Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature/ansible version update #137

Merged
merged 4 commits into from
Oct 8, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@

### ENHANCEMENTS

* Update Ansible to 2.10 ([GH-136](https://github.com/ystia/forge/issues/136))
* Add docker container property to set the shared memory size ([GH-129](https://github.com/ystia/forge/issues/129))

### BUG FIXES
Expand Down
5 changes: 2 additions & 3 deletions org/ystia/ansible/linux/ansible/playbooks/create.yml
Original file line number Diff line number Diff line change
Expand Up @@ -22,9 +22,7 @@
tasks:

- name: Get python version
# This will be deprecated in Ansible 2.9 in favor of python_requirements_info but
# it is not yet available in Ansible 2.7.9
python_requirements_facts:
python_requirements_info:
register: pri
failed_when: "pri == None or pri.python_version == None or pri.python_version == ''"

Expand Down Expand Up @@ -62,5 +60,6 @@
- "ansible=={{ANSIBLE_VERSION}}"
- "jmespath==0.9.4"
- "netaddr==0.7.19"
- "paramiko"
loicalbertin marked this conversation as resolved.
Show resolved Hide resolved
executable: "{{pip_cmd}}"
extra_args: "{{ '--extra-index-url {}'.format(ANSIBLE_EXTRA_PACKAGE_REPOSITORY) if ANSIBLE_EXTRA_PACKAGE_REPOSITORY != '' else ''}}"
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,7 @@

- name: Reload systemd
command: systemctl daemon-reload
when: __dnsmasq_systemd|changed
when: __dnsmasq_systemd is changed

when: dnsmasq_init_system == 'systemd'
tags: ["systemd", "init"]
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@
set_fact:
consul_servers: "{{ consul_servers }} + [ '{{ hostvars[inventory_hostname][item] }}' ]"
with_items: "{{ hostvars[inventory_hostname] }}"
when: MODE == "server" and item | match(NODE+'_.*_IP_ADDRESS')
when: MODE == "server" and item is match(NODE+'_.*_IP_ADDRESS')

- name: Check if CA provided
set_fact:
Expand Down Expand Up @@ -131,7 +131,7 @@
country_name: "FR"
organization_name: "Atos"
common_name: "127.0.0.1"
subjectAltName: '{{ subjectAltName }},IP:127.0.0.1,DNS:localhost'
subjectAltName: "{{ subjectAltName }},IP:127.0.0.1,DNS:localhost"
when: consul_secured

- name: Install CA key
Expand All @@ -155,7 +155,4 @@
ownca_privatekey_path: "{{ CONFIG_DIR }}/ca.key"
ownca_privatekey_passphrase: "{{ CA_PASSPHRASE }}"
provider: ownca
subjectAltName: '{{ subjectAltName }},IP:127.0.0.1,DNS:localhost'
extended_key_usage:
- serverAuth
when: consul_secured
Original file line number Diff line number Diff line change
Expand Up @@ -27,14 +27,14 @@
set_fact:
consul_servers: "{{ consul_servers }} + [ '{{ hostvars[inventory_hostname][item] }}' ]"
with_items: "{{ hostvars[inventory_hostname] }}"
when: (item | match(TARGET_NODE+'_.*_SERVER_IP')) and
when: (item is match(TARGET_NODE+'_.*_SERVER_IP')) and
(SERVER_IP_CAP is not defined or SERVER_IP_CAP is none or SERVER_IP_CAP == '' )

- name: compute consul servers
set_fact:
consul_servers: "{{ consul_servers }} + [ '{{ hostvars[inventory_hostname][item] }}' ]"
with_items: "{{ hostvars[inventory_hostname] }}"
when: (item | match(TARGET_NODE+'_.*SERVER_IP_CAP')) and
when: (item is match(TARGET_NODE+'_.*SERVER_IP_CAP')) and
(SERVER_IP_CAP is defined and SERVER_IP_CAP is not none and SERVER_IP_CAP != '' )

- name: Install servers config for consul
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@
set_fact:
consul_wan_servers: "{{ consul_wan_servers }} + [ '{{ hostvars[inventory_hostname][item] }}' ]"
with_items: "{{ hostvars[inventory_hostname] }}"
when: item | match(TARGET_NODE+'_.*_SERVER_WAN_IP')
when: item is match(TARGET_NODE+'_.*_SERVER_WAN_IP')

- name: Install servers config for consul
template:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -61,9 +61,7 @@
when: INSTALL_DNSMASQ == "true"

- name: Get python version
# This will be deprecated in Ansible 2.9 in favor of python_requirements_info but
# it is not yet available in Ansible 2.7.9
python_requirements_facts:
python_requirements_info:
register: pri
failed_when: "pri == None or pri.python_version == None or pri.python_version == ''"

Expand Down Expand Up @@ -121,7 +119,7 @@
user:
name: "{{ yorc_prov_user }}"
append: yes
group: consul
groups: consul

- name: create Consul user
user:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,7 @@

- name: Reload systemd
command: systemctl daemon-reload
when: __dnsmasq_systemd|changed
when: __dnsmasq_systemd is changed

when: dnsmasq_init_system == 'systemd'
tags: ["systemd", "init"]
Original file line number Diff line number Diff line change
Expand Up @@ -67,7 +67,7 @@

- name: mongodb restart
service: name={{ mongodb_daemon_name }} state=restarted
when: config_result|changed and mongodb_manage_service
when: config_result is changed and mongodb_manage_service

- name: Ensure service is started
service: name={{ mongodb_daemon_name }} state=started
Expand Down
28 changes: 15 additions & 13 deletions org/ystia/slurm/ansible/playbooks/install-RedHat.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,17 +14,18 @@
name: https://dl.fedoraproject.org/pub/epel/epel-release-latest-7.noarch.rpm

- name: Install rpmbuild and required tools to build Slurm packages
yum:
name: "{{ item }}"
with_items:
- rpm-build
- gcc
- perl-devel
- readline-devel
- openssl-devel
- munge-devel
- munge-libs
- pam-devel
yum:
name:
- rpm-build
- gcc
- perl-devel
- readline-devel
- openssl-devel
- munge-devel
- munge-libs
- pam-devel
state: present
update_cache: yes

- name: Download Slurm archive
get_url:
Expand Down Expand Up @@ -61,8 +62,9 @@

- name: Install Slurm
yum:
name: "{{item}}"
with_items: "{{slurm_rpms_paths}}"
name: "{{slurm_rpms_paths}}"
state: present
update_cache: yes

- name: Remove Slurm installation artifacts
file:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,6 @@
ownca_privatekey_path: "{{KEY_PATH}}/{{NODE}}-ca.key"
ownca_privatekey_passphrase: "{{ CA_PASSPHRASE }}"
provider: ownca
subjectAltName: "{{ subjectAltName }}"

# Now we do not need it anymore so lets remove it
- name: Delete CA Key
Expand Down
14 changes: 6 additions & 8 deletions org/ystia/terraform/linux/ansible/playbooks/create.yml
Original file line number Diff line number Diff line change
Expand Up @@ -22,22 +22,20 @@
tasks:
- name: RedHat - install prerequisites
yum:
name: "{{item}}"
name:
- zip
- unzip
state: present
update_cache: yes
with_items:
- zip
- unzip
when: ansible_os_family == 'RedHat'

- name: Debian - install prerequisites
apt:
name: "{{item}}"
name:
- zip
- unzip
state: present
update_cache: yes
with_items:
- zip
- unzip
when: ansible_os_family == 'Debian'

- name: Download Terraform binary
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,9 @@
- name: Generate an OpenSSL private key for the plugin
openssl_privatekey:
path: "{{ file_dir }}/yorc_client.key"
# Using pyopenssl here or Alien4Cloud cannot deal with the
# generated certificate
select_crypto_backend: pyopenssl
when: ca_pem != ''

- name: Generate an OpenSSL CSR for the plugin
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,8 @@
method: POST
return_content: yes
validate_certs: no
HEADER_cookie: "{{ session_id }}"
headers:
Cookie: "{{ session_id }}"
body:
name: "{{ orchestrator_name }}"
pluginId: "{{ pluginId }}"
Expand Down Expand Up @@ -140,8 +141,9 @@
method: PUT
return_content: yes
validate_certs: no
HEADER_cookie: "{{ session_id }}"
HEADER_Content-Type: "application/json"
headers:
Cookie: "{{ session_id }}"
Content-Type: "application/json"
body: "{{ orchestratorConfiguration }}"
body_format: json
status_code: 200
Expand All @@ -153,8 +155,9 @@
method: PUT
return_content: yes
validate_certs: no
HEADER_cookie: "{{ session_id }}"
HEADER_Content-Type: "application/json"
headers:
Cookie: "{{ session_id }}"
Content-Type: "application/json"
body:
deploymentNamePattern: "('{{ discriminator }}-' + application.name + '-' + environment.name).replaceAll('[^\\w\\-_]', '_')"
body_format: json
Expand All @@ -166,17 +169,19 @@
url: "{{ alien_url }}/rest/latest/orchestrators/{{ orchestratorId }}/instance"
method: POST
validate_certs: no
HEADER_cookie: "{{ session_id }}"
HEADER_Content-Type: "application/json"
headers:
Cookie: "{{ session_id }}"
Content-Type: "application/json"

- name: Wait for orchestrator to be started
uri:
url: "{{ alien_url }}/rest/latest/orchestrators/{{ orchestratorId }}"
method: GET
validate_certs: no
return_content: yes
HEADER_cookie: "{{ session_id }}"
HEADER_Content-Type: "application/json"
headers:
Cookie: "{{ session_id }}"
Content-Type: "application/json"
status_code: 200
register: result
until: result.json.data.state == "CONNECTED"
Expand Down
23 changes: 14 additions & 9 deletions org/ystia/yorc/alien4cloud/playbook/create_orchestrator.yml
Original file line number Diff line number Diff line change
Expand Up @@ -95,7 +95,8 @@
method: POST
return_content: yes
validate_certs: no
HEADER_cookie: "{{ session_id }}"
headers:
Cookie: "{{ session_id }}"
body:
name: "{{ orchestrator_name }}"
pluginId: "{{ pluginId }}"
Expand Down Expand Up @@ -140,8 +141,9 @@
method: PUT
return_content: yes
validate_certs: no
HEADER_cookie: "{{ session_id }}"
HEADER_Content-Type: "application/json"
headers:
Cookie: "{{ session_id }}"
Content-Type: "application/json"
body: "{{ orchestratorConfiguration }}"
body_format: json
status_code: 200
Expand All @@ -153,8 +155,9 @@
method: PUT
return_content: yes
validate_certs: no
HEADER_cookie: "{{ session_id }}"
HEADER_Content-Type: "application/json"
headers:
Cookie: "{{ session_id }}"
Content-Type: "application/json"
body:
deploymentNamePattern: "('{{ discriminator }}-' + application.name + '-' + environment.name).replaceAll('[^\\w\\-_]', '_')"
body_format: json
Expand All @@ -166,17 +169,19 @@
url: "{{ alien_url }}/rest/latest/orchestrators/{{ orchestratorId }}/instance"
method: POST
validate_certs: no
HEADER_cookie: "{{ session_id }}"
HEADER_Content-Type: "application/json"
headers:
Cookie: "{{ session_id }}"
Content-Type: "application/json"

- name: Wait for orchestrator to be started
uri:
url: "{{ alien_url }}/rest/latest/orchestrators/{{ orchestratorId }}"
method: GET
validate_certs: no
return_content: yes
HEADER_cookie: "{{ session_id }}"
HEADER_Content-Type: "application/json"
headers:
Cookie: "{{ session_id }}"
Content-Type: "application/json"
status_code: 200
register: result
until: result.json.data.state == "CONNECTED"
Expand Down
5 changes: 1 addition & 4 deletions org/ystia/yorc/yorc/linux/ansible/playbooks/configure.yml
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@
path: "{{ CONFIG_DIR }}/yorc_server.csr"
privatekey_path: "{{ CONFIG_DIR }}/yorc_server.key"
common_name: "yorcServer"
subjectAltName: '{{ subjectAltName }}'
subjectAltName: "{{ subjectAltName }}"
when: REST_API_PROTOCOL == "https"

- name: Generate a OpenSSL certificate for the server
Expand All @@ -125,9 +125,6 @@
ownca_privatekey_path: "{{ CONFIG_DIR }}/yorc_ca.key"
ownca_privatekey_passphrase: "{{ CA_PASSPHRASE }}"
provider: ownca
subjectAltName: '{{ subjectAltName }}'
extended_key_usage:
- serverAuth
when: REST_API_PROTOCOL == "https"

- name: Generate an OpenSSL private key for the client
Expand Down