mirror of
https://github.com/ansible-collections/community.general.git
synced 2024-09-14 20:13:21 +02:00
2d26fba0b9
Consul implement agent service and check (#7989)
* Implement agent service and check (#7987)
* implement update of service and check
* update tests
update documentation
* update documentation
* add consul_agent_check/service to action_groups
check if unique_identifier of name is in params to get object
add suggested improvements
* update sanity
* fix sanity issues
update documentation
* fix naming
* fix naming
check if response_data has data
* fix sanity extra-docs
* add as ignore maintainer in BOTMETA.yml
update version_added to 8.4
* fix sanity
* add to maintainers
* Update plugins/modules/consul_agent_check.py
Co-authored-by: Felix Fontein <felix@fontein.de>
* Update plugins/modules/consul_agent_check.py
Co-authored-by: Felix Fontein <felix@fontein.de>
* Update plugins/modules/consul_agent_check.py
Co-authored-by: Felix Fontein <felix@fontein.de>
* update version_added
* if create and update return no object as result we read the object again
* get_first_appearing_identifier check the params for the given identifier and return it to simplify id vs name
* add unique_identifiers as a new property and a method to decide which identifier should be used
* fix sanity
* add self to team consul
remove params with no values
add operational_attributes that inherited classes can set them
get identifier value from object
* fix sanity
fix test
* remove the possibility to add checks with consul_agent_check.
check if service has changed
* remove tests for idempotency check because for checks it is not possible
* remove unique_identifier from consul.py
change unique_identifier to unique_identifiers
* get id from params
* Revert "remove unique_identifier from consul.py"
This reverts commit a4f0d0220dd23e95871914b152c25ff352097a2c.
* update version to 8.5
* Revert "Revert "remove unique_identifier from consul.py""
This reverts commit d2c35cf04c8aaf5f0175d772f862a796e22e35d4.
* update description
update test
* fix sanity tests
* fix sanity tests
* update documentation for agent_check
* fix line length
* add documentation
* fix sanity
* simplified check for Tcp
Co-authored-by: Alexei Znamensky <103110+russoz@users.noreply.github.com>
* check duration with regex
* fix
* update documentation
---------
Co-authored-by: Felix Fontein <felix@fontein.de>
Co-authored-by: Alexei Znamensky <103110+russoz@users.noreply.github.com>
(cherry picked from commit 03966624ba
)
Co-authored-by: Ilgmi <michael.ilg@mailbox.org>
109 lines
No EOL
3.9 KiB
YAML
109 lines
No EOL
3.9 KiB
YAML
---
|
|
####################################################################
|
|
# WARNING: These are designed specifically for Ansible tests #
|
|
# and should not be used as examples of how to write Ansible roles #
|
|
####################################################################
|
|
|
|
# Copyright (c) Ansible Project
|
|
# GNU General Public License v3.0+ (see LICENSES/GPL-3.0-or-later.txt or https://www.gnu.org/licenses/gpl-3.0.txt)
|
|
# SPDX-License-Identifier: GPL-3.0-or-later
|
|
|
|
- name: Install Consul and test
|
|
vars:
|
|
consul_version: 1.13.2
|
|
consul_uri: https://releases.hashicorp.com/consul/{{ consul_version }}/consul_{{ consul_version }}_{{ ansible_system | lower }}_{{ consul_arch }}.zip
|
|
consul_cmd: '{{ remote_tmp_dir }}/consul'
|
|
block:
|
|
- name: Install requests<2.20 (CentOS/RHEL 6)
|
|
pip:
|
|
name: requests<2.20
|
|
extra_args: "-c {{ remote_constraints }}"
|
|
register: result
|
|
until: result is success
|
|
when: ansible_distribution_file_variety|default() == 'RedHat' and ansible_distribution_major_version is version('6', '<=')
|
|
- name: Install python-consul
|
|
pip:
|
|
name: python-consul
|
|
extra_args: "-c {{ remote_constraints }}"
|
|
register: result
|
|
until: result is success
|
|
- name: Generate privatekey
|
|
community.crypto.openssl_privatekey:
|
|
path: '{{ remote_tmp_dir }}/privatekey.pem'
|
|
- name: Generate CSR
|
|
community.crypto.openssl_csr:
|
|
path: '{{ remote_tmp_dir }}/csr.csr'
|
|
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
|
subject:
|
|
commonName: localhost
|
|
- name: Generate selfsigned certificate
|
|
register: selfsigned_certificate
|
|
community.crypto.x509_certificate:
|
|
path: '{{ remote_tmp_dir }}/cert.pem'
|
|
csr_path: '{{ remote_tmp_dir }}/csr.csr'
|
|
privatekey_path: '{{ remote_tmp_dir }}/privatekey.pem'
|
|
provider: selfsigned
|
|
selfsigned_digest: sha256
|
|
- name: Install unzip
|
|
package:
|
|
name: unzip
|
|
register: result
|
|
until: result is success
|
|
when: ansible_distribution != "MacOSX"
|
|
- assert:
|
|
that: ansible_architecture in ['i386', 'x86_64', 'amd64']
|
|
- set_fact:
|
|
consul_arch: '386'
|
|
when: ansible_architecture == 'i386'
|
|
- set_fact:
|
|
consul_arch: amd64
|
|
when: ansible_architecture in ['x86_64', 'amd64']
|
|
- name: Download consul binary
|
|
unarchive:
|
|
src: '{{ consul_uri }}'
|
|
dest: '{{ remote_tmp_dir }}'
|
|
remote_src: true
|
|
register: result
|
|
until: result is success
|
|
- vars:
|
|
remote_dir: '{{ echo_remote_tmp_dir.stdout }}'
|
|
block:
|
|
- command: echo {{ remote_tmp_dir }}
|
|
register: echo_remote_tmp_dir
|
|
- name: Create configuration file
|
|
template:
|
|
src: consul_config.hcl.j2
|
|
dest: '{{ remote_tmp_dir }}/consul_config.hcl'
|
|
- name: Start Consul (dev mode enabled)
|
|
shell: nohup {{ consul_cmd }} agent -dev -config-file {{ remote_tmp_dir }}/consul_config.hcl </dev/null >/dev/null 2>&1 &
|
|
- name: Bootstrap ACL
|
|
consul_acl_bootstrap:
|
|
register: consul_bootstrap_result
|
|
- set_fact:
|
|
consul_management_token: '{{ consul_bootstrap_result.result.SecretID }}'
|
|
- name: Create some data
|
|
command: '{{ consul_cmd }} kv put -token={{consul_management_token}} data/value{{ item }} foo{{ item }}'
|
|
loop:
|
|
- 1
|
|
- 2
|
|
- 3
|
|
- import_tasks: consul_general.yml
|
|
- import_tasks: consul_kv.yml
|
|
|
|
- block:
|
|
- import_tasks: consul_session.yml
|
|
- import_tasks: consul_policy.yml
|
|
- import_tasks: consul_role.yml
|
|
- import_tasks: consul_token.yml
|
|
- import_tasks: consul_auth_method.yml
|
|
- import_tasks: consul_binding_rule.yml
|
|
- import_tasks: consul_agent_service.yml
|
|
- import_tasks: consul_agent_check.yml
|
|
module_defaults:
|
|
group/community.general.consul:
|
|
token: "{{ consul_management_token }}"
|
|
|
|
always:
|
|
- name: Kill consul process
|
|
shell: kill $(cat {{ remote_tmp_dir }}/consul.pid)
|
|
ignore_errors: true |