hcp-ansible/playbooks/preflight.yml
Bertrand Lanson 4886443739
Some checks failed
development / Check commit compliance (push) Successful in 39s
test / Retrieve Credentials (pull_request) Successful in 28s
pull-requests-open / Check commit compliance (pull_request) Successful in 10s
test / end_to_end_vault (vault_with_raft_enabled, ubuntu2404) (pull_request) Successful in 1m59s
test / end_to_end_vault (vault_with_raft_enabled, ubuntu2004) (pull_request) Successful in 2m33s
test / end_to_end_vault (vault_with_raft_enabled, ubuntu2204) (pull_request) Successful in 2m17s
test / end_to_end_consul (consul_default, debian11) (pull_request) Successful in 1m8s
test / end_to_end_consul (consul_default, debian12) (pull_request) Successful in 1m9s
test / end_to_end_consul (consul_default, ubuntu2004) (pull_request) Successful in 1m17s
test / end_to_end_consul (consul_default, ubuntu2204) (pull_request) Successful in 1m40s
test / end_to_end_consul (consul_default, ubuntu2404) (pull_request) Successful in 1m40s
test / end_to_end_consul (consul_with_acl_enabled, debian11) (pull_request) Successful in 1m44s
test / end_to_end_consul (consul_with_acl_enabled, ubuntu2004) (pull_request) Successful in 1m18s
test / end_to_end_consul (consul_with_acl_enabled, debian12) (pull_request) Successful in 1m30s
test / end_to_end_consul (consul_with_acl_enabled, ubuntu2204) (pull_request) Successful in 1m17s
test / end_to_end_nomad (nomad_default, debian11) (pull_request) Successful in 1m9s
test / end_to_end_consul (consul_with_acl_enabled, ubuntu2404) (pull_request) Successful in 1m20s
test / end_to_end_nomad (nomad_default, ubuntu2204) (pull_request) Successful in 1m52s
test / end_to_end_nomad (nomad_with_acl_enabled, debian11) (pull_request) Successful in 1m10s
test / end_to_end_nomad (nomad_with_acl_enabled, debian12) (pull_request) Successful in 1m14s
test / end_to_end_nomad (nomad_with_acl_enabled, ubuntu2004) (pull_request) Successful in 1m16s
test / end_to_end_nomad (nomad_with_acl_enabled, ubuntu2204) (pull_request) Successful in 1m16s
test / end_to_end_nomad (nomad_with_acl_enabled, ubuntu2404) (pull_request) Successful in 1m47s
test / end_to_end_vault (vault_default, debian11) (pull_request) Successful in 1m44s
test / end_to_end_vault (vault_default, debian12) (pull_request) Successful in 1m16s
test / end_to_end_vault (vault_default, ubuntu2004) (pull_request) Successful in 1m26s
test / end_to_end_vault (vault_default, ubuntu2204) (pull_request) Successful in 1m24s
test / end_to_end_vault (vault_default, ubuntu2404) (pull_request) Successful in 1m25s
test / end_to_end_vault (vault_with_raft_enabled, debian11) (pull_request) Successful in 1m22s
test / end_to_end_vault (vault_with_raft_enabled, debian12) (pull_request) Successful in 1m25s
test / end_to_end_nomad (nomad_default, debian12) (pull_request) Successful in 1m9s
test / end_to_end_nomad (nomad_default, ubuntu2404) (pull_request) Successful in 1m19s
test / end_to_end_nomad (nomad_default, ubuntu2004) (pull_request) Successful in 1m17s
build-deploy / Bump version and create changelog with commitizen (push) Has been cancelled
fix: remove mentions of haproxy_servers, as the feature is deprecated
2024-10-06 12:22:40 +02:00

241 lines
9.4 KiB
YAML

---
# hashistack deployment playbook
- name: "Preflight"
hosts: all, !deployment
strategy: linear
gather_facts: true
become: true
tasks:
- name: "Import variables"
ansible.builtin.include_role:
name: ednz_cloud.hashistack.hashistack
tags:
- always
- name: "Checking vault inventory"
ansible.builtin.assert:
that:
- groups['vault_servers'] is defined
- groups['vault_servers'] | length > 0
fail_msg: >-
The variable `enable_vault` is set to yes, but the vault_servers
group is empty or undefined. You need to set the vault_servers group and populate it,
or set `enable_vault` to no.
when:
- enable_vault | bool
- name: "Checking consul inventory"
ansible.builtin.assert:
that:
- groups['consul_servers'] is defined
- groups['consul_servers'] | length > 0
fail_msg: >-
The variable `enable_consul` is set to yes, but the consul_servers
group is empty or undefined. You need to set the consul_servers group and populate it,
or set `enable_consul` to no.
when:
- enable_consul | bool
- name: "Checking nomad inventory"
ansible.builtin.assert:
that:
- groups['nomad_servers'] is defined
- groups['nomad_servers'] | length > 0
fail_msg: >-
The variable `enable_nomad` is set to yes, but the nomad_servers
group is empty or undefined. You need to set the nomad_servers group and populate it,
or set `enable_nomad` to no.
when:
- enable_nomad | bool
- name: "Checking directory {{ hashistack_configuration_directory }}" # noqa: run-once[task]
delegate_to: localhost
run_once: true
block:
- name: "Stat directory {{ hashistack_configuration_directory }}"
ansible.builtin.stat:
path: "{{ hashistack_configuration_directory }}"
register: _stat_config_dir
- name: "Make sure directory exists: {{ hashistack_configuration_directory }}"
ansible.builtin.assert:
that:
- _stat_config_dir.stat.exists
- _stat_config_dir.stat.isdir
- _stat_config_dir.stat.writeable
- name: "Checking host OS distribution"
# TODO: This needs to work with debian and ubuntu, major version works for debian but not ubuntu, simple version works the other way around...
# ? seems to work
ansible.builtin.assert:
that:
- "(ansible_facts.distribution | lower) in hashistack_supported_distributions"
- "(ansible_facts.distribution_version in hashistack_supported_distribution_versions[(ansible_facts.distribution | lower)]) or
(ansible_facts.distribution_major_version in hashistack_supported_distribution_versions[(ansible_facts.distribution | lower)])"
fail_msg: >-
Distribution: {{ ansible_facts.distribution }}
Release: {{ ansible_facts.distribution_release }}
Version: {{ ansible_facts.distribution_version }}
This distribution is not supported.
Supported releases are:
{{ hashistack_supported_distribution_versions[(ansible_facts.distribution | lower)] }}
- name: "Verify host clocks"
when: preflight_enable_host_ntp_checks | bool
block:
- name: "Checking for a running NTP daemon on hosts" # noqa command-instead-of-module
vars:
preflight_host_ntp_daemons:
- chrony
- chronyd
- ntp
- ntpd
- systemd-timesyncd
become: true
ansible.builtin.command:
cmd: "systemctl is-active {{ preflight_host_ntp_daemons | join(' ') }}"
register: _ntp_daemons_active
changed_when: false
failed_when: false
check_mode: false
- name: "Fail if a NTP daemon is not running"
ansible.builtin.fail:
msg: >-
No host NTP daemon is running.
Please install and configure a host NTP daemon.
Alternatively, set 'preflight_enable_host_ntp_checks' to 'false' to
disable this check if not using one of the following NTP daemons:
chrony, ntpd, systemd-timesyncd.
when:
- _ntp_daemons_active.rc != 0
- name: "Checking timedatectl status"
become: true
ansible.builtin.command: timedatectl status
register: timedatectl_status
changed_when: false
check_mode: false
- name: "Fail if the clock is not synchronized"
ansible.builtin.fail:
msg: >-
timedatectl sees the system clock as unsynchronized.
Please wait for synchronization.
Alternatively, set 'preflight_enable_host_ntp_checks' to 'false' to
disable this check if your NTP daemon is not recognised by
'timedatectl status'.
when:
- "'synchronized: yes' not in timedatectl_status.stdout"
- name: "Ensure /etc/localtime exists"
ansible.builtin.stat:
path: /etc/localtime
register: _etc_localtime
- name: "Fail if /etc/localtime is absent"
ansible.builtin.fail:
msg: >-
/etc/localtime is not found. This file is used for system-wide time
settings and needs to be mounted to containers.
when: not _etc_localtime.stat.exists
- name: "Ensure /etc/timezone exists"
ansible.builtin.stat:
path: /etc/timezone
register: _etc_timezone
- name: "Fail if /etc/timezone is absent"
ansible.builtin.fail:
msg: >-
/etc/timezone is not found. This file is used for system-wide timezone
settings and needs to be mounted to containers.
when: not _etc_timezone.stat.exists
- name: "Checking the api_interface is present"
ansible.builtin.fail:
msg: "Please check the api_interface property - interface {{ api_interface }} not found"
when: api_interface not in ansible_facts.interfaces
- name: "Verify api interface(s)"
when: inventory_hostname not in groups['deployment'] | default([])
block:
- name: "Checking the api_interface is active"
ansible.builtin.fail:
msg: "Please check the api_interface settings - interface {{ api_interface }} is not active"
when: not hostvars[inventory_hostname].ansible_facts[api_interface]['active']
- name: "Checking the api_interface ip address configuration"
ansible.builtin.fail:
msg: "Please check the api_interface settings - interface {{ api_interface }} ip address problem"
when: api_interface_address is not defined
- name: "Verify required ports"
block:
- name: "Checking if vault ports are available"
when: inventory_hostname in groups['vault_servers']
block:
- name: "Checking if vault ports are available"
ansible.builtin.wait_for:
host: "{{ inventory_hostname }}"
port: "{{ item }}"
state: "stopped"
timeout: 5
loop: "{{ vault_required_ports }}"
ignore_errors: true
register: vault_port_results
- name: "Assert that vault ports are not currently in use"
ansible.builtin.assert:
that:
- item.failed == false
with_items: "{{ vault_port_results.results }}"
when: vault_port_results.results | length > 0
- name: "Checking if consul ports are available"
when: inventory_hostname in groups['consul_servers'] or inventory_hostname in groups['consul_agents']
block:
- name: "Checking if consul ports are available"
ansible.builtin.wait_for:
host: "{{ inventory_hostname }}"
port: "{{ item }}"
state: "stopped"
timeout: 5
loop: "{{ consul_required_ports }}"
ignore_errors: true
register: consul_port_results
- name: "Assert that consul ports are not currently in use"
ansible.builtin.assert:
that:
- item.failed == false
with_items: "{{ consul_port_results.results }}"
when: consul_port_results.results | length > 0
- name: "Checking if nomad ports are available"
when: inventory_hostname in groups['nomad_servers'] or inventory_hostname in groups['nomad_clients']
block:
- name: "Checking if nomad ports are available"
ansible.builtin.wait_for:
host: "{{ inventory_hostname }}"
port: "{{ item }}"
state: "stopped"
timeout: 5
loop: "{{ nomad_required_ports }}"
ignore_errors: true
register: nomad_port_results
- name: "Assert that nomad ports are not currently in use"
ansible.builtin.assert:
that:
- item.failed == false
with_items: "{{ nomad_port_results.results }}"
when: nomad_port_results.results | length > 0
- name: "Checking if system uses systemd"
become: true
ansible.builtin.assert:
that:
- "ansible_facts.service_mgr == 'systemd'"
when: inventory_hostname in groups['common']