diff --git a/roles/ipmi_exporter/README.md b/roles/ipmi_exporter/README.md new file mode 100644 index 00000000..e02ff844 --- /dev/null +++ b/roles/ipmi_exporter/README.md @@ -0,0 +1,44 @@ +

graph logo

+ +# Ansible Role: ipmi_exporter + +## Description + +Deploy prometheus [ipmi_exporter](https://github.com/prometheus-community/ipmi_exporter) using ansible. + +## Requirements + +- Ansible >= 2.9 (It might work on previous versions, but we cannot guarantee it) +- gnu-tar on Mac deployer host (`brew install gnu-tar`) +- Passlib is required when using the basic authentication feature (`pip install passlib[bcrypt]`) + +## Role Variables + +All variables which can be overridden are stored in [defaults/main.yml](defaults/main.yml) file as well as in [meta/argument_specs.yml](meta/argument_specs.yml). +Please refer to the [collection docs](https://prometheus-community.github.io/ansible/branch/main/ipmi_exporter_role.html) for description and default values of the variables. + +## Example + +### Demo site + +We provide demo site for full monitoring solution based on prometheus and grafana. Repository with code and links to running instances is [available on github](https://github.com/prometheus/demo-site) and site is hosted on [DigitalOcean](https://digitalocean.com). + +## Local Testing + +The preferred way of locally testing the role is to use Docker and [molecule](https://github.com/ansible-community/molecule) (v3.x). You will have to install Docker on your system. See "Get started" for a Docker package suitable to for your system. Running your tests is as simple as executing `molecule test`. + +## Continuous Intergation + +Combining molecule and circle CI allows us to test how new PRs will behave when used with multiple ansible versions and multiple operating systems. This also allows use to create test scenarios for different role configurations. As a result we have a quite large test matrix which can take more time than local testing, so please be patient. + +## Contributing + +See [contributor guideline](CONTRIBUTING.md). + +## Troubleshooting + +See [troubleshooting](TROUBLESHOOTING.md). + +## License + +This project is licensed under MIT License. See [LICENSE](/LICENSE) for more details. diff --git a/roles/ipmi_exporter/defaults/main.yml b/roles/ipmi_exporter/defaults/main.yml new file mode 100644 index 00000000..87e4d88d --- /dev/null +++ b/roles/ipmi_exporter/defaults/main.yml @@ -0,0 +1,31 @@ +--- +ipmi_exporter_version: 1.7.0 +ipmi_exporter_binary_local_dir: "" +ipmi_exporter_binary_url: "https://github.com/{{ _ipmi_exporter_repo }}/releases/download/v{{ ipmi_exporter_version }}/\ + ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}.tar.gz" +ipmi_exporter_checksums_url: "https://github.com/{{ _ipmi_exporter_repo }}/releases/download/v{{ ipmi_exporter_version }}/sha256sums.txt" +ipmi_exporter_skip_install: false + +ipmi_exporter_modules: + default: + collectors: + - bmc + - ipmi + - dcmi + - chassis + - sel + +ipmi_exporter_web_listen_address: "0.0.0.0:9290" + +ipmi_exporter_tls_server_config: {} + +ipmi_exporter_http_server_config: {} + +ipmi_exporter_basic_auth_users: {} + +ipmi_exporter_log_level: "info" +ipmi_exporter_log_format: "logfmt" + +ipmi_exporter_binary_install_dir: "/usr/local/bin" +ipmi_exporter_system_group: "ipmi-exp" +ipmi_exporter_system_user: "{{ ipmi_exporter_system_group }}" diff --git a/roles/ipmi_exporter/handlers/main.yml b/roles/ipmi_exporter/handlers/main.yml new file mode 100644 index 00000000..ef582798 --- /dev/null +++ b/roles/ipmi_exporter/handlers/main.yml @@ -0,0 +1,10 @@ +--- +- name: Restart ipmi_exporter + listen: "restart ipmi_exporter" + become: true + ansible.builtin.systemd: + daemon_reload: true + name: ipmi_exporter + state: restarted + when: + - not ansible_check_mode diff --git a/roles/ipmi_exporter/meta/argument_specs.yml b/roles/ipmi_exporter/meta/argument_specs.yml new file mode 100644 index 00000000..5a2cc5b7 --- /dev/null +++ b/roles/ipmi_exporter/meta/argument_specs.yml @@ -0,0 +1,70 @@ +--- +# yamllint disable rule:line-length +argument_specs: + main: + short_description: "Prometheus ipmi_exporter" + description: + - "Deploy prometheus L(ipmi exporter,https://github.com/prometheus-community/ipmi_exporter) using ansible" + author: + - "Prometheus Community" + options: + ipmi_exporter_version: + description: "ipmi_exporter package version. Also accepts latest as parameter." + default: "0.14.2" + ipmi_exporter_skip_install: + description: "ipmi_exporter installation tasks gets skipped when set to true." + type: bool + default: false + ipmi_exporter_binary_local_dir: + description: + - "Enables the use of local packages instead of those distributed on github." + - "The parameter may be set to a directory where the C(ipmi_exporter) binary is stored on the host where ansible is run." + - "This overrides the I(ipmi_exporter_version) parameter" + ipmi_exporter_binary_url: + description: "URL of the ipmi_exporter binaries .tar.gz file" + default: "https://github.com/{{ _ipmi_exporter_repo }}/releases/download/v{{ ipmi_exporter_version }}/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}.tar.gz" + ipmi_exporter_checksums_url: + description: "URL of the ipmi_exporter checksums file" + default: "https://github.com/{{ _ipmi_exporter_repo }}/releases/download/v{{ ipmi_exporter_version }}/sha256sums.txt" + ipmi_exporter_modules: + description: + - "ipmi_exporter modules configuration" + - "https://github.com/prometheus-community/ipmi_exporter#configuration" + type: "dict" + ipmi_exporter_web_listen_address: + description: "Address on which ipmi exporter will listen" + default: "0.0.0.0:9290" + ipmi_exporter_tls_server_config: + description: + - "Configuration for TLS authentication." + - "Keys and values are the same as in L(ipmi_exporter docs,https://github.com/prometheus/exporter-toolkit/blob/master/docs/web-configuration.md)." + type: "dict" + ipmi_exporter_http_server_config: + description: + - "Config for HTTP/2 support." + - "Keys and values are the same as in L(ipmi_exporter docs,https://github.com/prometheus/exporter-toolkit/blob/master/docs/web-configuration.md)." + type: "dict" + ipmi_exporter_basic_auth_users: + description: "Dictionary of users and password for basic authentication. Passwords are automatically hashed with bcrypt." + type: "dict" + ipmi_exporter_log_level: + description: "Only log messages with the given severity or above. One of: [debug, info, warn, error]" + default: "info" + ipmi_exporter_log_format: + description: "Output format of log messages. One of: [logfmt, json]" + default: "logfmt" + ipmi_exporter_binary_install_dir: + description: + - "I(Advanced)" + - "Directory to install ipmi_exporter binary" + default: "/usr/local/bin" + ipmi_exporter_system_group: + description: + - "I(Advanced)" + - "System group for ipmi_exporter" + default: "ipmi-exp" + ipmi_exporter_system_user: + description: + - "I(Advanced)" + - "ipmi_exporter user" + default: "ipmi-exp" diff --git a/roles/ipmi_exporter/meta/main.yml b/roles/ipmi_exporter/meta/main.yml new file mode 100644 index 00000000..b0f6e6f7 --- /dev/null +++ b/roles/ipmi_exporter/meta/main.yml @@ -0,0 +1,30 @@ +--- +galaxy_info: + author: "Prometheus Community" + description: "Prometheus ipmi_exporter" + license: "Apache" + min_ansible_version: "2.9" + platforms: + - name: "Ubuntu" + versions: + - "focal" + - "jammy" + - name: "Debian" + versions: + - "bullseye" + - "buster" + - name: "EL" + versions: + - "7" + - "8" + - "9" + - name: "Fedora" + versions: + - "37" + - '38' + galaxy_tags: + - "monitoring" + - "prometheus" + - "exporter" + - "metrics" + - "system" diff --git a/roles/ipmi_exporter/molecule/alternative/molecule.yml b/roles/ipmi_exporter/molecule/alternative/molecule.yml new file mode 100644 index 00000000..93942955 --- /dev/null +++ b/roles/ipmi_exporter/molecule/alternative/molecule.yml @@ -0,0 +1,17 @@ +--- +provisioner: + inventory: + group_vars: + all: + ipmi_exporter_binary_local_dir: "/tmp/ipmi_exporter-linux-amd64" + ipmi_exporter_web_listen_address: "127.0.0.1:8080" + + ipmi_exporter_tls_server_config: + cert_file: /etc/ipmi_exporter/tls.cert + key_file: /etc/ipmi_exporter/tls.key + ipmi_exporter_http_server_config: + http2: true + ipmi_exporter_basic_auth_users: + randomuser: examplepassword + go_arch: amd64 + ipmi_exporter_version: 1.6.1 diff --git a/roles/ipmi_exporter/molecule/alternative/prepare.yml b/roles/ipmi_exporter/molecule/alternative/prepare.yml new file mode 100644 index 00000000..ce3e4918 --- /dev/null +++ b/roles/ipmi_exporter/molecule/alternative/prepare.yml @@ -0,0 +1,78 @@ +--- +- name: Run local preparation + hosts: localhost + gather_facts: false + tasks: + - name: Download ipmi_exporter binary to local folder + become: false + ansible.builtin.get_url: + url: "https://github.com/prometheus-community/ipmi_exporter/releases/download/v{{\ + \ ipmi_exporter_version }}/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{\ + \ go_arch }}.tar.gz" + dest: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}.tar.gz" + mode: 0644 + register: _download_binary + until: _download_binary is succeeded + retries: 5 + delay: 2 + check_mode: false + + - name: Unpack ipmi_exporter binary + become: false + ansible.builtin.unarchive: + src: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}.tar.gz" + dest: "/tmp" + creates: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch\ + \ }}/ipmi_exporter" + check_mode: false + + - name: Link to ipmi_exporter binaries directory + become: false + ansible.builtin.file: + src: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-amd64" + dest: "/tmp/ipmi_exporter-linux-amd64" + state: link + check_mode: false + + - name: Install pyOpenSSL for certificate generation + ansible.builtin.pip: + name: "pyOpenSSL" + + - name: Create private key + community.crypto.openssl_privatekey: + path: "/tmp/tls.key" + + - name: Create CSR + community.crypto.openssl_csr: + path: "/tmp/tls.csr" + privatekey_path: "/tmp/tls.key" + + - name: Create certificate + community.crypto.x509_certificate: + path: "/tmp/tls.cert" + csr_path: "/tmp/tls.csr" + privatekey_path: "/tmp/tls.key" + provider: selfsigned + +- name: Run target preparation + hosts: all + any_errors_fatal: true + tasks: + - name: Create ipmi_exporter cert dir + ansible.builtin.file: + path: "{{ ipmi_exporter_tls_server_config.cert_file | dirname }}" + state: directory + owner: root + group: root + mode: u+rwX,g+rwX,o=rX + + - name: Copy cert and key + ansible.builtin.copy: + src: "{{ item.src }}" + dest: "{{ item.dest }}" + mode: "{{ item.mode | default('0644') }}" + loop: + - src: "/tmp/tls.cert" + dest: "{{ ipmi_exporter_tls_server_config.cert_file }}" + - src: "/tmp/tls.key" + dest: "{{ ipmi_exporter_tls_server_config.key_file }}" diff --git a/roles/ipmi_exporter/molecule/alternative/tests/test_alternative.py b/roles/ipmi_exporter/molecule/alternative/tests/test_alternative.py new file mode 100644 index 00000000..e673e56d --- /dev/null +++ b/roles/ipmi_exporter/molecule/alternative/tests/test_alternative.py @@ -0,0 +1,46 @@ +from __future__ import (absolute_import, division, print_function) +__metaclass__ = type + +import os +import testinfra.utils.ansible_runner + +testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner( + os.environ['MOLECULE_INVENTORY_FILE']).get_hosts('all') + + +def test_directories(host): + dirs = [ + "/etc/ipmi_exporter" + ] + for dir in dirs: + d = host.file(dir) + assert d.is_directory + assert d.exists + + +def test_service(host): + s = host.service("ipmi_exporter") + try: + assert s.is_running + except AssertionError: + # Capture service logs + journal_output = host.run('journalctl -u ipmi_exporter --since "1 hour ago"') + print("\n==== journalctl -u ipmi_exporter Output ====\n") + print(journal_output) + print("\n============================================\n") + raise # Re-raise the original assertion error + + +def test_protecthome_property(host): + s = host.service("ipmi_exporter") + p = s.systemd_properties + assert p.get("ProtectHome") == "yes" + + +def test_socket(host): + sockets = [ + "tcp://127.0.0.1:8080" + ] + for socket in sockets: + s = host.socket(socket) + assert s.is_listening diff --git a/roles/ipmi_exporter/molecule/default/molecule.yml b/roles/ipmi_exporter/molecule/default/molecule.yml new file mode 100644 index 00000000..bd304599 --- /dev/null +++ b/roles/ipmi_exporter/molecule/default/molecule.yml @@ -0,0 +1,6 @@ +--- +provisioner: + inventory: + group_vars: + all: + ipmi_exporter_web_listen_address: "127.0.0.1:9290" diff --git a/roles/ipmi_exporter/molecule/default/tests/test_default.py b/roles/ipmi_exporter/molecule/default/tests/test_default.py new file mode 100644 index 00000000..fcd30e46 --- /dev/null +++ b/roles/ipmi_exporter/molecule/default/tests/test_default.py @@ -0,0 +1,64 @@ +from __future__ import (absolute_import, division, print_function) +__metaclass__ = type + +import os +import testinfra.utils.ansible_runner + +testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner( + os.environ['MOLECULE_INVENTORY_FILE']).get_hosts('all') + + +def test_directories(host): + dirs = [ + "/etc/ipmi_exporter" + ] + for dir in dirs: + d = host.file(dir) + assert d.is_directory + assert d.exists + + +def test_files(host): + files = [ + "/etc/systemd/system/ipmi_exporter.service", + "/usr/local/bin/ipmi_exporter" + ] + for file in files: + f = host.file(file) + assert f.exists + assert f.is_file + + +def test_user(host): + assert host.group("ipmi-exp").exists + assert "ipmi-exp" in host.user("ipmi-exp").groups + assert host.user("ipmi-exp").shell == "/usr/sbin/nologin" + assert host.user("ipmi-exp").home == "/" + + +def test_service(host): + s = host.service("ipmi_exporter") + try: + assert s.is_running + except AssertionError: + # Capture service logs + journal_output = host.run('journalctl -u ipmi_exporter --since "1 hour ago"') + print("\n==== journalctl -u ipmi_exporter Output ====\n") + print(journal_output) + print("\n============================================\n") + raise # Re-raise the original assertion error + + +def test_protecthome_property(host): + s = host.service("ipmi_exporter") + p = s.systemd_properties + assert p.get("ProtectHome") == "yes" + + +def test_socket(host): + sockets = [ + "tcp://127.0.0.1:9290" + ] + for socket in sockets: + s = host.socket(socket) + assert s.is_listening diff --git a/roles/ipmi_exporter/molecule/latest/molecule.yml b/roles/ipmi_exporter/molecule/latest/molecule.yml new file mode 100644 index 00000000..90abf77d --- /dev/null +++ b/roles/ipmi_exporter/molecule/latest/molecule.yml @@ -0,0 +1,6 @@ +--- +provisioner: + inventory: + group_vars: + all: + ipmi_exporter_version: latest diff --git a/roles/ipmi_exporter/molecule/latest/tests/test_latest.py b/roles/ipmi_exporter/molecule/latest/tests/test_latest.py new file mode 100644 index 00000000..0cfac425 --- /dev/null +++ b/roles/ipmi_exporter/molecule/latest/tests/test_latest.py @@ -0,0 +1,43 @@ +from __future__ import (absolute_import, division, print_function) +__metaclass__ = type + +import os +import testinfra.utils.ansible_runner +import pytest + +testinfra_hosts = testinfra.utils.ansible_runner.AnsibleRunner( + os.environ['MOLECULE_INVENTORY_FILE']).get_hosts('all') + + +@pytest.mark.parametrize("files", [ + "/etc/systemd/system/ipmi_exporter.service", + "/usr/local/bin/ipmi_exporter" +]) +def test_files(host, files): + f = host.file(files) + assert f.exists + assert f.is_file + + +def test_service(host): + s = host.service("ipmi_exporter") + try: + assert s.is_running + except AssertionError: + # Capture service logs + journal_output = host.run('journalctl -u ipmi_exporter --since "1 hour ago"') + print("\n==== journalctl -u ipmi_exporter Output ====\n") + print(journal_output) + print("\n============================================\n") + raise # Re-raise the original assertion error + + +def test_protecthome_property(host): + s = host.service("ipmi_exporter") + p = s.systemd_properties + assert p.get("ProtectHome") == "yes" + + +def test_socket(host): + s = host.socket("tcp://0.0.0.0:9290") + assert s.is_listening diff --git a/roles/ipmi_exporter/tasks/configure.yml b/roles/ipmi_exporter/tasks/configure.yml new file mode 100644 index 00000000..34a03ef8 --- /dev/null +++ b/roles/ipmi_exporter/tasks/configure.yml @@ -0,0 +1,47 @@ +--- +- name: Copy the ipmi_exporter systemd service file + ansible.builtin.template: + src: ipmi_exporter.service.j2 + dest: /etc/systemd/system/ipmi_exporter.service + owner: root + group: root + mode: 0644 + notify: restart ipmi_exporter + +- name: Create ipmi_exporter config directory + ansible.builtin.file: + path: "/etc/ipmi_exporter" + state: directory + owner: root + group: root + mode: u+rwX,g+rwX,o=rX + +- name: Copy the ipmi_exporter web config file + ansible.builtin.template: + src: web_config.yaml.j2 + dest: /etc/ipmi_exporter/web_config.yaml + owner: root + group: root + mode: 0644 + notify: restart ipmi_exporter + +- name: Copy the ipmi_exporter config file + ansible.builtin.template: + src: config.yaml.j2 + dest: /etc/ipmi_exporter/config.yaml + owner: root + group: "{{ ipmi_exporter_system_group }}" + mode: 0640 + no_log: "{{ false if (lookup('env', 'CI')) or (lookup('env', 'MOLECULE_PROVISIONER_NAME')) else true }}" + notify: + - restart ipmi_exporter + +- name: Allow ipmi_exporter port in SELinux on RedHat OS family + community.general.seport: + ports: "{{ ipmi_exporter_web_listen_address.split(':')[-1] }}" + proto: tcp + setype: http_port_t + state: present + when: + - ansible_version.full is version_compare('2.4', '>=') + - ansible_selinux.status == "enabled" diff --git a/roles/ipmi_exporter/tasks/install.yml b/roles/ipmi_exporter/tasks/install.yml new file mode 100644 index 00000000..9ebd6da2 --- /dev/null +++ b/roles/ipmi_exporter/tasks/install.yml @@ -0,0 +1,74 @@ +--- +- name: Create the ipmi_exporter group + ansible.builtin.group: + name: "{{ ipmi_exporter_system_group }}" + state: present + system: true + when: ipmi_exporter_system_group != "root" + +- name: Create the ipmi_exporter user + ansible.builtin.user: + name: "{{ ipmi_exporter_system_user }}" + groups: "{{ ipmi_exporter_system_group }}" + append: true + shell: /usr/sbin/nologin + system: true + create_home: false + home: / + when: ipmi_exporter_system_user != "root" + +- name: Get binary + when: + - ipmi_exporter_binary_local_dir | length == 0 + - not ipmi_exporter_skip_install + block: + + - name: Download ipmi_exporter binary to local folder + become: false + ansible.builtin.get_url: + url: "{{ ipmi_exporter_binary_url }}" + dest: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}.tar.gz" + checksum: "sha256:{{ __ipmi_exporter_checksum }}" + mode: '0644' + register: _download_binary + until: _download_binary is succeeded + retries: 5 + delay: 2 + delegate_to: localhost + check_mode: false + + - name: Unpack ipmi_exporter binary + become: false + ansible.builtin.unarchive: + src: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}.tar.gz" + dest: "/tmp" + creates: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}/ipmi_exporter" + delegate_to: localhost + check_mode: false + + - name: Propagate ipmi_exporter binaries + ansible.builtin.copy: + src: "/tmp/ipmi_exporter-{{ ipmi_exporter_version }}.linux-{{ go_arch }}/ipmi_exporter" + dest: "{{ ipmi_exporter_binary_install_dir }}/ipmi_exporter" + mode: 0755 + owner: root + group: root + notify: restart ipmi_exporter + when: not ansible_check_mode + +- name: Propagate locally distributed ipmi_exporter binary + ansible.builtin.copy: + src: "{{ ipmi_exporter_binary_local_dir }}/ipmi_exporter" + dest: "{{ ipmi_exporter_binary_install_dir }}/ipmi_exporter" + mode: 0755 + owner: root + group: root + when: + - ipmi_exporter_binary_local_dir | length > 0 + - not ipmi_exporter_skip_install + notify: restart ipmi_exporter + +- name: Install freeipmi package + ansible.builtin.package: + name: freeipmi + state: present diff --git a/roles/ipmi_exporter/tasks/main.yml b/roles/ipmi_exporter/tasks/main.yml new file mode 100644 index 00000000..c3ebe6d1 --- /dev/null +++ b/roles/ipmi_exporter/tasks/main.yml @@ -0,0 +1,63 @@ +--- +- name: Preflight + ansible.builtin.include_tasks: + file: preflight.yml + apply: + tags: + - ipmi_exporter_install + - ipmi_exporter_configure + - ipmi_exporter_run + tags: + - ipmi_exporter_install + - ipmi_exporter_configure + - ipmi_exporter_run + +- name: Install + ansible.builtin.include_tasks: + file: install.yml + apply: + become: true + tags: + - ipmi_exporter_install + when: + ( not __ipmi_exporter_is_installed.stat.exists ) or + ( (__ipmi_exporter_current_version_output.stderr_lines | length > 0) + and (__ipmi_exporter_current_version_output.stderr_lines[0].split(" ")[2] != ipmi_exporter_version) ) or + ( (__ipmi_exporter_current_version_output.stdout_lines | length > 0) + and (__ipmi_exporter_current_version_output.stdout_lines[0].split(" ")[2] != ipmi_exporter_version) ) or + ( ipmi_exporter_binary_local_dir | length > 0 ) + tags: + - ipmi_exporter_install + +- name: SELinux + ansible.builtin.include_tasks: + file: selinux.yml + apply: + become: true + tags: + - ipmi_exporter_configure + when: ansible_selinux.status == "enabled" + tags: + - ipmi_exporter_configure + +- name: Configure + ansible.builtin.include_tasks: + file: configure.yml + apply: + become: true + tags: + - ipmi_exporter_configure + tags: + - ipmi_exporter_configure + +- name: Ensure ipmi_exporter is enabled on boot + become: true + ansible.builtin.systemd: + daemon_reload: true + name: ipmi_exporter + enabled: true + state: started + when: + - not ansible_check_mode + tags: + - ipmi_exporter_run diff --git a/roles/ipmi_exporter/tasks/preflight.yml b/roles/ipmi_exporter/tasks/preflight.yml new file mode 100644 index 00000000..5baab8ca --- /dev/null +++ b/roles/ipmi_exporter/tasks/preflight.yml @@ -0,0 +1,110 @@ +--- +- name: Assert usage of systemd as an init system + ansible.builtin.assert: + that: ansible_service_mgr == 'systemd' + msg: "This role only works with systemd" + +- name: Install package fact dependencies + become: true + ansible.builtin.package: + name: "{{ _pkg_fact_req }}" + state: present + when: (_pkg_fact_req) + vars: + _pkg_fact_req: "{% if (ansible_pkg_mgr == 'apt') %}\ + {{ ('python-apt' if ansible_python_version is version('3', '<') else 'python3-apt') }} + {% else %}\ + {% endif %}" + +- name: Gather package facts + ansible.builtin.package_facts: + when: "not 'packages' in ansible_facts" + +- name: Assert that used version supports listen address type + ansible.builtin.assert: + that: + - >- + ipmi_exporter_web_listen_address is string + +- name: Naive assertion of proper listen address + ansible.builtin.assert: + that: + - >- + [ipmi_exporter_web_listen_address] | + flatten | + reject('match', '.+:\\d+$') | + list | + length == 0 + +- name: Assert that TLS config is correct + when: ipmi_exporter_tls_server_config | length > 0 + block: + - name: Assert that TLS key and cert path are set + ansible.builtin.assert: + that: + - "ipmi_exporter_tls_server_config.cert_file is defined" + - "ipmi_exporter_tls_server_config.key_file is defined" + + - name: Check existence of TLS cert file + ansible.builtin.stat: + path: "{{ ipmi_exporter_tls_server_config.cert_file }}" + register: __ipmi_exporter_cert_file + + - name: Check existence of TLS key file + ansible.builtin.stat: + path: "{{ ipmi_exporter_tls_server_config.key_file }}" + register: __ipmi_exporter_key_file + + - name: Assert that TLS key and cert are present + ansible.builtin.assert: + that: + - "__ipmi_exporter_cert_file.stat.exists" + - "__ipmi_exporter_key_file.stat.exists" + +- name: Check if ipmi_exporter is installed + ansible.builtin.stat: + path: "{{ ipmi_exporter_binary_install_dir }}/ipmi_exporter" + register: __ipmi_exporter_is_installed + check_mode: false + tags: + - ipmi_exporter_install + +- name: Gather currently installed ipmi_exporter version (if any) + ansible.builtin.command: "{{ ipmi_exporter_binary_install_dir }}/ipmi_exporter --version" + changed_when: false + register: __ipmi_exporter_current_version_output + check_mode: false + when: __ipmi_exporter_is_installed.stat.exists + tags: + - ipmi_exporter_install + +- name: Discover latest version + ansible.builtin.set_fact: + ipmi_exporter_version: "{{ (lookup('url', 'https://api.github.com/repos/{{ _ipmi_exporter_repo }}/releases/latest', headers=_github_api_headers, + split_lines=False) | from_json).get('tag_name') | replace('v', '') }}" + run_once: true + until: ipmi_exporter_version is version('0.0.0', '>=') + retries: 10 + when: + - ipmi_exporter_version == "latest" + - ipmi_exporter_binary_local_dir | length == 0 + - not ipmi_exporter_skip_install + +- name: Get ipmi_exporter binary checksum + when: + - ipmi_exporter_binary_local_dir | length == 0 + - not ipmi_exporter_skip_install + block: + - name: Get checksum list from github + ansible.builtin.set_fact: + __ipmi_exporter_checksums: "{{ lookup('url', ipmi_exporter_checksums_url, headers=_github_api_headers, wantlist=True) | list }}" + run_once: true + until: __ipmi_exporter_checksums is search('linux-' + go_arch + '.tar.gz') + retries: 10 + + - name: "Get checksum for {{ go_arch }}" + ansible.builtin.set_fact: + __ipmi_exporter_checksum: "{{ item.split(' ')[0] }}" + with_items: "{{ __ipmi_exporter_checksums }}" + when: + - "('linux-' + go_arch + '.tar.gz') in item" diff --git a/roles/ipmi_exporter/tasks/selinux.yml b/roles/ipmi_exporter/tasks/selinux.yml new file mode 100644 index 00000000..754cbd0a --- /dev/null +++ b/roles/ipmi_exporter/tasks/selinux.yml @@ -0,0 +1,23 @@ +--- +- name: Install selinux python packages [RedHat] + ansible.builtin.package: + name: "{{ ['libselinux-python', 'policycoreutils-python'] + if ansible_python_version is version('3', '<') else + ['python3-libselinux', 'python3-policycoreutils'] }}" + state: present + register: _install_selinux_packages + until: _install_selinux_packages is success + retries: 5 + delay: 2 + when: ansible_os_family | lower == "redhat" + +- name: Install selinux python packages [clearlinux] + ansible.builtin.package: + name: sysadmin-basic + state: present + register: _install_selinux_packages + until: _install_selinux_packages is success + retries: 5 + delay: 2 + when: + - ansible_distribution | lower == "clearlinux" diff --git a/roles/ipmi_exporter/templates/config.yaml.j2 b/roles/ipmi_exporter/templates/config.yaml.j2 new file mode 100644 index 00000000..53059a09 --- /dev/null +++ b/roles/ipmi_exporter/templates/config.yaml.j2 @@ -0,0 +1,4 @@ +--- +{{ ansible_managed | comment }} +modules: +{{ ipmi_exporter_modules | to_nice_yaml | indent(2, true) }} diff --git a/roles/ipmi_exporter/templates/ipmi_exporter.service.j2 b/roles/ipmi_exporter/templates/ipmi_exporter.service.j2 new file mode 100644 index 00000000..11aaca9d --- /dev/null +++ b/roles/ipmi_exporter/templates/ipmi_exporter.service.j2 @@ -0,0 +1,38 @@ +{{ ansible_managed | comment }} + +[Unit] +Description=Prometheus ipmi_exporter +After=network-online.target + +[Service] +Type=simple +User={{ ipmi_exporter_system_user }} +Group={{ ipmi_exporter_system_group }} +ExecStart={{ ipmi_exporter_binary_install_dir }}/ipmi_exporter \ + '--config.file=/etc/ipmi_exporter/config.yaml' \ + '--web.listen-address={{ ipmi_exporter_web_listen_address }}' \ +{% if ipmi_exporter_tls_server_config | length > 0 or ipmi_exporter_http_server_config | length > 0 or ipmi_exporter_basic_auth_users | length > 0 %} + '--web.config.file=/etc/ipmi_exporter/web_config.yaml' \ +{% endif %} + '--log.level={{ ipmi_exporter_log_level }}' \ + '--log.format={{ ipmi_exporter_log_format }}' + +SyslogIdentifier=ipmi_exporter +Restart=always +RestartSec=1 +StartLimitInterval=0 + +ProtectHome=yes +NoNewPrivileges=yes + +{% if (ansible_facts.packages.systemd | first).version is version('232', '>=') %} +ProtectSystem=strict +ProtectControlGroups=true +ProtectKernelModules=true +ProtectKernelTunables=yes +{% else %} +ProtectSystem=full +{% endif %} + +[Install] +WantedBy=multi-user.target diff --git a/roles/ipmi_exporter/templates/web_config.yaml.j2 b/roles/ipmi_exporter/templates/web_config.yaml.j2 new file mode 100644 index 00000000..9842b7de --- /dev/null +++ b/roles/ipmi_exporter/templates/web_config.yaml.j2 @@ -0,0 +1,18 @@ +--- +{{ ansible_managed | comment }} +{% if ipmi_exporter_tls_server_config | length > 0 %} +tls_server_config: +{{ ipmi_exporter_tls_server_config | to_nice_yaml | indent(2, true) }} +{% endif %} + +{% if ipmi_exporter_http_server_config | length > 0 %} +http_server_config: +{{ ipmi_exporter_http_server_config | to_nice_yaml | indent(2, true) }} +{% endif %} + +{% if ipmi_exporter_basic_auth_users | length > 0 %} +basic_auth_users: +{% for k, v in ipmi_exporter_basic_auth_users.items() %} + {{ k }}: {{ v | string | password_hash('bcrypt', ('abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890' | shuffle(seed=inventory_hostname) | join)[:22], rounds=9) }} +{% endfor %} +{% endif %} diff --git a/roles/ipmi_exporter/test-requirements.txt b/roles/ipmi_exporter/test-requirements.txt new file mode 100644 index 00000000..7f0b6e75 --- /dev/null +++ b/roles/ipmi_exporter/test-requirements.txt @@ -0,0 +1 @@ +bcrypt diff --git a/roles/ipmi_exporter/vars/main.yml b/roles/ipmi_exporter/vars/main.yml new file mode 100644 index 00000000..0f385948 --- /dev/null +++ b/roles/ipmi_exporter/vars/main.yml @@ -0,0 +1,11 @@ +--- +go_arch_map: + i386: '386' + x86_64: 'amd64' + aarch64: 'arm64' + armv7l: 'armv7' + armv6l: 'armv6' + +go_arch: "{{ go_arch_map[ansible_architecture] | default(ansible_architecture) }}" +_ipmi_exporter_repo: "prometheus-community/ipmi_exporter" +_github_api_headers: "{{ {'GITHUB_TOKEN': lookup('ansible.builtin.env', 'GITHUB_TOKEN')} if (lookup('ansible.builtin.env', 'GITHUB_TOKEN')) else {} }}" diff --git a/tests/integration/targets/molecule-ipmi_exporter-alternative/runme.sh b/tests/integration/targets/molecule-ipmi_exporter-alternative/runme.sh new file mode 100755 index 00000000..d094c3e1 --- /dev/null +++ b/tests/integration/targets/molecule-ipmi_exporter-alternative/runme.sh @@ -0,0 +1,4 @@ +#!/usr/bin/env bash + +collection_root=$(pwd | grep -oP ".+\/ansible_collections\/\w+?\/\w+") +source "$collection_root/tests/integration/molecule.sh" diff --git a/tests/integration/targets/molecule-ipmi_exporter-default/runme.sh b/tests/integration/targets/molecule-ipmi_exporter-default/runme.sh new file mode 100755 index 00000000..d094c3e1 --- /dev/null +++ b/tests/integration/targets/molecule-ipmi_exporter-default/runme.sh @@ -0,0 +1,4 @@ +#!/usr/bin/env bash + +collection_root=$(pwd | grep -oP ".+\/ansible_collections\/\w+?\/\w+") +source "$collection_root/tests/integration/molecule.sh" diff --git a/tests/integration/targets/molecule-ipmi_exporter-latest/runme.sh b/tests/integration/targets/molecule-ipmi_exporter-latest/runme.sh new file mode 100755 index 00000000..d094c3e1 --- /dev/null +++ b/tests/integration/targets/molecule-ipmi_exporter-latest/runme.sh @@ -0,0 +1,4 @@ +#!/usr/bin/env bash + +collection_root=$(pwd | grep -oP ".+\/ansible_collections\/\w+?\/\w+") +source "$collection_root/tests/integration/molecule.sh"