renew_consul_certificates/molecule/default_vagrant/verify.yml
Bertrand Lanson 90a958fba0
All checks were successful
test / Linting (push) Successful in 35s
test / Molecule tests (default, debian12) (push) Successful in 1m14s
test / Molecule tests (default, ubuntu2004) (push) Successful in 1m29s
test / Molecule tests (default, ubuntu2204) (push) Successful in 1m22s
test / Molecule tests (with_custom_config, debian11) (push) Successful in 1m15s
test / Molecule tests (with_custom_config, ubuntu2004) (push) Successful in 1m28s
test / Molecule tests (with_custom_config, ubuntu2204) (push) Successful in 1m31s
test / Molecule tests (with_custom_config, debian12) (push) Successful in 3m14s
test / Molecule tests (default, debian11) (push) Successful in 1m11s
feat: remove become from role
2023-12-03 18:16:39 +01:00

141 lines
6.7 KiB
YAML

---
- name: Verify
hosts: all
gather_facts: true
become: true
tasks:
- name: "Test: directory /etc/consul-template.d/consul"
block:
- name: "Stat directory /etc/consul-template.d/consul"
ansible.builtin.stat:
path: "/etc/consul-template.d/consul"
register: stat_etc_consul_template_d_nomad
- name: "Stat file /etc/consul-template.d/consul/consul_config.hcl"
ansible.builtin.stat:
path: "/etc/consul-template.d/consul/consul_config.hcl"
register: stat_etc_consul_template_d_nomad_nomad_config_hcl
- name: "Slurp file /etc/consul-template.d/consul/consul_config.hcl"
ansible.builtin.slurp:
src: "/etc/consul-template.d/consul/consul_config.hcl"
register: slurp_etc_consul_template_d_consul_consul_config_hcl
- name: "Verify directory /etc/consul-template.d/consul"
ansible.builtin.assert:
that:
- stat_etc_consul_template_d_nomad.stat.exists
- stat_etc_consul_template_d_nomad.stat.isdir
- stat_etc_consul_template_d_nomad.stat.pw_name == 'consul'
- stat_etc_consul_template_d_nomad.stat.gr_name == 'consul'
- stat_etc_consul_template_d_nomad.stat.mode == '0755'
- stat_etc_consul_template_d_nomad_nomad_config_hcl.stat.exists
- stat_etc_consul_template_d_nomad_nomad_config_hcl.stat.isreg
- stat_etc_consul_template_d_nomad_nomad_config_hcl.stat.pw_name == 'consul'
- stat_etc_consul_template_d_nomad_nomad_config_hcl.stat.gr_name == 'consul'
- stat_etc_consul_template_d_nomad_nomad_config_hcl.stat.mode == '0600'
- slurp_etc_consul_template_d_consul_consul_config_hcl.content != ''
- name: "Test: directory /etc/consul-template.d/consul/templates"
block:
- name: "Stat directory /etc/consul-template.d/consul/templates"
ansible.builtin.stat:
path: "/etc/consul-template.d/consul/templates"
register: stat_etc_consul_template_d_consul_templates
- name: "Find in directory /etc/consul-template.d/consul/templates"
ansible.builtin.find:
paths: "/etc/consul-template.d/consul/templates"
file_type: file
register: find_etc_consul_template_d_consul_templates
- name: "Stat in directory /etc/consul-template.d/consul/templates"
ansible.builtin.stat:
path: "{{ item.path }}"
loop: "{{ find_etc_consul_template_d_consul_templates.files }}"
register: stat_etc_consul_template_d_consul_templates
- name: "Slurp in directory /etc/consul-template.d/consul/templates"
ansible.builtin.slurp:
src: "{{ item.path }}"
loop: "{{ find_etc_consul_template_d_consul_templates.files }}"
register: slurp_etc_consul_template_d_nomad_templates
- name: "Verify file /etc/consul-template.d/consul/templates/consul_ca.pem.tpl"
vars:
consul_ca_file: |
{% raw %}{{ with secret "pki/issue/your-issuer" "common_name=consul01.example.com" "ttl=90d" "alt_names=localhost" "ip_sans=127.0.0.1" }}
{{ .Data.issuing_ca }}
{{ end }}{% endraw %}
ansible.builtin.assert:
that:
- item.item.isreg
- item.item.pw_name == 'consul'
- item.item.gr_name == 'consul'
- item.item.mode == '0600'
- "(item.content|b64decode) == consul_ca_file"
loop: "{{ slurp_etc_consul_template_d_nomad_templates.results }}"
when: (item.item.path | basename) == 'consul_ca.pem.tpl'
- name: "Verify file /etc/consul-template.d/consul/templates/consul_cert.pem.tpl"
vars:
consul_cert_file: |
{% raw %}{{ with secret "pki/issue/your-issuer" "common_name=consul01.example.com" "ttl=90d" "alt_names=localhost" "ip_sans=127.0.0.1" }}
{{ .Data.certificate }}
{{ .Data.issuing_ca }}
{{ end }}{% endraw %}
ansible.builtin.assert:
that:
- item.item.isreg
- item.item.pw_name == 'consul'
- item.item.gr_name == 'consul'
- item.item.mode == '0600'
- "(item.content|b64decode) == consul_cert_file"
loop: "{{ slurp_etc_consul_template_d_nomad_templates.results }}"
when: (item.item.path | basename) == 'consul_cert.pem.tpl'
- name: "Verify file /etc/consul-template.d/consul/templates/consul_key.pem.tpl"
vars:
consul_key_file: |
{% raw %}{{ with secret "pki/issue/your-issuer" "common_name=consul01.example.com" "ttl=90d" "alt_names=localhost" "ip_sans=127.0.0.1" }}
{{ .Data.private_key }}
{{ end }}{% endraw %}
ansible.builtin.assert:
that:
- item.item.isreg
- item.item.pw_name == 'consul'
- item.item.gr_name == 'consul'
- item.item.mode == '0600'
- "(item.content|b64decode) == consul_key_file"
loop: "{{ slurp_etc_consul_template_d_nomad_templates.results }}"
when: (item.item.path | basename) == 'consul_key.pem.tpl'
- name: "Test: service consul-certs"
block:
- name: "Get service consul-certs"
ansible.builtin.service_facts:
- name: "Stat file /etc/systemd/system/consul-certs.service"
ansible.builtin.stat:
path: "/etc/systemd/system/consul-certs.service"
register: stat_etc_systemd_system_consul_certs_service
- name: "Slurp file /etc/systemd/system/consul-certs.service"
ansible.builtin.slurp:
src: "/etc/systemd/system/consul-certs.service"
register: slurp_etc_systemd_system_consul_certs_service
- name: "Verify service consul-certs"
ansible.builtin.assert:
that:
- stat_etc_systemd_system_consul_certs_service.stat.exists
- stat_etc_systemd_system_consul_certs_service.stat.isreg
- stat_etc_systemd_system_consul_certs_service.stat.pw_name == 'root'
- stat_etc_systemd_system_consul_certs_service.stat.gr_name == 'root'
- stat_etc_systemd_system_consul_certs_service.stat.mode == '0644'
- slurp_etc_systemd_system_consul_certs_service.content != ''
- ansible_facts.services['consul-certs.service'] is defined
- ansible_facts.services['consul-certs.service']['source'] == 'systemd'
- ansible_facts.services['consul-certs.service']['state'] == 'stopped'
- ansible_facts.services['consul-certs.service']['status'] == 'enabled'