forked from vitabaks/autobase
-
Notifications
You must be signed in to change notification settings - Fork 0
/
consul.yml
97 lines (84 loc) · 2.99 KB
/
consul.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
---
- hosts: localhost
any_errors_fatal: true
gather_facts: false
vars_files:
- vars/main.yml
tasks:
- name: Check if the consul role requirements (ansible.utils) are installed
command: ansible-galaxy collection list ansible.utils
changed_when: false
failed_when: false
register: ansible_utils_result
- name: Consul role requirements
fail:
msg:
- "Please install consul role requirements (ansible.utils)"
- "ansible-galaxy install -r roles/consul/requirements.yml"
when:
- ansible_utils_result.stderr is search("unable to find")
- hosts: consul_instances
become: true
become_method: sudo
any_errors_fatal: true
gather_facts: true
vars_files:
- vars/main.yml
- vars/system.yml
environment: "{{ proxy_env | default({}) }}"
pre_tasks:
- name: Include OS-specific variables
include_vars: "vars/{{ ansible_os_family }}.yml"
when: not ansible_os_family == 'Rocky' and not ansible_os_family == 'AlmaLinux'
tags: always
# For compatibility with Ansible old versions
# (support for RockyLinux and AlmaLinux has been added to Ansible 2.11)
- name: Include OS-specific variables
include_vars: "vars/RedHat.yml"
when: ansible_os_family == 'Rocky' or ansible_os_family == 'AlmaLinux'
tags: always
- name: Update apt cache
apt:
update_cache: true
cache_valid_time: 3600
when: ansible_os_family == "Debian" and installation_method == "repo"
- name: Make sure the gnupg and apt-transport-https packages are present
apt:
pkg:
- gnupg
- apt-transport-https
state: present
when: ansible_os_family == "Debian" and installation_method == "repo"
- name: Make sure the python3-pip package are present
package:
name: python3-pip
state: present
- name: Build a firewall_ports_dynamic_var
set_fact:
firewall_ports_dynamic_var: "{{ firewall_ports_dynamic_var | default([]) + (firewall_allowed_tcp_ports_for[item]) }}"
loop: "{{ hostvars[inventory_hostname].group_names }}"
when: firewall_enabled_at_boot|bool
tags: firewall
- name: Build a firewall_rules_dynamic_var
set_fact:
firewall_rules_dynamic_var: "{{ firewall_rules_dynamic_var | default([]) + (firewall_additional_rules_for[item]) }}"
loop: "{{ hostvars[inventory_hostname].group_names }}"
when: firewall_enabled_at_boot|bool
tags: firewall
roles:
- role: ansible-role-firewall
vars:
firewall_allowed_tcp_ports: "{{ firewall_ports_dynamic_var | unique }}"
firewall_additional_rules: "{{ firewall_rules_dynamic_var | unique }}"
when: firewall_enabled_at_boot|bool
tags: firewall
- role: hostname
- role: resolv_conf
vars:
nameservers: [127.0.0.1] # add a nameserver entry poining to localhost for dnsmasq.
- role: etc_hosts
- role: sysctl
- role: timezone
- role: ntp
- role: consul
...