to generate credentials before deploying 2024-05-03 00:30:54 +02:00
23 changed files with 550 additions and 243 deletions

3
.gitignore vendored
View File

@ -5,3 +5,6 @@ roles/ednz_cloud.*
vault_config.yml vault_config.yml
consul_config.yml consul_config.yml
**/certificates/** **/certificates/**
**/secrets/credentials.yml
**/secrets/vault.yml
**/.ansible-vault

19
.pre-commit-config.yaml Normal file
View File

@ -0,0 +1,19 @@
repos:
- repo: https://github.com/pre-commit/pre-commit-hooks
rev: v4.5.0
hooks:
- id: trailing-whitespace
- id: end-of-file-fixer
- repo: https://github.com/adrienverge/yamllint.git
rev: v1.35.1
hooks:
- id: yamllint
args: [-c=./.yamllint]
- repo: https://github.com/commitizen-tools/commitizen
rev: v3.24.0
hooks:
- id: commitizen
- id: commitizen-branch
stages:
- post-commit
- push

View File

@ -1,6 +1,3 @@
--- ---
# - name: Include a playbook from a collection
# ansible.builtin.import_playbook: ednz_cloud.hashistack.generate_certs.yml
- name: Include a playbook from a collection - name: Include a playbook from a collection
ansible.builtin.import_playbook: ednz_cloud.hashistack.deploy.yml ansible.builtin.import_playbook: ednz_cloud.hashistack.deploy.yml

View File

@ -2,6 +2,9 @@
- name: Include certificate generation playbook - name: Include certificate generation playbook
ansible.builtin.import_playbook: ednz_cloud.hashistack.generate_certs.yml ansible.builtin.import_playbook: ednz_cloud.hashistack.generate_certs.yml
# - name: Include credentials generation playbook
# ansible.builtin.import_playbook: ednz_cloud.hashistack.generate_credentials.yml
- name: Include bootstrap playbook - name: Include bootstrap playbook
ansible.builtin.import_playbook: ednz_cloud.hashistack.bootstrap.yml ansible.builtin.import_playbook: ednz_cloud.hashistack.bootstrap.yml

View File

@ -11,10 +11,6 @@
file: tasks/load_vars.yml file: tasks/load_vars.yml
tags: tags:
- always - always
# - haproxy
# - consul
# - vault
# - nomad
- name: "Deploy Consul Control Plane" - name: "Deploy Consul Control Plane"
ansible.builtin.import_tasks: ansible.builtin.import_tasks:

View File

@ -1,5 +1,5 @@
--- ---
# hashistack deployment playbook # hashistack generate certificates playbook
- name: "Generate certificates" - name: "Generate certificates"
hosts: all hosts: all
strategy: linear strategy: linear
@ -272,4 +272,4 @@
group: "{{ lookup('env', 'USER') }}" group: "{{ lookup('env', 'USER') }}"
mode: "0644" mode: "0644"
# - fail: # - fail:

View File

@ -0,0 +1,33 @@
---
# hashistack generate certificates playbook
- name: "Generate credentials"
hosts: localhost
strategy: linear
gather_facts: true
become: true
tasks:
- name: "Generate consul credentials"
block:
- name: "Generate consul root credentials"
ansible.builtin.set_fact:
_consul_root_token: "{{ lookup('password', '/dev/null chars=ascii_letters,digits') | to_uuid }}"
- name: "Generate consul agents credentials"
ansible.builtin.set_fact:
_consul_agents_token: "{{ lookup('password', '/dev/null chars=ascii_letters,digits') | to_uuid }}"
- name: "Generate nomad credentials"
block:
- name: "Generate nomad root credentials"
ansible.builtin.set_fact:
_nomad_root_token: "{{ lookup('password', '/dev/null chars=ascii_letters,digits') | to_uuid }}"
- name: "Write credentials file"
ansible.builtin.template:
src: templates/credentials.yml.j2
dest: "{{ sub_configuration_directories['secrets'] }}/{{ configuration_credentials_vars_file }}"
owner: "{{ lookup('env', 'USER') }}"
group: "{{ lookup('env', 'USER') }}"
mode: '0644'
# - fail:

View File

@ -3,7 +3,7 @@
# helper options # # helper options #
################## ##################
manage_pip_packages_allow_break_system_packages: true manage_pip_packages_allow_break_system_packages: "{{ ansible_distribution == 'Debian' and ansible_distribution_version == '12' }}"
vault_versions: vault_versions:
host: "{{ vault_version if vault_version != 'latest' else vault_version + '*' }}" host: "{{ vault_version if vault_version != 'latest' else vault_version + '*' }}"
@ -19,12 +19,14 @@ nomad_versions:
configuration_directory: "{{ lookup('env', 'PWD') }}/etc/hashistack" configuration_directory: "{{ lookup('env', 'PWD') }}/etc/hashistack"
sub_configuration_directories: sub_configuration_directories:
secrets: "{{ configuration_directory }}/secrets"
certificates: "{{ configuration_directory }}/certificates" certificates: "{{ configuration_directory }}/certificates"
nomad_servers: "{{ configuration_directory }}/nomad_servers" nomad_servers: "{{ configuration_directory }}/nomad_servers"
vault_servers: "{{ configuration_directory }}/vault_servers" vault_servers: "{{ configuration_directory }}/vault_servers"
consul_servers: "{{ configuration_directory }}/consul_servers" consul_servers: "{{ configuration_directory }}/consul_servers"
configuration_global_vars_file: "globals.yml" configuration_global_vars_file: "globals.yml"
configuration_credentials_vars_file: "credentials.yml"
hashistack_remote_config_dir: "/etc/hashistack" hashistack_remote_config_dir: "/etc/hashistack"
hashistack_remote_data_dir: "/opt/hashistack" hashistack_remote_data_dir: "/opt/hashistack"

View File

@ -83,7 +83,7 @@ hashi_consul_configuration:
dns_config: "{{ consul_dns_configuration }}" dns_config: "{{ consul_dns_configuration }}"
ports: ports:
dns: 8600 dns: 8600
http: "{{ ('8500'|int) if not }}" http: 8500 # "{{ ('8500'|int) if not }}"
https: -1 https: -1
grpc: 8502 grpc: 8502
grpc_tls: 8503 grpc_tls: 8503

View File

@ -65,6 +65,7 @@ hashi_vault_extra_files_list: "{{ ([] +
(vault_plugin_extra_files_dir if vault_enable_plugins else []) + (vault_plugin_extra_files_dir if vault_enable_plugins else []) +
vault_extra_files_list) vault_extra_files_list)
| unique | unique
| sort
}}" }}"
hashi_vault_extra_files_src: "{{ sub_configuration_directories.vault_servers }}/config" hashi_vault_extra_files_src: "{{ sub_configuration_directories.vault_servers }}/config"
hashi_vault_extra_files_dst: "{{ hashi_vault_config_dir }}/config" hashi_vault_extra_files_dst: "{{ hashi_vault_config_dir }}/config"

View File

@ -305,6 +305,3 @@
fail_msg: >- fail_msg: >-
The python sdk for docker is really out of date, you need to install The python sdk for docker is really out of date, you need to install
a more recent version of it in order to use this tool. a more recent version of it in order to use this tool.
# - name: "Fail"
# fail:

View File

@ -7,7 +7,7 @@
- name: "Wait for consul cluster to initialize" # noqa: run-once[task] - name: "Wait for consul cluster to initialize" # noqa: run-once[task]
ansible.builtin.uri: ansible.builtin.uri:
url: "http://{{ api_interface_address }}:8500" url: "http://{{ api_interface_address }}:8500" # TODO: this should be dynamic (http/https)
validate_certs: no validate_certs: no
return_content: yes return_content: yes
status_code: status_code:
@ -19,6 +19,7 @@
- name: "Initialize consul cluster" # noqa: run-once[task] - name: "Initialize consul cluster" # noqa: run-once[task]
community.general.consul_acl_bootstrap: community.general.consul_acl_bootstrap:
bootstrap_secret: "{{ _credentials.consul.root_token.secret_id }}"
host: "{{ hashi_consul_configuration['advertise_addr'] }}" host: "{{ hashi_consul_configuration['advertise_addr'] }}"
port: 8500 port: 8500
scheme: http scheme: http
@ -28,27 +29,27 @@
register: _consul_init_secret register: _consul_init_secret
when: hashi_consul_configuration.acl.enabled when: hashi_consul_configuration.acl.enabled
- name: "Write consul configuration to file" # noqa: run-once[task] no-handler # - name: "Write consul configuration to file" # noqa: run-once[task] no-handler
ansible.builtin.blockinfile: # ansible.builtin.blockinfile:
marker: "## -- {root_token} ANSIBLE MANAGED BLOCK ##" # marker: "## -- {root_token} ANSIBLE MANAGED BLOCK ##"
block: "{{ # block: "{{
{ # {
'root_token':{ # 'root_token':{
'accessor_id': _consul_init_secret.result.AccessorID, # 'accessor_id': _consul_init_secret.result.AccessorID,
'secret_id': _consul_init_secret.result.SecretID # 'secret_id': _consul_init_secret.result.SecretID
} # }
} | to_nice_yaml # } | to_nice_yaml
}}" # }}"
path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml" # path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
mode: "0644" # mode: "0644"
when: _consul_init_secret.result is defined # when: _consul_init_secret.result is defined
run_once: true # run_once: true
delegate_to: localhost # delegate_to: localhost
- name: "Load consul cluster variables" # - name: "Load consul cluster variables"
ansible.builtin.include_vars: # ansible.builtin.include_vars:
file: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml" # file: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
name: _consul_cluster_config # name: _consul_cluster_config
- name: "Create consul agents token" - name: "Create consul agents token"
when: when:
@ -57,14 +58,14 @@
block: block:
- name: "Create consul agents token" # noqa: run-once[task] no-handler - name: "Create consul agents token" # noqa: run-once[task] no-handler
run_once: true run_once: true
delegate_to: localhost
block: block:
- name: "Create consul agent policy" - name: "Create consul agent policy"
community.general.consul_policy: community.general.consul_policy:
host: "{{ hashi_consul_configuration['advertise_addr'] }}" token: "{{ _credentials.consul.root_token.secret_id }}"
token: "{{ _consul_cluster_config.root_token.secret_id }}" host: "{{ api_interface_address }}"
port: 8500 port: 8500
scheme: http scheme: http # TODO: this should be dynamic
validate_certs: false
state: present state: present
name: agents-policy name: agents-policy
rules: "{{ consul_default_agent_policy }}" rules: "{{ consul_default_agent_policy }}"
@ -74,55 +75,65 @@
vars: vars:
consul_full_url: "http://{{ hashi_consul_configuration['advertise_addr'] }}:8500" consul_full_url: "http://{{ hashi_consul_configuration['advertise_addr'] }}:8500"
consul_token_body: consul_token_body:
Description: "Consul agents token"
SecretID: "{{ _credentials.consul.tokens.agent }}"
Policies: Policies:
- ID: "{{ _consul_agent_policy.policy.ID }}" - ID: "{{ _consul_agent_policy.policy.ID }}"
ansible.builtin.uri: ansible.builtin.uri:
url: "{{ consul_full_url }}/v1/acl/token" url: "{{ consul_full_url }}/v1/acl/token"
method: PUT method: PUT
headers: headers:
X-Consul-Token: "{{ _consul_cluster_config.root_token.secret_id }}" X-Consul-Token: "{{ _credentials.consul.root_token.secret_id }}"
body: "{{ consul_token_body | to_json }}" body: "{{ consul_token_body | to_json }}"
status_code: status_code:
- 200 - 200
register: _consul_agent_token register: _consul_agent_token
changed_when: _consul_agent_token.status == 200
- name: "Write consul agents token to file" # no-handler - name: "Restart consul service"
ansible.builtin.blockinfile: ansible.builtin.service:
marker: "## -- {tokens} ANSIBLE MANAGED BLOCK ##" name: "consul_container"
block: "{{ state: restarted
{ throttle: 1
'tokens':{ when: _consul_agent_token.changed
'agent': _consul_agent_token.json.SecretID
}
} | to_nice_yaml
}}"
path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
mode: "0644"
when: "'OK' in _consul_agent_token.msg"
- name: "Merge token configuration" # - name: "Write consul agents token to file" # no-handler
delegate_to: localhost # ansible.builtin.blockinfile:
block: # marker: "## -- {tokens} ANSIBLE MANAGED BLOCK ##"
- name: "Stat consul secrets file" # block: "{{
ansible.builtin.stat: # {
path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml" # 'tokens':{
register: _consul_config_file # 'agent': _consul_agent_token.json.SecretID
# }
# } | to_nice_yaml
# }}"
# path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
# mode: "0644"
# when: "'OK' in _consul_agent_token.msg"
- name: "Load consul secrets file" # - name: "Merge token configuration"
ansible.builtin.include_vars: # delegate_to: localhost
file: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml" # block:
name: _consul_cluster_config # - name: "Stat consul secrets file"
when: _consul_config_file.stat.exists # ansible.builtin.stat:
# path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
# register: _consul_config_file
#
# - name: "Load consul secrets file"
# ansible.builtin.include_vars:
# file: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
# name: _consul_cluster_config
# when: _consul_config_file.stat.exists
#
# - name: "Merge token configuration"
# vars:
# _config_to_merge:
# acl:
# tokens: "{{ _consul_cluster_config.tokens }}"
# ansible.builtin.set_fact:
# hashi_consul_configuration: "{{ hashi_consul_configuration | default({}) | combine(_config_to_merge, recursive=true) }}"
# when: _consul_cluster_config.tokens is defined
- name: "Merge token configuration" # - name: "Include ednz_cloud.hashistack.hashicorp_consul"
vars: # ansible.builtin.include_role:
_config_to_merge: # name: ednz_cloud.hashistack.hashicorp_consul
acl:
tokens: "{{ _consul_cluster_config.tokens }}"
ansible.builtin.set_fact:
hashi_consul_configuration: "{{ hashi_consul_configuration | default({}) | combine(_config_to_merge, recursive=true) }}"
when: _consul_cluster_config.tokens is defined
- name: "Include ednz_cloud.hashistack.hashicorp_consul"
ansible.builtin.include_role:
name: ednz_cloud.hashistack.hashicorp_consul

View File

@ -36,35 +36,14 @@
- name: "Consul | Merge token configuration" - name: "Consul | Merge token configuration"
delegate_to: localhost delegate_to: localhost
block: block:
- name: "Consul | Stat consul secrets file"
ansible.builtin.stat:
path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
register: _consul_config_file
- name: "Consul | Load consul secrets file"
ansible.builtin.include_vars:
file: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
name: _consul_cluster_config
when: _consul_config_file.stat.exists
- name: "Consul | Merge token configuration" - name: "Consul | Merge token configuration"
vars: vars:
_config_to_merge: _config_to_merge:
acl: acl:
tokens: "{{ _consul_cluster_config.tokens }}" tokens:
agent: "{{ _credentials.consul.tokens.agent }}"
ansible.builtin.set_fact: ansible.builtin.set_fact:
hashi_consul_configuration: "{{ hashi_consul_configuration | default({}) | combine(_config_to_merge, recursive=true) }}" hashi_consul_configuration: "{{ hashi_consul_configuration | default({}) | combine(_config_to_merge, recursive=true) }}"
when: _consul_cluster_config.tokens is defined
- name: "Consul | Create secrets file if not present"
ansible.builtin.file:
path: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
state: touch
owner: "{{ lookup('env', 'USER') }}"
group: "{{ lookup('env', 'USER') }}"
mode: "0644"
run_once: true
when: not _consul_config_file.stat.exists
- name: "Consul | Merge extra configuration settings" - name: "Consul | Merge extra configuration settings"
vars: vars:

View File

@ -12,14 +12,9 @@
- name: "Register haproxy services in consul" - name: "Register haproxy services in consul"
when: enable_consul | bool when: enable_consul | bool
block: block:
- name: "Load consul cluster variables"
ansible.builtin.include_vars:
file: "{{ sub_configuration_directories.consul_servers }}/consul_config.yml"
name: _consul_cluster_config
- name: "Register haproxy services in consul" - name: "Register haproxy services in consul"
community.general.consul: community.general.consul:
token: "{{ _consul_cluster_config.root_token.secret_id }}" token: "{{ _credentials.consul.root_token.secret_id }}"
service_name: haproxy service_name: haproxy
service_port: 80 service_port: 80
interval: 20s interval: 20s

View File

@ -1,68 +1,20 @@
--- ---
# hashistack variable injection playbook # hashistack variable injection playbook
- name: "Load global variables" - name: "Load global variables"
block: ansible.builtin.import_tasks:
- name: "Stat global configuration file" file: misc/load_global_vars.yml
ansible.builtin.stat:
path: "{{ configuration_directory }}/{{ configuration_global_vars_file }}"
register: _global_config_file
delegate_to: localhost
- name: "Make sure global configuration file exists" - name: "Load credentials variables"
ansible.builtin.assert: ansible.builtin.import_tasks:
that: file: misc/load_credentials_vars.yml
- _global_config_file.stat.exists
delegate_to: localhost
- name: "Load global variables"
ansible.builtin.include_vars:
dir: "{{ configuration_directory }}"
files_matching: "{{ configuration_global_vars_file }}"
depth: 1
delegate_to: localhost
- name: "Load group specific variables" - name: "Load group specific variables"
block: ansible.builtin.import_tasks:
- name: "Stat group specific config file" file: misc/load_group_vars.yml
ansible.builtin.stat:
path: "{{ configuration_directory }}/{{ group_name }}/{{ configuration_global_vars_file }}"
register: _group_config_file
loop: "{{ group_names }}"
loop_control:
loop_var: group_name
- name: Load group specific variables
ansible.builtin.include_vars:
dir: "{{ configuration_directory }}/{{ item.group_name }}"
files_matching: "{{ configuration_global_vars_file }}"
depth: 1
loop: "{{ _group_config_file.results }}"
when: item.stat.exists
and item.group_name in group_names
loop_control:
loop_var: item
delegate_to: localhost
- name: "Load host specific variables" - name: "Load host specific variables"
block: ansible.builtin.import_tasks:
- name: "Stat host specific config file" file: misc/load_host_vars.yml
ansible.builtin.stat:
path: "{{ configuration_directory }}/{{ group_name }}/{{ inventory_hostname }}/{{ configuration_global_vars_file }}"
register: _host_config_file
loop: "{{ group_names }}"
loop_control:
loop_var: group_name
delegate_to: localhost
- name: Load host specific variables
ansible.builtin.include_vars:
dir: "{{ configuration_directory }}/{{ item.group_name }}/{{ inventory_hostname }}"
files_matching: "{{ configuration_global_vars_file }}"
loop: "{{ _host_config_file.results }}"
when: item.stat.exists
loop_control:
loop_var: item
delegate_to: localhost
- name: "Ensure remote directories exists" - name: "Ensure remote directories exists"
ansible.builtin.file: ansible.builtin.file:
@ -77,72 +29,8 @@
- "{{ hashistack_remote_data_dir }}" - "{{ hashistack_remote_data_dir }}"
- name: "Load custom CA certificates" - name: "Load custom CA certificates"
block: ansible.builtin.import_tasks:
- name: "Check if CA directory exists" file: misc/load_ca_certificates.yml
ansible.builtin.stat:
path: "{{ sub_configuration_directories['certificates'] }}/ca"
register: _hashistack_ca_directory
delegate_to: localhost
- name: "Find custom ca certificates to copy"
ansible.builtin.find:
paths: "{{ sub_configuration_directories['certificates'] }}/ca"
patterns: "*.crt"
register: _hashistack_cacert_files
delegate_to: localhost
when: _hashistack_ca_directory.stat.exists and _hashistack_ca_directory.stat.isdir
- ansible.builtin.debug:
msg: "{{ _hashistack_cacert_files }}"
- name: "Ensure remote ca directory exists"
ansible.builtin.file:
path: "{{ hashistack_remote_config_dir }}/ca"
state: directory
owner: root
group: root
mode: 0755
- name: "Copy custom ca certificates"
ansible.builtin.copy:
src: "{{ item.path }}"
dest: "{{ hashistack_remote_config_dir }}/ca/{{ item.path | basename }}"
owner: root
group: root
mode: 0644
loop: "{{ _hashistack_cacert_files.files }}"
register: _hashistack_copied_ca
- name: "Copy and update trust store"
block:
- name: "Copy ca certificates to /usr/loca/share/ca-certificates"
ansible.builtin.file:
state: link
src: "{{ item.dest }}"
dest: "/usr/local/share/ca-certificates/hashistack-customca-{{ item.dest | basename }}"
owner: root
group: root
loop: "{{ _hashistack_copied_ca.results }}"
register: _hashistack_usr_local_share_ca_certificates
- name: "Update the trust store"
ansible.builtin.command: update-ca-certificates
changed_when: false
when: _hashistack_usr_local_share_ca_certificates.changed
# - name: "Initialize list of CA certificates"
# ansible.builtin.set_fact:
# hashistack_cacert_extra_files: []
# delegate_to: localhost
# - name: "Add custom CA to list of extra certificates"
# ansible.builtin.set_fact:
# hashistack_cacert_extra_files: "{{
# hashistack_cacert_extra_files | default([])
# + [{'src': item.path, 'dest': '/etc/ssl/certs/hashistack-custom-' + item.path | basename}] }}"
# loop: "{{ _hashistack_cacert_files.files }}"
# delegate_to: localhost
# when: _hashistack_cacert_files.matched > 0
- name: "Merge consul configurations" - name: "Merge consul configurations"
ansible.builtin.import_tasks: ansible.builtin.import_tasks:
@ -157,10 +45,3 @@
when: when:
- enable_vault | bool - enable_vault | bool
- "'vault_servers' in group_names" - "'vault_servers' in group_names"
- debug:
msg: "{{ deploy_haproxy_frontends }}"
- debug:
msg: "{{ deploy_haproxy_backends }}"
# - fail:

View File

@ -0,0 +1,216 @@
---
# hashistack variable injection playbook
- name: "Load global variables"
block:
- name: "Stat global configuration file"
ansible.builtin.stat:
path: "{{ configuration_directory }}/{{ configuration_global_vars_file }}"
register: _global_config_file
delegate_to: localhost
- name: "Make sure global configuration file exists"
ansible.builtin.assert:
that:
- _global_config_file.stat.exists
fail_msg: >-
Main configuration file {{ _global_config_file.stat.path }} was not found, cannot continue without it.
delegate_to: localhost
- name: "Load global variables"
ansible.builtin.include_vars:
dir: "{{ configuration_directory }}"
files_matching: "{{ configuration_global_vars_file }}"
depth: 1
delegate_to: localhost
- name: "Load credentials variables"
block:
- name: "Stat credentials file"
ansible.builtin.stat:
path: "{{ sub_configuration_directories['secrets'] }}/{{ configuration_credentials_vars_file }}"
register: _credentials_file
delegate_to: localhost
- name: "Stat vault credentials file"
ansible.builtin.stat:
path: "{{ sub_configuration_directories['secrets'] }}/vault.yml"
register: _vault_credentials_file
delegate_to: localhost
- name: "Make sure credentials file exists"
ansible.builtin.assert:
that:
- _credentials_file.stat.exists
fail_msg: >-
Credentials file {{ _credentials_file.stat.path }} was not found, cannot continue without it.
delegate_to: localhost
- name: "Load credentials variables"
ansible.builtin.include_vars:
dir: "{{ sub_configuration_directories['secrets'] }}"
files_matching: "{{ configuration_credentials_vars_file }}"
depth: 1
name: _credentials
delegate_to: localhost
- name: "Load vault credentials if vault.yml exists"
ansible.builtin.include_vars:
dir: "{{ sub_configuration_directories['secrets'] }}"
files_matching: "vault.yml"
depth: 1
name: _vault_credentials
when: _vault_credentials_file.stat.exists
delegate_to: localhost
- name: "Merge vault credentials into _credentials"
vars:
_config_to_merge:
vault: "{{ _vault_credentials }}"
ansible.builtin.set_fact:
_credentials: "{{ _credentials | combine(_vault_credentials, recursive=true) }}"
when: _vault_credentials_file.stat.exists
delegate_to: localhost
- name: "Load group specific variables"
block:
- name: "Stat group specific config file"
ansible.builtin.stat:
path: "{{ configuration_directory }}/{{ group_name }}/{{ configuration_global_vars_file }}"
register: _group_config_file
loop: "{{ group_names }}"
loop_control:
loop_var: group_name
- name: Load group specific variables
ansible.builtin.include_vars:
dir: "{{ configuration_directory }}/{{ item.group_name }}"
files_matching: "{{ configuration_global_vars_file }}"
depth: 1
loop: "{{ _group_config_file.results }}"
when: item.stat.exists
and item.group_name in group_names
loop_control:
loop_var: item
delegate_to: localhost
- name: "Load host specific variables"
block:
- name: "Stat host specific config file"
ansible.builtin.stat:
path: "{{ configuration_directory }}/{{ group_name }}/{{ inventory_hostname }}/{{ configuration_global_vars_file }}"
register: _host_config_file
loop: "{{ group_names }}"
loop_control:
loop_var: group_name
delegate_to: localhost
- name: Load host specific variables
ansible.builtin.include_vars:
dir: "{{ configuration_directory }}/{{ item.group_name }}/{{ inventory_hostname }}"
files_matching: "{{ configuration_global_vars_file }}"
loop: "{{ _host_config_file.results }}"
when: item.stat.exists
loop_control:
loop_var: item
delegate_to: localhost
- name: "Ensure remote directories exists"
ansible.builtin.file:
path: "{{ item }}"
state: directory
owner: root
group: root
mode: 0755
recurse: yes
loop:
- "{{ hashistack_remote_config_dir }}"
- "{{ hashistack_remote_data_dir }}"
- name: "Load custom CA certificates"
block:
- name: "Check if CA directory exists"
ansible.builtin.stat:
path: "{{ sub_configuration_directories['certificates'] }}/ca"
register: _hashistack_ca_directory
delegate_to: localhost
- name: "Find custom ca certificates to copy"
ansible.builtin.find:
paths: "{{ sub_configuration_directories['certificates'] }}/ca"
patterns: "*.crt"
register: _hashistack_cacert_files
delegate_to: localhost
when: _hashistack_ca_directory.stat.exists and _hashistack_ca_directory.stat.isdir
- ansible.builtin.debug:
msg: "{{ _hashistack_cacert_files }}"
- name: "Ensure remote ca directory exists"
ansible.builtin.file:
path: "{{ hashistack_remote_config_dir }}/ca"
state: directory
owner: root
group: root
mode: 0755
- name: "Copy custom ca certificates"
ansible.builtin.copy:
src: "{{ item.path }}"
dest: "{{ hashistack_remote_config_dir }}/ca/{{ item.path | basename }}"
owner: root
group: root
mode: 0644
loop: "{{ _hashistack_cacert_files.files }}"
register: _hashistack_copied_ca
- name: "Copy and update trust store"
block:
- name: "Copy ca certificates to /usr/loca/share/ca-certificates"
ansible.builtin.file:
state: link
src: "{{ item.dest }}"
dest: "/usr/local/share/ca-certificates/hashistack-customca-{{ item.dest | basename }}"
owner: root
group: root
loop: "{{ _hashistack_copied_ca.results }}"
register: _hashistack_usr_local_share_ca_certificates
- name: "Update the trust store"
ansible.builtin.command: update-ca-certificates
changed_when: false
when: _hashistack_usr_local_share_ca_certificates.changed
# - name: "Initialize list of CA certificates"
# ansible.builtin.set_fact:
# hashistack_cacert_extra_files: []
# delegate_to: localhost
# - name: "Add custom CA to list of extra certificates"
# ansible.builtin.set_fact:
# hashistack_cacert_extra_files: "{{
# hashistack_cacert_extra_files | default([])
# + [{'src': item.path, 'dest': '/etc/ssl/certs/hashistack-custom-' + item.path | basename}] }}"
# loop: "{{ _hashistack_cacert_files.files }}"
# delegate_to: localhost
# when: _hashistack_cacert_files.matched > 0
- name: "Merge consul configurations"
ansible.builtin.import_tasks:
file: "consul/consul_vars.yml"
when:
- enable_consul | bool
- "('consul_servers' in group_names) or ('consul_agents' in group_names)"
- name: "Merge vault configurations"
ansible.builtin.import_tasks:
file: "vault/vault_vars.yml"
when:
- enable_vault | bool
- "'vault_servers' in group_names"
- debug:
msg: "{{ deploy_haproxy_frontends }}"
- debug:
msg: "{{ deploy_haproxy_backends }}"
# - fail:

View File

@ -0,0 +1,52 @@
---
- name: "Check if CA directory exists"
ansible.builtin.stat:
path: "{{ sub_configuration_directories['certificates'] }}/ca"
register: _hashistack_ca_directory
delegate_to: localhost
- name: "Find custom ca certificates to copy"
ansible.builtin.find:
paths: "{{ sub_configuration_directories['certificates'] }}/ca"
patterns: "*.crt"
register: _hashistack_cacert_files
delegate_to: localhost
when: _hashistack_ca_directory.stat.exists and _hashistack_ca_directory.stat.isdir
- ansible.builtin.debug:
msg: "{{ _hashistack_cacert_files }}"
- name: "Ensure remote ca directory exists"
ansible.builtin.file:
path: "{{ hashistack_remote_config_dir }}/ca"
state: directory
owner: root
group: root
mode: 0755
- name: "Copy custom ca certificates"
ansible.builtin.copy:
src: "{{ item.path }}"
dest: "{{ hashistack_remote_config_dir }}/ca/{{ item.path | basename }}"
owner: root
group: root
mode: 0644
loop: "{{ _hashistack_cacert_files.files }}"
register: _hashistack_copied_ca
- name: "Copy and update trust store"
block:
- name: "Copy ca certificates to /usr/loca/share/ca-certificates"
ansible.builtin.file:
state: link
src: "{{ item.dest }}"
dest: "/usr/local/share/ca-certificates/hashistack-customca-{{ item.dest | basename }}"
owner: root
group: root
loop: "{{ _hashistack_copied_ca.results }}"
register: _hashistack_usr_local_share_ca_certificates
- name: "Update the trust store"
ansible.builtin.command: update-ca-certificates
changed_when: false
when: _hashistack_usr_local_share_ca_certificates.changed

View File

@ -0,0 +1,50 @@
---
- name: "Stat credentials file"
ansible.builtin.stat:
path: "{{ sub_configuration_directories['secrets'] }}/{{ configuration_credentials_vars_file }}"
register: _credentials_file
delegate_to: localhost
- name: "Stat vault credentials file"
ansible.builtin.stat:
path: "{{ sub_configuration_directories['secrets'] }}/vault.yml"
register: _vault_credentials_file
delegate_to: localhost
- name: "Make sure credentials file exists"
ansible.builtin.assert:
that:
- _credentials_file.stat.exists
fail_msg: >-
Credentials file {{ _credentials_file.stat.path }} was not found, cannot continue without it.
delegate_to: localhost
- name: "Load credentials variables"
ansible.builtin.include_vars:
dir: "{{ sub_configuration_directories['secrets'] }}"
files_matching: "{{ configuration_credentials_vars_file }}"
depth: 1
name: _credentials
delegate_to: localhost
- name: "Load vault credentials if vault.yml exists"
ansible.builtin.include_vars:
dir: "{{ sub_configuration_directories['secrets'] }}"
files_matching: "vault.yml"
depth: 1
name: _vault_credentials
when: _vault_credentials_file.stat.exists
delegate_to: localhost
- name: "Merge vault credentials into _credentials"
vars:
_config_to_merge:
vault: "{{ _vault_credentials }}"
ansible.builtin.set_fact:
_credentials: "{{ _credentials | combine(_config_to_merge, recursive=true) }}"
when: _vault_credentials_file.stat.exists
delegate_to: localhost
- name: "Debug _credentials"
ansible.builtin.debug:
msg: "{{ _credentials }}"

View File

@ -0,0 +1,21 @@
---
- name: "Stat global configuration file"
ansible.builtin.stat:
path: "{{ configuration_directory }}/{{ configuration_global_vars_file }}"
register: _global_config_file
delegate_to: localhost
- name: "Make sure global configuration file exists"
ansible.builtin.assert:
that:
- _global_config_file.stat.exists
fail_msg: >-
Main configuration file {{ _global_config_file.stat.path }} was not found, cannot continue without it.
delegate_to: localhost
- name: "Load global variables"
ansible.builtin.include_vars:
dir: "{{ configuration_directory }}"
files_matching: "{{ configuration_global_vars_file }}"
depth: 1
delegate_to: localhost

View File

@ -0,0 +1,20 @@
---
- name: "Stat group specific config file"
ansible.builtin.stat:
path: "{{ configuration_directory }}/{{ group_name }}/{{ configuration_global_vars_file }}"
register: _group_config_file
loop: "{{ group_names }}"
loop_control:
loop_var: group_name
- name: Load group specific variables
ansible.builtin.include_vars:
dir: "{{ configuration_directory }}/{{ item.group_name }}"
files_matching: "{{ configuration_global_vars_file }}"
depth: 1
loop: "{{ _group_config_file.results }}"
when: item.stat.exists
and item.group_name in group_names
loop_control:
loop_var: item
delegate_to: localhost

View File

@ -0,0 +1,19 @@
---
- name: "Stat host specific config file"
ansible.builtin.stat:
path: "{{ configuration_directory }}/{{ group_name }}/{{ inventory_hostname }}/{{ configuration_global_vars_file }}"
register: _host_config_file
loop: "{{ group_names }}"
loop_control:
loop_var: group_name
delegate_to: localhost
- name: Load host specific variables
ansible.builtin.include_vars:
dir: "{{ configuration_directory }}/{{ item.group_name }}/{{ inventory_hostname }}"
files_matching: "{{ configuration_global_vars_file }}"
loop: "{{ _host_config_file.results }}"
when: item.stat.exists
loop_control:
loop_var: item
delegate_to: localhost

View File

@ -20,8 +20,8 @@
- name: "Write vault configuration to file" # noqa: run-once[task] no-handler - name: "Write vault configuration to file" # noqa: run-once[task] no-handler
ansible.builtin.copy: ansible.builtin.copy:
content: "{{ _vault_init_secret.state | to_nice_yaml}}" content: "{{ _vault_init_secret.state | to_nice_yaml(indent=2) }}"
dest: "{{ sub_configuration_directories.vault_servers }}/vault_config.yml" dest: "{{ sub_configuration_directories.secrets }}/vault.yml"
owner: "{{ lookup('env', 'USER') }}" owner: "{{ lookup('env', 'USER') }}"
group: "{{ lookup('env', 'USER') }}" group: "{{ lookup('env', 'USER') }}"
mode: "0644" mode: "0644"
@ -29,16 +29,20 @@
run_once: true run_once: true
delegate_to: localhost delegate_to: localhost
# - name: "Load vault cluster variables necessary for unseal operation"
# ansible.builtin.include_vars:
# file: "{{ sub_configuration_directories.vault_servers }}/vault_config.yml"
# name: _vault_cluster_config
- name: "Load vault cluster variables necessary for unseal operation" - name: "Load vault cluster variables necessary for unseal operation"
ansible.builtin.include_vars: ansible.builtin.import_tasks:
file: "{{ sub_configuration_directories.vault_servers }}/vault_config.yml" file: ../misc/load_credentials_vars.yml
name: _vault_cluster_config
- name: "Unseal the bootstrap node" # noqa: run-once[task] no-handler - name: "Unseal the bootstrap node" # noqa: run-once[task] no-handler
ednz_cloud.hashistack.vault_unseal: ednz_cloud.hashistack.vault_unseal:
api_url: "{{ hashi_vault_configuration['api_addr'] }}" api_url: "{{ hashi_vault_configuration['api_addr'] }}"
tls_verify: "{{ vault_tls_verify }}" tls_verify: "{{ vault_tls_verify }}"
key_shares: "{{ _vault_cluster_config['keys'] }}" key_shares: "{{ _credentials.vault['keys'] }}"
run_once: true run_once: true
delegate_to: "{{ groups['vault_servers'] | first }}" delegate_to: "{{ groups['vault_servers'] | first }}"
when: _vault_init_secret.changed when: _vault_init_secret.changed
@ -48,7 +52,7 @@
ednz_cloud.hashistack.vault_unseal: ednz_cloud.hashistack.vault_unseal:
api_url: "{{ hashi_vault_configuration['api_addr'] }}" api_url: "{{ hashi_vault_configuration['api_addr'] }}"
tls_verify: "{{ vault_tls_verify }}" tls_verify: "{{ vault_tls_verify }}"
key_shares: "{{ _vault_cluster_config['keys'] }}" key_shares: "{{ _credentials.vault['keys'] }}"
retries: 5 retries: 5
delay: 5 delay: 5
until: _unseal_status.changed or not _unseal_status.failed until: _unseal_status.changed or not _unseal_status.failed

View File

@ -0,0 +1,8 @@
---
consul:
root_token:
secret_id: "{{ _consul_root_token }}"
tokens:
agent: "{{ _consul_agents_token }}"
nomad:
root_token: "{{ _nomad_root_token }}"