Compare commits

..

9 Commits

16 changed files with 78 additions and 66 deletions

1
.gitignore vendored
View File

@ -1,3 +1,4 @@
vault-pass.gpg-*
roles/*
!roles/requirements.yml
.vscode/

View File

@ -1 +1 @@
55F7FC933CCA4A47F5AA3C802F84305F02B16995
88CBCAD842520E46

Binary file not shown.

View File

@ -1,3 +1,3 @@
[defaults]
roles_path = roles:galaxy-roles:git-roles:ansible-roles:~/.ansible/roles
# vault_password_file = .vault/vault-open.sh
vault_password_file = .vault/vault-open.sh

View File

@ -1 +1,19 @@
dop_v1_cf3fddc6f6c9e008e62c454a3db645038634c253a526a3bbbcf27618789ae587
$ANSIBLE_VAULT;1.1;AES256
37303132393466333261633739343530323037363563346263393337306262386434616236623830
6439616662356337653935346434323638326432363531660a333235636264313765646330363263
31616232373735373834393965353930316161393265366431653639646438376534656462326337
3036653763363530330a333461643731636535643532323139393238353431313034323066363635
31336534383163303233383936383533663437663637323335326335356135653063303133643764
35613638663736636166353734303333666332633434313766346332373565633166356561643030
64626163636562323964346137313238633036396232393766393137663134396663613933646539
63666435333763323862636536313436383133343031363232333433656264386139653030383465
63333137356463303865393939303463333031383563393837623261333734353261326333316461
66343135656631396230303665373033663431356464636163613333643362383162613861393435
32626562653337313638623764646463663034363065306633346365303366643166633436643936
32653865363631623839313533333831386339633837353233313730643939336265343764643131
34363734616237373237303039643261376664376636386164643433366436353162656232336330
39336436353235396633313265353939373262303637373830623439303132386666646130626330
62653462343838303266343830366565666639353362343662653234396365353339343330623039
37653335323564323762653338666634363237303830653736623963306564643831353233663630
32386131373263613139326534633432666364656561663461643031663230643366363036336631
3039393835346431346231636665396138393336343963333466

View File

@ -1,15 +1,15 @@
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: l.stg.earthball.xyz
name: pwa.laconic.com
namespace: default
spec:
secretName: l.stg.earthball.xyz
secretName: pwa.laconic.com
issuerRef:
name: letsencrypt-prod-wild
kind: ClusterIssuer
group: cert-manager.io
commonName: "*.l.stg.earthball.xyz"
commonName: "*.pwa.laconic.com"
dnsNames:
- "l.stg.earthball.xyz"
- "*.l.stg.earthball.xyz"
- "pwa.laconic.com"
- "*.pwa.laconic.com"

View File

@ -1,2 +1,7 @@
---
support_email: someone@example.com
$ANSIBLE_VAULT;1.1;AES256
37613532616632663366373332616133316237633564386464643032636137356436623331313365
3164613836383930663466306133336263393764306662620a616131366561306334656535663432
31323566373730353338356365663764386266383831666637646361626433343162313039343964
3837666333343133630a343534366535613765336134623532323038633466666538356235323464
65326264393765383138393661616537323864333036353130633461383865643030366363623437
6162376537646461343066316234663730663466303931646630

View File

@ -0,0 +1,8 @@
$ANSIBLE_VAULT;1.1;AES256
32623937306230646432336339336134316263616136383264623030623930633664346263643165
3539396565353163656432303038613736343430643765330a353465613136396436613565396638
63396333363766353737363438383262623539376666316531303535663832303363356631633735
6666643461626262350a393136306662666232356532366666323765356330333838363162356330
61333233666634373666636630623865333838653762393634306464336636633633646266623263
33373831613266373839383666326264376362646638386566656362656130383861633933666564
383930616533303265633661363335633064

View File

@ -1,13 +1,22 @@
---
k8s_cluster_name: lx-cad
k8s_cluster_url: lx-cad-cluster-control.l.stg.earthball.xyz
k8s_taint_servers: true
# default context is used for stack orchestrator deployments, for testing a custom context name can be usefull
#k8s_cluster_name: lcn-cad-cluster
k8s_cluster_name: default
k8s_cluster_url: lcn-cad-cluster-control.laconic.com
k8s_taint_servers: false
k8s_acme_email: "{{ support_email }}"
# k3s bundles traefik as the default ingress controller, we will disable it and use nginx instead
k8s_disable:
- traefik
# secrets can be stored in a file or as a template, the template secrets gets dynamically base64 encoded while file based secrets must be encoded by hand
k8s_secrets:
- name: digitalocean-dns
type: file
source: secret-digitalocean-dns.yaml
k8s_manifests:
# ingress controller, replaces traefik which is explicitly disabled
- name: ingress-nginx
@ -17,7 +26,7 @@ k8s_manifests:
# cert-manager, required for letsencrypt
- name: cert-manager
type: url
source: https://github.com/cert-manager/cert-manager/releases/download/v1.15.0/cert-manager.yaml
source: https://github.com/cert-manager/cert-manager/releases/download/v1.15.1/cert-manager.yaml
# issuer for basic http certs
- name: letsencrypt-prod
@ -41,6 +50,6 @@ k8s_manifests:
secret_key: access-token
# initiate wildcard cert
- name: l.stg.earthball.xyz
- name: pwa.laconic.com
type: file
source: wildcard-l-earthball.yaml
source: wildcard-pwa-laconic.yaml

View File

@ -1,10 +0,0 @@
---
k8s_cluster_token: 18cd2efad6ba0df6cfe1e559ffacb0e2
k8s_secrets:
- name: digitalocean-dns
type: template
namespace: cert-manager
secrets:
- key: access-token
value: dop_v1_cf3fddc6f6c9e008e62c454a3db645038634c253a526a3bbbcf27618789ae587

View File

@ -2,7 +2,7 @@
firewalld_add:
- name: public
interfaces:
- eth0
- enp9s0
services:
- http
- https
@ -13,5 +13,4 @@ firewalld_add:
sources:
- 10.42.0.0/16
- 10.43.0.0/16
- 146.190.250.234/32
- 138.197.140.188/32
- 159.203.31.82/32

View File

@ -2,16 +2,15 @@
firewalld_add:
- name: public
interfaces:
- eth0
- ens3
services:
- http
- https
ports:
- 22657/tcp
- 22656/tcp
- 26657/tcp
- 26656/tcp
- 1317/tcp
- name: trusted
sources:
- 138.197.140.188/32
- 138.197.136.93/32
- 147.182.144.6/32

View File

@ -6,16 +6,16 @@ nginx_proxy_send_timeout: 1200
nginx_proxy_connection_timeout: 75
nginx_sites:
- name: lx-console
url: lx-console.l.stg.earthball.xyz
- name: lcn-console
url: lcn-console.laconic.com
upstream: http://localhost:8080
template: basic-proxy
ssl: true
- name: lx-daemon
url: lx-daemon.l.stg.earthball.xyz
- name: lcn-daemon
url: lcn-daemon.laconic.com
upstream: http://localhost:9473
configs:
- rewrite ^/deployer(/.*)? https://webapp-deployer.l.stg.earthball.xyz permanent
- rewrite ^/deployer(/.*)? https://webapp-deployer.pwa.laconic.com permanent
template: websocket-proxy
ssl: true

View File

@ -1,15 +0,0 @@
---
firewalld_add:
- name: public
interfaces:
- eth0
services:
- http
- https
- name: trusted
sources:
- 10.42.0.0/16
- 10.43.0.0/16
- 146.190.250.234/32
- 138.197.136.93/32

14
hosts
View File

@ -1,14 +1,12 @@
[all]
lx-daemon ansible_host=146.190.250.234
lx-cad-cluster-control ansible_host=138.197.136.93
lx-cad-cluster-worker ansible_host=138.197.140.188
lcn-daemon ansible_host=159.203.31.82
lcn-cad-cluster-control ansible_host=147.182.144.6
[so]
lx-daemon
lcn-daemon
[lx_cad]
lx-cad-cluster-control k8s_node_type=bootstrap
lx-cad-cluster-worker k8s_node_type=agent k8s_pod_limit=1024 k8s_external_ip=138.197.140.188
[lcn_cad]
lcn-cad-cluster-control k8s_node_type=bootstrap k8s_pod_limit=1024 k8s_external_ip=147.182.144.6
[k8s:children]
lx_cad
lcn_cad

View File

@ -1,20 +1,20 @@
---
- name: firewalld
scm: git
src: https://github.com/srwadleigh/ansible-role-firewalld
src: https://git.vdb.to/cerc-io/ansible-role-firewalld
version: main
- name: nginx
scm: git
src: https://github.com/srwadleigh/ansible-role-nginx
src: https://git.vdb.to/cerc-io/ansible-role-nginx
version: main
- name: so
scm: git
src: https://github.com/srwadleigh/ansible-role-so
src: https://git.vdb.to/cerc-io/ansible-role-so
version: main
- name: k8s
scm: git
src: https://github.com/srwadleigh/ansible-role-k8s
src: https://git.vdb.to/cerc-io/ansible-role-k8s
version: main