Bertrand Lanson
4886443739
Some checks failed
development / Check commit compliance (push) Successful in 39s
test / Retrieve Credentials (pull_request) Successful in 28s
pull-requests-open / Check commit compliance (pull_request) Successful in 10s
test / end_to_end_vault (vault_with_raft_enabled, ubuntu2404) (pull_request) Successful in 1m59s
test / end_to_end_vault (vault_with_raft_enabled, ubuntu2004) (pull_request) Successful in 2m33s
test / end_to_end_vault (vault_with_raft_enabled, ubuntu2204) (pull_request) Successful in 2m17s
test / end_to_end_consul (consul_default, debian11) (pull_request) Successful in 1m8s
test / end_to_end_consul (consul_default, debian12) (pull_request) Successful in 1m9s
test / end_to_end_consul (consul_default, ubuntu2004) (pull_request) Successful in 1m17s
test / end_to_end_consul (consul_default, ubuntu2204) (pull_request) Successful in 1m40s
test / end_to_end_consul (consul_default, ubuntu2404) (pull_request) Successful in 1m40s
test / end_to_end_consul (consul_with_acl_enabled, debian11) (pull_request) Successful in 1m44s
test / end_to_end_consul (consul_with_acl_enabled, ubuntu2004) (pull_request) Successful in 1m18s
test / end_to_end_consul (consul_with_acl_enabled, debian12) (pull_request) Successful in 1m30s
test / end_to_end_consul (consul_with_acl_enabled, ubuntu2204) (pull_request) Successful in 1m17s
test / end_to_end_nomad (nomad_default, debian11) (pull_request) Successful in 1m9s
test / end_to_end_consul (consul_with_acl_enabled, ubuntu2404) (pull_request) Successful in 1m20s
test / end_to_end_nomad (nomad_default, ubuntu2204) (pull_request) Successful in 1m52s
test / end_to_end_nomad (nomad_with_acl_enabled, debian11) (pull_request) Successful in 1m10s
test / end_to_end_nomad (nomad_with_acl_enabled, debian12) (pull_request) Successful in 1m14s
test / end_to_end_nomad (nomad_with_acl_enabled, ubuntu2004) (pull_request) Successful in 1m16s
test / end_to_end_nomad (nomad_with_acl_enabled, ubuntu2204) (pull_request) Successful in 1m16s
test / end_to_end_nomad (nomad_with_acl_enabled, ubuntu2404) (pull_request) Successful in 1m47s
test / end_to_end_vault (vault_default, debian11) (pull_request) Successful in 1m44s
test / end_to_end_vault (vault_default, debian12) (pull_request) Successful in 1m16s
test / end_to_end_vault (vault_default, ubuntu2004) (pull_request) Successful in 1m26s
test / end_to_end_vault (vault_default, ubuntu2204) (pull_request) Successful in 1m24s
test / end_to_end_vault (vault_default, ubuntu2404) (pull_request) Successful in 1m25s
test / end_to_end_vault (vault_with_raft_enabled, debian11) (pull_request) Successful in 1m22s
test / end_to_end_vault (vault_with_raft_enabled, debian12) (pull_request) Successful in 1m25s
test / end_to_end_nomad (nomad_default, debian12) (pull_request) Successful in 1m9s
test / end_to_end_nomad (nomad_default, ubuntu2404) (pull_request) Successful in 1m19s
test / end_to_end_nomad (nomad_default, ubuntu2004) (pull_request) Successful in 1m17s
build-deploy / Bump version and create changelog with commitizen (push) Has been cancelled
241 lines
9.4 KiB
YAML
241 lines
9.4 KiB
YAML
---
|
|
# hashistack deployment playbook
|
|
- name: "Preflight"
|
|
hosts: all, !deployment
|
|
strategy: linear
|
|
gather_facts: true
|
|
become: true
|
|
tasks:
|
|
- name: "Import variables"
|
|
ansible.builtin.include_role:
|
|
name: ednz_cloud.hashistack.hashistack
|
|
tags:
|
|
- always
|
|
|
|
- name: "Checking vault inventory"
|
|
ansible.builtin.assert:
|
|
that:
|
|
- groups['vault_servers'] is defined
|
|
- groups['vault_servers'] | length > 0
|
|
fail_msg: >-
|
|
The variable `enable_vault` is set to yes, but the vault_servers
|
|
group is empty or undefined. You need to set the vault_servers group and populate it,
|
|
or set `enable_vault` to no.
|
|
when:
|
|
- enable_vault | bool
|
|
|
|
- name: "Checking consul inventory"
|
|
ansible.builtin.assert:
|
|
that:
|
|
- groups['consul_servers'] is defined
|
|
- groups['consul_servers'] | length > 0
|
|
fail_msg: >-
|
|
The variable `enable_consul` is set to yes, but the consul_servers
|
|
group is empty or undefined. You need to set the consul_servers group and populate it,
|
|
or set `enable_consul` to no.
|
|
when:
|
|
- enable_consul | bool
|
|
|
|
- name: "Checking nomad inventory"
|
|
ansible.builtin.assert:
|
|
that:
|
|
- groups['nomad_servers'] is defined
|
|
- groups['nomad_servers'] | length > 0
|
|
fail_msg: >-
|
|
The variable `enable_nomad` is set to yes, but the nomad_servers
|
|
group is empty or undefined. You need to set the nomad_servers group and populate it,
|
|
or set `enable_nomad` to no.
|
|
when:
|
|
- enable_nomad | bool
|
|
|
|
- name: "Checking directory {{ hashistack_configuration_directory }}" # noqa: run-once[task]
|
|
delegate_to: localhost
|
|
run_once: true
|
|
block:
|
|
- name: "Stat directory {{ hashistack_configuration_directory }}"
|
|
ansible.builtin.stat:
|
|
path: "{{ hashistack_configuration_directory }}"
|
|
register: _stat_config_dir
|
|
|
|
- name: "Make sure directory exists: {{ hashistack_configuration_directory }}"
|
|
ansible.builtin.assert:
|
|
that:
|
|
- _stat_config_dir.stat.exists
|
|
- _stat_config_dir.stat.isdir
|
|
- _stat_config_dir.stat.writeable
|
|
|
|
- name: "Checking host OS distribution"
|
|
# TODO: This needs to work with debian and ubuntu, major version works for debian but not ubuntu, simple version works the other way around...
|
|
# ? seems to work
|
|
ansible.builtin.assert:
|
|
that:
|
|
- "(ansible_facts.distribution | lower) in hashistack_supported_distributions"
|
|
- "(ansible_facts.distribution_version in hashistack_supported_distribution_versions[(ansible_facts.distribution | lower)]) or
|
|
(ansible_facts.distribution_major_version in hashistack_supported_distribution_versions[(ansible_facts.distribution | lower)])"
|
|
fail_msg: >-
|
|
Distribution: {{ ansible_facts.distribution }}
|
|
Release: {{ ansible_facts.distribution_release }}
|
|
Version: {{ ansible_facts.distribution_version }}
|
|
This distribution is not supported.
|
|
Supported releases are:
|
|
{{ hashistack_supported_distribution_versions[(ansible_facts.distribution | lower)] }}
|
|
|
|
- name: "Verify host clocks"
|
|
when: preflight_enable_host_ntp_checks | bool
|
|
block:
|
|
- name: "Checking for a running NTP daemon on hosts" # noqa command-instead-of-module
|
|
vars:
|
|
preflight_host_ntp_daemons:
|
|
- chrony
|
|
- chronyd
|
|
- ntp
|
|
- ntpd
|
|
- systemd-timesyncd
|
|
become: true
|
|
ansible.builtin.command:
|
|
cmd: "systemctl is-active {{ preflight_host_ntp_daemons | join(' ') }}"
|
|
register: _ntp_daemons_active
|
|
changed_when: false
|
|
failed_when: false
|
|
check_mode: false
|
|
|
|
- name: "Fail if a NTP daemon is not running"
|
|
ansible.builtin.fail:
|
|
msg: >-
|
|
No host NTP daemon is running.
|
|
Please install and configure a host NTP daemon.
|
|
Alternatively, set 'preflight_enable_host_ntp_checks' to 'false' to
|
|
disable this check if not using one of the following NTP daemons:
|
|
chrony, ntpd, systemd-timesyncd.
|
|
when:
|
|
- _ntp_daemons_active.rc != 0
|
|
|
|
- name: "Checking timedatectl status"
|
|
become: true
|
|
ansible.builtin.command: timedatectl status
|
|
register: timedatectl_status
|
|
changed_when: false
|
|
check_mode: false
|
|
|
|
- name: "Fail if the clock is not synchronized"
|
|
ansible.builtin.fail:
|
|
msg: >-
|
|
timedatectl sees the system clock as unsynchronized.
|
|
Please wait for synchronization.
|
|
Alternatively, set 'preflight_enable_host_ntp_checks' to 'false' to
|
|
disable this check if your NTP daemon is not recognised by
|
|
'timedatectl status'.
|
|
when:
|
|
- "'synchronized: yes' not in timedatectl_status.stdout"
|
|
|
|
- name: "Ensure /etc/localtime exists"
|
|
ansible.builtin.stat:
|
|
path: /etc/localtime
|
|
register: _etc_localtime
|
|
|
|
- name: "Fail if /etc/localtime is absent"
|
|
ansible.builtin.fail:
|
|
msg: >-
|
|
/etc/localtime is not found. This file is used for system-wide time
|
|
settings and needs to be mounted to containers.
|
|
when: not _etc_localtime.stat.exists
|
|
|
|
- name: "Ensure /etc/timezone exists"
|
|
ansible.builtin.stat:
|
|
path: /etc/timezone
|
|
register: _etc_timezone
|
|
|
|
- name: "Fail if /etc/timezone is absent"
|
|
ansible.builtin.fail:
|
|
msg: >-
|
|
/etc/timezone is not found. This file is used for system-wide timezone
|
|
settings and needs to be mounted to containers.
|
|
when: not _etc_timezone.stat.exists
|
|
|
|
- name: "Checking the api_interface is present"
|
|
ansible.builtin.fail:
|
|
msg: "Please check the api_interface property - interface {{ api_interface }} not found"
|
|
when: api_interface not in ansible_facts.interfaces
|
|
|
|
- name: "Verify api interface(s)"
|
|
when: inventory_hostname not in groups['deployment'] | default([])
|
|
block:
|
|
- name: "Checking the api_interface is active"
|
|
ansible.builtin.fail:
|
|
msg: "Please check the api_interface settings - interface {{ api_interface }} is not active"
|
|
when: not hostvars[inventory_hostname].ansible_facts[api_interface]['active']
|
|
|
|
- name: "Checking the api_interface ip address configuration"
|
|
ansible.builtin.fail:
|
|
msg: "Please check the api_interface settings - interface {{ api_interface }} ip address problem"
|
|
when: api_interface_address is not defined
|
|
|
|
- name: "Verify required ports"
|
|
block:
|
|
- name: "Checking if vault ports are available"
|
|
when: inventory_hostname in groups['vault_servers']
|
|
block:
|
|
- name: "Checking if vault ports are available"
|
|
ansible.builtin.wait_for:
|
|
host: "{{ inventory_hostname }}"
|
|
port: "{{ item }}"
|
|
state: "stopped"
|
|
timeout: 5
|
|
loop: "{{ vault_required_ports }}"
|
|
ignore_errors: true
|
|
register: vault_port_results
|
|
|
|
- name: "Assert that vault ports are not currently in use"
|
|
ansible.builtin.assert:
|
|
that:
|
|
- item.failed == false
|
|
with_items: "{{ vault_port_results.results }}"
|
|
when: vault_port_results.results | length > 0
|
|
|
|
- name: "Checking if consul ports are available"
|
|
when: inventory_hostname in groups['consul_servers'] or inventory_hostname in groups['consul_agents']
|
|
block:
|
|
- name: "Checking if consul ports are available"
|
|
ansible.builtin.wait_for:
|
|
host: "{{ inventory_hostname }}"
|
|
port: "{{ item }}"
|
|
state: "stopped"
|
|
timeout: 5
|
|
loop: "{{ consul_required_ports }}"
|
|
ignore_errors: true
|
|
register: consul_port_results
|
|
|
|
- name: "Assert that consul ports are not currently in use"
|
|
ansible.builtin.assert:
|
|
that:
|
|
- item.failed == false
|
|
with_items: "{{ consul_port_results.results }}"
|
|
when: consul_port_results.results | length > 0
|
|
|
|
- name: "Checking if nomad ports are available"
|
|
when: inventory_hostname in groups['nomad_servers'] or inventory_hostname in groups['nomad_clients']
|
|
block:
|
|
- name: "Checking if nomad ports are available"
|
|
ansible.builtin.wait_for:
|
|
host: "{{ inventory_hostname }}"
|
|
port: "{{ item }}"
|
|
state: "stopped"
|
|
timeout: 5
|
|
loop: "{{ nomad_required_ports }}"
|
|
ignore_errors: true
|
|
register: nomad_port_results
|
|
|
|
- name: "Assert that nomad ports are not currently in use"
|
|
ansible.builtin.assert:
|
|
that:
|
|
- item.failed == false
|
|
with_items: "{{ nomad_port_results.results }}"
|
|
when: nomad_port_results.results | length > 0
|
|
|
|
- name: "Checking if system uses systemd"
|
|
become: true
|
|
ansible.builtin.assert:
|
|
that:
|
|
- "ansible_facts.service_mgr == 'systemd'"
|
|
when: inventory_hostname in groups['common']
|