feat: Add ipmi_exporter role

Add a new role for the `ipmi_exporter`.

Signed-off-by: SuperQ <superq@gmail.com>
This commit is contained in:
SuperQ 2024-01-07 10:08:14 +01:00
parent f9265bcdfe
commit b3582f1ff9
No known key found for this signature in database
GPG key ID: C646B23C9E3245F1
25 changed files with 846 additions and 0 deletions

View file

@ -0,0 +1,44 @@
<p><img src="https://www.circonus.com/wp-content/uploads/2015/03/sol-icon-itOps.png" alt="graph logo" title="graph" align="right" height="60" /></p>
# Ansible Role: ipmi_exporter
## Description
Deploy prometheus [ipmi_exporter](https://github.com/prometheus-community/ipmi_exporter) using ansible.
## Requirements
- Ansible >= 2.9 (It might work on previous versions, but we cannot guarantee it)
- gnu-tar on Mac deployer host (`brew install gnu-tar`)
- Passlib is required when using the basic authentication feature (`pip install passlib[bcrypt]`)
## Role Variables
All variables which can be overridden are stored in [defaults/main.yml](defaults/main.yml) file as well as in [meta/argument_specs.yml](meta/argument_specs.yml).
Please refer to the [collection docs](https://prometheus-community.github.io/ansible/branch/main/ipmi_exporter_role.html) for description and default values of the variables.
## Example
### Demo site
We provide demo site for full monitoring solution based on prometheus and grafana. Repository with code and links to running instances is [available on github](https://github.com/prometheus/demo-site) and site is hosted on [DigitalOcean](https://digitalocean.com).
## Local Testing
The preferred way of locally testing the role is to use Docker and [molecule](https://github.com/ansible-community/molecule) (v3.x). You will have to install Docker on your system. See "Get started" for a Docker package suitable to for your system. Running your tests is as simple as executing `molecule test`.
## Continuous Intergation
Combining molecule and circle CI allows us to test how new PRs will behave when used with multiple ansible versions and multiple operating systems. This also allows use to create test scenarios for different role configurations. As a result we have a quite large test matrix which can take more time than local testing, so please be patient.
## Contributing
See [contributor guideline](CONTRIBUTING.md).
## Troubleshooting
See [troubleshooting](TROUBLESHOOTING.md).
## License
This project is licensed under MIT License. See [LICENSE](/LICENSE) for more details.

View file

@ -0,0 +1,31 @@
---
ipmi_exporter_version: 1.7.0
ipmi_exporter_binary_local_dir: ""
ipmi_exporter_binary_url: "https://github.com/{{ _ipmi_exporter_repo }}/releases/download/v{{ ipmi_exporter_version }}/\
ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}.tar.gz"
ipmi_exporter_checksums_url: "https://github.com/{{ _ipmi_exporter_repo }}/releases/download/v{{ ipmi_exporter_version }}/sha256sums.txt"
ipmi_exporter_skip_install: false
ipmi_exporter_modules:
default:
collectors:
- bmc
- ipmi
- dcmi
- chassis
- sel
ipmi_exporter_web_listen_address: "0.0.0.0:9290"
ipmi_exporter_tls_server_config: {}
ipmi_exporter_http_server_config: {}
ipmi_exporter_basic_auth_users: {}
ipmi_exporter_log_level: "info"
ipmi_exporter_log_format: "logfmt"
ipmi_exporter_binary_install_dir: "/usr/local/bin"
ipmi_exporter_system_group: "ipmi-exp"
ipmi_exporter_system_user: "{{ ipmi_exporter_system_group }}"

View file

@ -0,0 +1,10 @@
---
- name: Restart ipmi_exporter
listen: "restart ipmi_exporter"
become: true
ansible.builtin.systemd:
daemon_reload: true
name: ipmi_exporter
state: restarted
when:
- not ansible_check_mode

View file

@ -0,0 +1,70 @@
---
# yamllint disable rule:line-length
argument_specs:
main:
short_description: "Prometheus ipmi_exporter"
description:
- "Deploy prometheus L(ipmi exporter,https://github.com/prometheus-community/ipmi_exporter) using ansible"
author:
- "Prometheus Community"
options:
ipmi_exporter_version:
description: "ipmi_exporter package version. Also accepts latest as parameter."
default: "0.14.2"
ipmi_exporter_skip_install:
description: "ipmi_exporter installation tasks gets skipped when set to true."
type: bool
default: false
ipmi_exporter_binary_local_dir:
description:
- "Enables the use of local packages instead of those distributed on github."
- "The parameter may be set to a directory where the C(ipmi_exporter) binary is stored on the host where ansible is run."
- "This overrides the I(ipmi_exporter_version) parameter"
ipmi_exporter_binary_url:
description: "URL of the ipmi_exporter binaries .tar.gz file"
default: "https://github.com/{{ _ipmi_exporter_repo }}/releases/download/v{{ ipmi_exporter_version }}/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}.tar.gz"
ipmi_exporter_checksums_url:
description: "URL of the ipmi_exporter checksums file"
default: "https://github.com/{{ _ipmi_exporter_repo }}/releases/download/v{{ ipmi_exporter_version }}/sha256sums.txt"
ipmi_exporter_modules:
description:
- "ipmi_exporter modules configuration"
- "https://github.com/prometheus-community/ipmi_exporter#configuration"
type: "dict"
ipmi_exporter_web_listen_address:
description: "Address on which ipmi exporter will listen"
default: "0.0.0.0:9290"
ipmi_exporter_tls_server_config:
description:
- "Configuration for TLS authentication."
- "Keys and values are the same as in L(ipmi_exporter docs,https://github.com/prometheus/exporter-toolkit/blob/master/docs/web-configuration.md)."
type: "dict"
ipmi_exporter_http_server_config:
description:
- "Config for HTTP/2 support."
- "Keys and values are the same as in L(ipmi_exporter docs,https://github.com/prometheus/exporter-toolkit/blob/master/docs/web-configuration.md)."
type: "dict"
ipmi_exporter_basic_auth_users:
description: "Dictionary of users and password for basic authentication. Passwords are automatically hashed with bcrypt."
type: "dict"
ipmi_exporter_log_level:
description: "Only log messages with the given severity or above. One of: [debug, info, warn, error]"
default: "info"
ipmi_exporter_log_format:
description: "Output format of log messages. One of: [logfmt, json]"
default: "logfmt"
ipmi_exporter_binary_install_dir:
description:
- "I(Advanced)"
- "Directory to install ipmi_exporter binary"
default: "/usr/local/bin"
ipmi_exporter_system_group:
description:
- "I(Advanced)"
- "System group for ipmi_exporter"
default: "ipmi-exp"
ipmi_exporter_system_user:
description:
- "I(Advanced)"
- "ipmi_exporter user"
default: "ipmi-exp"

View file

@ -0,0 +1,30 @@
---
galaxy_info:
author: "Prometheus Community"
description: "Prometheus ipmi_exporter"
license: "Apache"
min_ansible_version: "2.9"
platforms:
- name: "Ubuntu"
versions:
- "focal"
- "jammy"
- name: "Debian"
versions:
- "bullseye"
- "buster"
- name: "EL"
versions:
- "7"
- "8"
- "9"
- name: "Fedora"
versions:
- "37"
- '38'
galaxy_tags:
- "monitoring"
- "prometheus"
- "exporter"
- "metrics"
- "system"

View file

@ -0,0 +1,17 @@
---
provisioner:
inventory:
group_vars:
all:
ipmi_exporter_binary_local_dir: "/tmp/ipmi_exporter-linux-amd64"
ipmi_exporter_web_listen_address: "127.0.0.1:8080"
ipmi_exporter_tls_server_config:
cert_file: /etc/ipmi_exporter/tls.cert
key_file: /etc/ipmi_exporter/tls.key
ipmi_exporter_http_server_config:
http2: true
ipmi_exporter_basic_auth_users:
randomuser: examplepassword
go_arch: amd64
ipmi_exporter_version: 1.6.1

View file

@ -0,0 +1,78 @@
---
- name: Run local preparation
hosts: localhost
gather_facts: false
tasks:
- name: Download ipmi_exporter binary to local folder
become: false
ansible.builtin.get_url:
url: "https://github.com/prometheus-community/ipmi_exporter/releases/download/v{{\
\ ipmi_exporter_version }}/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{\
\ go_arch }}.tar.gz"
dest: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}.tar.gz"
mode: 0644
register: _download_binary
until: _download_binary is succeeded
retries: 5
delay: 2
check_mode: false
- name: Unpack ipmi_exporter binary
become: false
ansible.builtin.unarchive:
src: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}.tar.gz"
dest: "/tmp"
creates: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch\
\ }}/ipmi_exporter"
check_mode: false
- name: Link to ipmi_exporter binaries directory
become: false
ansible.builtin.file:
src: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-amd64"
dest: "/tmp/ipmi_exporter-linux-amd64"
state: link
check_mode: false
- name: Install pyOpenSSL for certificate generation
ansible.builtin.pip:
name: "pyOpenSSL"
- name: Create private key
community.crypto.openssl_privatekey:
path: "/tmp/tls.key"
- name: Create CSR
community.crypto.openssl_csr:
path: "/tmp/tls.csr"
privatekey_path: "/tmp/tls.key"
- name: Create certificate
community.crypto.x509_certificate:
path: "/tmp/tls.cert"
csr_path: "/tmp/tls.csr"
privatekey_path: "/tmp/tls.key"
provider: selfsigned
- name: Run target preparation
hosts: all
any_errors_fatal: true
tasks:
- name: Create ipmi_exporter cert dir
ansible.builtin.file:
path: "{{ ipmi_exporter_tls_server_config.cert_file | dirname }}"
state: directory
owner: root
group: root
mode: u+rwX,g+rwX,o=rX
- name: Copy cert and key
ansible.builtin.copy:
src: "{{ item.src }}"
dest: "{{ item.dest }}"
mode: "{{ item.mode | default('0644') }}"
loop:
- src: "/tmp/tls.cert"
dest: "{{ ipmi_exporter_tls_server_config.cert_file }}"
- src: "/tmp/tls.key"
dest: "{{ ipmi_exporter_tls_server_config.key_file }}"

View file

@ -0,0 +1,46 @@
from __future__ import (absolute_import, division, print_function)
__metaclass__ = type
import os
import testinfra.utils.ansible_runner
testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner(
os.environ['MOLECULE_INVENTORY_FILE']).get_hosts('all')
def test_directories(host):
dirs = [
"/etc/ipmi_exporter"
]
for dir in dirs:
d = host.file(dir)
assert d.is_directory
assert d.exists
def test_service(host):
s = host.service("ipmi_exporter")
try:
assert s.is_running
except AssertionError:
# Capture service logs
journal_output = host.run('journalctl -u ipmi_exporter --since "1 hour ago"')
print("\n==== journalctl -u ipmi_exporter Output ====\n")
print(journal_output)
print("\n============================================\n")
raise # Re-raise the original assertion error
def test_protecthome_property(host):
s = host.service("ipmi_exporter")
p = s.systemd_properties
assert p.get("ProtectHome") == "yes"
def test_socket(host):
sockets = [
"tcp://127.0.0.1:8080"
]
for socket in sockets:
s = host.socket(socket)
assert s.is_listening

View file

@ -0,0 +1,6 @@
---
provisioner:
inventory:
group_vars:
all:
ipmi_exporter_web_listen_address: "127.0.0.1:9290"

View file

@ -0,0 +1,64 @@
from __future__ import (absolute_import, division, print_function)
__metaclass__ = type
import os
import testinfra.utils.ansible_runner
testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner(
os.environ['MOLECULE_INVENTORY_FILE']).get_hosts('all')
def test_directories(host):
dirs = [
"/etc/ipmi_exporter"
]
for dir in dirs:
d = host.file(dir)
assert d.is_directory
assert d.exists
def test_files(host):
files = [
"/etc/systemd/system/ipmi_exporter.service",
"/usr/local/bin/ipmi_exporter"
]
for file in files:
f = host.file(file)
assert f.exists
assert f.is_file
def test_user(host):
assert host.group("ipmi-exp").exists
assert "ipmi-exp" in host.user("ipmi-exp").groups
assert host.user("ipmi-exp").shell == "/usr/sbin/nologin"
assert host.user("ipmi-exp").home == "/"
def test_service(host):
s = host.service("ipmi_exporter")
try:
assert s.is_running
except AssertionError:
# Capture service logs
journal_output = host.run('journalctl -u ipmi_exporter --since "1 hour ago"')
print("\n==== journalctl -u ipmi_exporter Output ====\n")
print(journal_output)
print("\n============================================\n")
raise # Re-raise the original assertion error
def test_protecthome_property(host):
s = host.service("ipmi_exporter")
p = s.systemd_properties
assert p.get("ProtectHome") == "yes"
def test_socket(host):
sockets = [
"tcp://127.0.0.1:9290"
]
for socket in sockets:
s = host.socket(socket)
assert s.is_listening

View file

@ -0,0 +1,6 @@
---
provisioner:
inventory:
group_vars:
all:
ipmi_exporter_version: latest

View file

@ -0,0 +1,43 @@
from __future__ import (absolute_import, division, print_function)
__metaclass__ = type
import os
import testinfra.utils.ansible_runner
import pytest
testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner(
os.environ['MOLECULE_INVENTORY_FILE']).get_hosts('all')
@pytest.mark.parametrize("files", [
"/etc/systemd/system/ipmi_exporter.service",
"/usr/local/bin/ipmi_exporter"
])
def test_files(host, files):
f = host.file(files)
assert f.exists
assert f.is_file
def test_service(host):
s = host.service("ipmi_exporter")
try:
assert s.is_running
except AssertionError:
# Capture service logs
journal_output = host.run('journalctl -u ipmi_exporter --since "1 hour ago"')
print("\n==== journalctl -u ipmi_exporter Output ====\n")
print(journal_output)
print("\n============================================\n")
raise # Re-raise the original assertion error
def test_protecthome_property(host):
s = host.service("ipmi_exporter")
p = s.systemd_properties
assert p.get("ProtectHome") == "yes"
def test_socket(host):
s = host.socket("tcp://0.0.0.0:9290")
assert s.is_listening

View file

@ -0,0 +1,47 @@
---
- name: Copy the ipmi_exporter systemd service file
ansible.builtin.template:
src: ipmi_exporter.service.j2
dest: /etc/systemd/system/ipmi_exporter.service
owner: root
group: root
mode: 0644
notify: restart ipmi_exporter
- name: Create ipmi_exporter config directory
ansible.builtin.file:
path: "/etc/ipmi_exporter"
state: directory
owner: root
group: root
mode: u+rwX,g+rwX,o=rX
- name: Copy the ipmi_exporter web config file
ansible.builtin.template:
src: web_config.yaml.j2
dest: /etc/ipmi_exporter/web_config.yaml
owner: root
group: root
mode: 0644
notify: restart ipmi_exporter
- name: Copy the ipmi_exporter config file
ansible.builtin.template:
src: config.yaml.j2
dest: /etc/ipmi_exporter/config.yaml
owner: root
group: "{{ ipmi_exporter_system_group }}"
mode: 0640
no_log: "{{ false if (lookup('env', 'CI')) or (lookup('env', 'MOLECULE_PROVISIONER_NAME')) else true }}"
notify:
- restart ipmi_exporter
- name: Allow ipmi_exporter port in SELinux on RedHat OS family
community.general.seport:
ports: "{{ ipmi_exporter_web_listen_address.split(':')[-1] }}"
proto: tcp
setype: http_port_t
state: present
when:
- ansible_version.full is version_compare('2.4', '>=')
- ansible_selinux.status == "enabled"

View file

@ -0,0 +1,74 @@
---
- name: Create the ipmi_exporter group
ansible.builtin.group:
name: "{{ ipmi_exporter_system_group }}"
state: present
system: true
when: ipmi_exporter_system_group != "root"
- name: Create the ipmi_exporter user
ansible.builtin.user:
name: "{{ ipmi_exporter_system_user }}"
groups: "{{ ipmi_exporter_system_group }}"
append: true
shell: /usr/sbin/nologin
system: true
create_home: false
home: /
when: ipmi_exporter_system_user != "root"
- name: Get binary
when:
- ipmi_exporter_binary_local_dir | length == 0
- not ipmi_exporter_skip_install
block:
- name: Download ipmi_exporter binary to local folder
become: false
ansible.builtin.get_url:
url: "{{ ipmi_exporter_binary_url }}"
dest: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}.tar.gz"
checksum: "sha256:{{ __ipmi_exporter_checksum }}"
mode: '0644'
register: _download_binary
until: _download_binary is succeeded
retries: 5
delay: 2
delegate_to: localhost
check_mode: false
- name: Unpack ipmi_exporter binary
become: false
ansible.builtin.unarchive:
src: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}.tar.gz"
dest: "/tmp"
creates: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}/ipmi_exporter"
delegate_to: localhost
check_mode: false
- name: Propagate ipmi_exporter binaries
ansible.builtin.copy:
src: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}/ipmi_exporter"
dest: "{{ ipmi_exporter_binary_install_dir }}/ipmi_exporter"
mode: 0755
owner: root
group: root
notify: restart ipmi_exporter
when: not ansible_check_mode
- name: Propagate locally distributed ipmi_exporter binary
ansible.builtin.copy:
src: "{{ ipmi_exporter_binary_local_dir }}/ipmi_exporter"
dest: "{{ ipmi_exporter_binary_install_dir }}/ipmi_exporter"
mode: 0755
owner: root
group: root
when:
- ipmi_exporter_binary_local_dir | length > 0
- not ipmi_exporter_skip_install
notify: restart ipmi_exporter
- name: Install freeipmi package
ansible.builtin.package:
name: freeipmi
state: present

View file

@ -0,0 +1,63 @@
---
- name: Preflight
ansible.builtin.include_tasks:
file: preflight.yml
apply:
tags:
- ipmi_exporter_install
- ipmi_exporter_configure
- ipmi_exporter_run
tags:
- ipmi_exporter_install
- ipmi_exporter_configure
- ipmi_exporter_run
- name: Install
ansible.builtin.include_tasks:
file: install.yml
apply:
become: true
tags:
- ipmi_exporter_install
when:
( not __ipmi_exporter_is_installed.stat.exists ) or
( (__ipmi_exporter_current_version_output.stderr_lines | length > 0)
and (__ipmi_exporter_current_version_output.stderr_lines[0].split(" ")[2] != ipmi_exporter_version) ) or
( (__ipmi_exporter_current_version_output.stdout_lines | length > 0)
and (__ipmi_exporter_current_version_output.stdout_lines[0].split(" ")[2] != ipmi_exporter_version) ) or
( ipmi_exporter_binary_local_dir | length > 0 )
tags:
- ipmi_exporter_install
- name: SELinux
ansible.builtin.include_tasks:
file: selinux.yml
apply:
become: true
tags:
- ipmi_exporter_configure
when: ansible_selinux.status == "enabled"
tags:
- ipmi_exporter_configure
- name: Configure
ansible.builtin.include_tasks:
file: configure.yml
apply:
become: true
tags:
- ipmi_exporter_configure
tags:
- ipmi_exporter_configure
- name: Ensure ipmi_exporter is enabled on boot
become: true
ansible.builtin.systemd:
daemon_reload: true
name: ipmi_exporter
enabled: true
state: started
when:
- not ansible_check_mode
tags:
- ipmi_exporter_run

View file

@ -0,0 +1,110 @@
---
- name: Assert usage of systemd as an init system
ansible.builtin.assert:
that: ansible_service_mgr == 'systemd'
msg: "This role only works with systemd"
- name: Install package fact dependencies
become: true
ansible.builtin.package:
name: "{{ _pkg_fact_req }}"
state: present
when: (_pkg_fact_req)
vars:
_pkg_fact_req: "{% if (ansible_pkg_mgr == 'apt') %}\
{{ ('python-apt' if ansible_python_version is version('3', '<') else 'python3-apt') }}
{% else %}\
{% endif %}"
- name: Gather package facts
ansible.builtin.package_facts:
when: "not 'packages' in ansible_facts"
- name: Assert that used version supports listen address type
ansible.builtin.assert:
that:
- >-
ipmi_exporter_web_listen_address is string
- name: Naive assertion of proper listen address
ansible.builtin.assert:
that:
- >-
[ipmi_exporter_web_listen_address] |
flatten |
reject('match', '.+:\\d+$') |
list |
length == 0
- name: Assert that TLS config is correct
when: ipmi_exporter_tls_server_config | length > 0
block:
- name: Assert that TLS key and cert path are set
ansible.builtin.assert:
that:
- "ipmi_exporter_tls_server_config.cert_file is defined"
- "ipmi_exporter_tls_server_config.key_file is defined"
- name: Check existence of TLS cert file
ansible.builtin.stat:
path: "{{ ipmi_exporter_tls_server_config.cert_file }}"
register: __ipmi_exporter_cert_file
- name: Check existence of TLS key file
ansible.builtin.stat:
path: "{{ ipmi_exporter_tls_server_config.key_file }}"
register: __ipmi_exporter_key_file
- name: Assert that TLS key and cert are present
ansible.builtin.assert:
that:
- "__ipmi_exporter_cert_file.stat.exists"
- "__ipmi_exporter_key_file.stat.exists"
- name: Check if ipmi_exporter is installed
ansible.builtin.stat:
path: "{{ ipmi_exporter_binary_install_dir }}/ipmi_exporter"
register: __ipmi_exporter_is_installed
check_mode: false
tags:
- ipmi_exporter_install
- name: Gather currently installed ipmi_exporter version (if any)
ansible.builtin.command: "{{ ipmi_exporter_binary_install_dir }}/ipmi_exporter --version"
changed_when: false
register: __ipmi_exporter_current_version_output
check_mode: false
when: __ipmi_exporter_is_installed.stat.exists
tags:
- ipmi_exporter_install
- name: Discover latest version
ansible.builtin.set_fact:
ipmi_exporter_version: "{{ (lookup('url', 'https://api.github.com/repos/{{ _ipmi_exporter_repo }}/releases/latest', headers=_github_api_headers,
split_lines=False) | from_json).get('tag_name') | replace('v', '') }}"
run_once: true
until: ipmi_exporter_version is version('0.0.0', '>=')
retries: 10
when:
- ipmi_exporter_version == "latest"
- ipmi_exporter_binary_local_dir | length == 0
- not ipmi_exporter_skip_install
- name: Get ipmi_exporter binary checksum
when:
- ipmi_exporter_binary_local_dir | length == 0
- not ipmi_exporter_skip_install
block:
- name: Get checksum list from github
ansible.builtin.set_fact:
__ipmi_exporter_checksums: "{{ lookup('url', ipmi_exporter_checksums_url, headers=_github_api_headers, wantlist=True) | list }}"
run_once: true
until: __ipmi_exporter_checksums is search('linux-' + go_arch + '.tar.gz')
retries: 10
- name: "Get checksum for {{ go_arch }}"
ansible.builtin.set_fact:
__ipmi_exporter_checksum: "{{ item.split(' ')[0] }}"
with_items: "{{ __ipmi_exporter_checksums }}"
when:
- "('linux-' + go_arch + '.tar.gz') in item"

View file

@ -0,0 +1,23 @@
---
- name: Install selinux python packages [RedHat]
ansible.builtin.package:
name: "{{ ['libselinux-python', 'policycoreutils-python']
if ansible_python_version is version('3', '<') else
['python3-libselinux', 'python3-policycoreutils'] }}"
state: present
register: _install_selinux_packages
until: _install_selinux_packages is success
retries: 5
delay: 2
when: ansible_os_family | lower == "redhat"
- name: Install selinux python packages [clearlinux]
ansible.builtin.package:
name: sysadmin-basic
state: present
register: _install_selinux_packages
until: _install_selinux_packages is success
retries: 5
delay: 2
when:
- ansible_distribution | lower == "clearlinux"

View file

@ -0,0 +1,4 @@
---
{{ ansible_managed | comment }}
modules:
{{ ipmi_exporter_modules | to_nice_yaml | indent(2, true) }}

View file

@ -0,0 +1,38 @@
{{ ansible_managed | comment }}
[Unit]
Description=Prometheus ipmi_exporter
After=network-online.target
[Service]
Type=simple
User={{ ipmi_exporter_system_user }}
Group={{ ipmi_exporter_system_group }}
ExecStart={{ ipmi_exporter_binary_install_dir }}/ipmi_exporter \
'--config.file=/etc/ipmi_exporter/config.yaml' \
'--web.listen-address={{ ipmi_exporter_web_listen_address }}' \
{% if ipmi_exporter_tls_server_config | length > 0 or ipmi_exporter_http_server_config | length > 0 or ipmi_exporter_basic_auth_users | length > 0 %}
'--web.config.file=/etc/ipmi_exporter/web_config.yaml' \
{% endif %}
'--log.level={{ ipmi_exporter_log_level }}' \
'--log.format={{ ipmi_exporter_log_format }}'
SyslogIdentifier=ipmi_exporter
Restart=always
RestartSec=1
StartLimitInterval=0
ProtectHome=yes
NoNewPrivileges=yes
{% if (ansible_facts.packages.systemd | first).version is version('232', '>=') %}
ProtectSystem=strict
ProtectControlGroups=true
ProtectKernelModules=true
ProtectKernelTunables=yes
{% else %}
ProtectSystem=full
{% endif %}
[Install]
WantedBy=multi-user.target

View file

@ -0,0 +1,18 @@
---
{{ ansible_managed | comment }}
{% if ipmi_exporter_tls_server_config | length > 0 %}
tls_server_config:
{{ ipmi_exporter_tls_server_config | to_nice_yaml | indent(2, true) }}
{% endif %}
{% if ipmi_exporter_http_server_config | length > 0 %}
http_server_config:
{{ ipmi_exporter_http_server_config | to_nice_yaml | indent(2, true) }}
{% endif %}
{% if ipmi_exporter_basic_auth_users | length > 0 %}
basic_auth_users:
{% for k, v in ipmi_exporter_basic_auth_users.items() %}
{{ k }}: {{ v | string | password_hash('bcrypt', ('abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890' | shuffle(seed=inventory_hostname) | join)[:22], rounds=9) }}
{% endfor %}
{% endif %}

View file

@ -0,0 +1 @@
bcrypt

View file

@ -0,0 +1,11 @@
---
go_arch_map:
i386: '386'
x86_64: 'amd64'
aarch64: 'arm64'
armv7l: 'armv7'
armv6l: 'armv6'
go_arch: "{{ go_arch_map[ansible_architecture] | default(ansible_architecture) }}"
_ipmi_exporter_repo: "prometheus-community/ipmi_exporter"
_github_api_headers: "{{ {'GITHUB_TOKEN': lookup('ansible.builtin.env', 'GITHUB_TOKEN')} if (lookup('ansible.builtin.env', 'GITHUB_TOKEN')) else {} }}"

View file

@ -0,0 +1,4 @@
#!/usr/bin/env bash
collection_root=$(pwd | grep -oP ".+\/ansible_collections\/\w+?\/\w+")
source "$collection_root/tests/integration/molecule.sh"

View file

@ -0,0 +1,4 @@
#!/usr/bin/env bash
collection_root=$(pwd | grep -oP ".+\/ansible_collections\/\w+?\/\w+")
source "$collection_root/tests/integration/molecule.sh"

View file

@ -0,0 +1,4 @@
#!/usr/bin/env bash
collection_root=$(pwd | grep -oP ".+\/ansible_collections\/\w+?\/\w+")
source "$collection_root/tests/integration/molecule.sh"