Compare commits

...

6 Commits

Author SHA1 Message Date
Daniel Berteaud
4ad94ec795 Update to 2025-10-05 15:00 2025-10-05 15:00:30 +02:00
Daniel Berteaud
c8b4455cba Update to 2025-09-29 18:00 2025-09-29 18:00:28 +02:00
Daniel Berteaud
5844fe3c39 Update to 2025-09-25 10:00 2025-09-25 10:00:34 +02:00
Daniel Berteaud
337376ca80 Update to 2025-09-10 16:00 2025-09-10 16:00:23 +02:00
Daniel Berteaud
98dea5a3d2 Update to 2025-08-30 00:00 2025-08-30 00:00:28 +02:00
Daniel Berteaud
9d2dcb277e Update to 2025-08-29 23:00 2025-08-29 23:00:29 +02:00
8 changed files with 44 additions and 16 deletions

View File

@@ -36,6 +36,11 @@ consul_base_conf:
# An optional alternative domain
# alt_domain: consul.example.org.
# dns_config:
# service_ttl:
# '*': 5s
# node_ttl: 5s
# Address that is advertised to the other nodes
advertise_addr: "{{ ansible_default_ipv4.address }}"
# You can also advertise the WAN addr

View File

@@ -89,6 +89,33 @@ recursors = [
{% endfor %}
]
{% if consul_conf.dns_config is defined %}
dns_config {
{% if consul_conf.dns_config.service_ttl is defined %}
service_ttl {
{% for service in consul_conf.dns_config.service_ttl.keys() | list %}
"{{ service }}" = "{{ consul_conf.dns_config.service_ttl[service] }}"
{% endfor %}
}
{% endif %}
{% for key in ["allow_stale", "enable_truncate", "only_passing", "enable_additional_node_meta_txt", "use_cache"] %}
{% if consul_conf.dns_config[key] is defined %}
{{ key }} = {{ (consul_conf.dns_config[key]) | ternary('true', 'false') }}
{% endif %}
{% endfor %}
{% for key in ["a_record_limit"] %}
{% if consul_conf.dns_config[key] is defined %}
{{ key }} = {{ (consul_conf.dns_config[key]) }}
{% endif %}
{% endfor %}
{% for key in ["node_ttl", "max_stale", "recursor_strategy", "recursor_timeout", "cache_max_age"] %}
{% if consul_conf.dns_config[key] is defined %}
{{ key }} = "{{ consul_conf.dns_config[key] }}"
{% endif %}
{% endfor %}
}
{% endif %}
{% if consul_conf.domain is defined %}
domain = "{{ consul_conf.domain }}"
{% endif %}

View File

@@ -1,11 +1,11 @@
---
# Version of consul-template to install
consul_tpl_version: 0.41.1
consul_tpl_version: 0.41.2
# URL of the archive
consul_tpl_archive_url: https://releases.hashicorp.com/consul-template/{{ consul_tpl_version }}/consul-template_{{ consul_tpl_version }}_linux_amd64.zip
# Expected sha256 of the archive
consul_tpl_archive_sha256: ab68e09642437dcc5b6e9a572a1924d3969e4fe131f50a1a3a4f782d7a21f530
consul_tpl_archive_sha256: 03a8ad4c3daf718dd0bbc14f45e5fcd05eba1d5d04e545849f1cb929a7ee5e54
# Root dir where consul-template will be installed
consul_tpl_root_dir: /opt/consul_template

View File

@@ -1,11 +1,11 @@
---
# Version to install
gitea_version: '1.24.5'
gitea_version: '1.24.6'
# URL to the binary
gitea_bin_url: https://dl.gitea.io/gitea/{{ gitea_version }}/gitea-{{ gitea_version }}-linux-amd64
# sha256 of the binary
gitea_bin_sha256: 59029c97fe491b93c19705ba313f6b2397a8fe70cb2bd6fc021925f3cfb8e03d
gitea_bin_sha256: bb09d565d7e22ed07a9525d22e6f7c468ec00b58484a9691d61ff70940452676
# Handle updates. If set to false, ansible will only install
# Gitea and then won't touch an existing installation
gitea_manage_upgrade: True

View File

@@ -103,7 +103,9 @@
- name: Remove unmanaged plugins
command: grafana-cli plugins uninstall {{ item }}
with_items: "{{ grafana_installed_plugins.stdout_lines }}"
when: item not in grafana_plugins
when:
- item not in grafana_plugins
- item not in ['grafana-metricsdrilldown-app', 'grafana-pyroscope-app', 'grafana-lokiexplore-app', 'grafana-exploretraces-app']
notify: restart grafana
tags: grafana

View File

@@ -1,9 +1,9 @@
---
# Version of Nomad to install
nomad_version: 1.10.4
nomad_version: 1.10.5
# URL of the archive
nomad_archive_url: https://releases.hashicorp.com/nomad/{{ nomad_version }}/nomad_{{ nomad_version }}_linux_amd64.zip
# Expected sha256 of the archive
nomad_archive_sha256: 33f50ef9a56ceb995768a1301c7bc73d9270fd751378de5b3cffcf21af9112a2
nomad_archive_sha256: 4242244ab1f6887e963d6bb674ac490ee9b270a29aff6f826c51ef3187c77044

View File

@@ -1,7 +1,7 @@
# Version of Vault to install
vault_version: 1.20.2
vault_version: 1.20.4
# URL of the archive
vault_archive_url: https://releases.hashicorp.com/vault/{{ vault_version }}/vault_{{ vault_version }}_linux_amd64.zip
# Expected sha256 of the archive
vault_archive_sha256: 5846abf08deaf04cc9fdbb7c1eddda3348671590445f81bcdb0a2e0d32396c2e
vault_archive_sha256: fc5fb5d01d192f1216b139fb5c6af17e3af742aaeffc289fd861920ec55f2c9c

View File

@@ -28,11 +28,5 @@
set_fact: vault_unseal_install_mode='upgrade'
tags: vault
- debug: msg={{ vault_unseal_conf }}
tags: vault
- debug: msg={{ vault_unseal_conf.vault_nodes }}
tags: vault
- set_fact: vault_unseal_enabled={{ (vault_unseal_conf.vault_nodes | length > 0 and vault_unseal_conf.unseal_tokens | length > 0) | ternary(true, false) }}
- set_fact: vault_unseal_enabled={{ (vault_unseal_conf.vault_nodes | length > 2 and vault_unseal_conf.unseal_tokens | length > 0) | ternary(true, false) }}
tags: vault