Skip to content
This repository was archived by the owner on Oct 7, 2025. It is now read-only.
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
41 commits
Select commit Hold shift + click to select a range
90aeb2c
Improving AWS subnet docs.
gregharvey Nov 22, 2023
c277047
Merge branch '2.x' into bug_fixes_2.x
gregharvey Nov 30, 2023
97570e3
Merge branch '2.x' into bug_fixes_2.x
gregharvey Dec 12, 2023
7c31b40
Error in timers structure in the SSL role.
gregharvey Dec 12, 2023
44a4d87
Merge branch '2.x' into bug_fixes_2.x-PR-2.x
gregharvey Dec 12, 2023
fd6c81b
Merge branch 'bug_fixes_2.x' into bug_fixes_2.x-PR-2.x
gregharvey Dec 12, 2023
8a5acaa
Merge branch '2.x' into bug_fixes_2.x
gregharvey Dec 21, 2023
b75fe03
Removing obsolete backports requirements.
gregharvey Dec 21, 2023
c57b886
Merge branch '2.x' into bug_fixes_2.x-PR-2.x
gregharvey Dec 21, 2023
b270172
Merge branch 'bug_fixes_2.x' into bug_fixes_2.x-PR-2.x
gregharvey Dec 21, 2023
5b27a8c
Allow the billing role to access Sustainability information.
gregharvey Dec 21, 2023
053097b
Merge branch '2.x' into bug_fixes_2.x-PR-2.x
gregharvey Dec 21, 2023
23bec8f
Merge branch 'bug_fixes_2.x' into bug_fixes_2.x-PR-2.x
gregharvey Dec 21, 2023
883e323
Merge branch '2.x' into bug_fixes_2.x
gregharvey Dec 21, 2023
dff1847
Merge branch '2.x' into bug_fixes_2.x
gregharvey Dec 21, 2023
9ca4148
Missing comma in IAM billing policy.
gregharvey Dec 21, 2023
1e07a78
Merge branch '2.x' into bug_fixes_2.x-PR-2.x
gregharvey Dec 21, 2023
fa8c5dc
Merge branch 'bug_fixes_2.x' into bug_fixes_2.x-PR-2.x
gregharvey Dec 21, 2023
d753fad
Merge branch '2.x' into bug_fixes_2.x
gregharvey Jan 9, 2024
c8199be
Removing broken GitLab Runner code.
gregharvey Jan 9, 2024
e1b01a8
Merge branch '2.x' into bug_fixes_2.x-PR-2.x
gregharvey Jan 9, 2024
c222fec
Merge branch 'bug_fixes_2.x' into bug_fixes_2.x-PR-2.x
gregharvey Jan 9, 2024
0ba4138
Fixed the include_role task in gitlab_runner.
gregharvey Jan 10, 2024
aacf70b
Suppressing a failure if there is no system pip to call.
gregharvey Jan 10, 2024
8b20f84
Merge branch '2.x' into bug_fixes_2.x-PR-2.x
gregharvey Jan 10, 2024
6357281
Merge branch 'bug_fixes_2.x' into bug_fixes_2.x-PR-2.x
gregharvey Jan 10, 2024
c634ef5
Logic error in Ansible installer username, needs to be set from calli…
gregharvey Jan 10, 2024
7e5fb2b
Merge branch 'bug_fixes_2.x' into bug_fixes_2.x-PR-2.x
gregharvey Jan 10, 2024
2673659
ansible_user is a reserved variable, seems to be causing issues.
gregharvey Jan 10, 2024
3dbd017
Merge branch 'bug_fixes_2.x' into bug_fixes_2.x-PR-2.x
gregharvey Jan 10, 2024
c6af4c0
_ansible_ANYTHING is reserved, using _install_username instead.
gregharvey Jan 10, 2024
2c487c2
Merge branch 'bug_fixes_2.x' into bug_fixes_2.x-PR-2.x
gregharvey Jan 10, 2024
b302676
python_boto role also needs the username set in the calling role.
gregharvey Jan 10, 2024
2fe29a1
Updating python_boto docs.
gregharvey Jan 10, 2024
b56f6a2
Merge branch '2.x' into bug_fixes_2.x-PR-2.x
gregharvey Jan 10, 2024
443534d
Merge branch 'bug_fixes_2.x' into bug_fixes_2.x-PR-2.x
gregharvey Jan 10, 2024
32f3ced
Making profile.d loading more robust.
gregharvey Jan 11, 2024
1f8d80e
Also pip removing ansible-core and trying with pip and pip3 to cover …
gregharvey Jan 11, 2024
ff2803f
Updating bad AWS SG role var namespacing in other roles.
gregharvey Jan 11, 2024
edf2185
Merge branch '2.x' into bug_fixes_2.x-PR-2.x
gregharvey Jan 11, 2024
d57d760
Merge branch 'bug_fixes_2.x' into bug_fixes_2.x-PR-2.x
gregharvey Jan 11, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
18 changes: 10 additions & 8 deletions roles/aws/aws_ec2_autoscale_cluster/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -379,10 +379,11 @@
ansible.builtin.include_role:
name: aws/aws_security_groups
vars:
profile: "{{ aws_ec2_autoscale_cluster.aws_profile }}"
region: "{{ aws_ec2_autoscale_cluster.region }}"
group_names: "{{ aws_ec2_autoscale_cluster.alb_security_groups }}"
return_type: ids
aws_security_groups:
profile: "{{ aws_ec2_autoscale_cluster.aws_profile }}"
region: "{{ aws_ec2_autoscale_cluster.region }}"
group_names: "{{ aws_ec2_autoscale_cluster.alb_security_groups }}"
return_type: ids
when:
- aws_ec2_autoscale_cluster.alb_security_groups | length > 0
- aws_ec2_autoscale_cluster.create_elb
Expand Down Expand Up @@ -425,10 +426,11 @@
ansible.builtin.include_role:
name: aws/aws_security_groups
vars:
profile: "{{ aws_ec2_autoscale_cluster.aws_profile }}"
region: "{{ aws_ec2_autoscale_cluster.region }}"
group_names: "{{ aws_ec2_autoscale_cluster.cluster_security_groups }}"
return_type: ids
aws_security_groups:
profile: "{{ aws_ec2_autoscale_cluster.aws_profile }}"
region: "{{ aws_ec2_autoscale_cluster.region }}"
group_names: "{{ aws_ec2_autoscale_cluster.cluster_security_groups }}"
return_type: ids
when:
- aws_ec2_autoscale_cluster.cluster_security_groups | length > 0
- aws_ec2_autoscale_cluster.asg_refresh
Expand Down
9 changes: 5 additions & 4 deletions roles/aws/aws_ec2_with_eip/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -95,10 +95,11 @@
ansible.builtin.include_role:
name: aws/aws_security_groups
vars:
profile: "{{ aws_ec2_with_eip.aws_profile }}"
region: "{{ aws_ec2_with_eip.region }}"
group_names: "{{ aws_ec2_with_eip.security_groups }}"
return_type: ids
aws_security_groups:
profile: "{{ aws_ec2_with_eip.aws_profile }}"
region: "{{ aws_ec2_with_eip.region }}"
group_names: "{{ aws_ec2_with_eip.security_groups }}"
return_type: ids
when: aws_ec2_with_eip.security_groups | length > 0

# Do not create an instance if _aws_hostname is not an EC2 generated address unless `force: true`
Expand Down
9 changes: 5 additions & 4 deletions roles/aws/aws_efs/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,11 @@
ansible.builtin.include_role:
name: aws/aws_security_groups
vars:
profile: "{{ aws_efs.aws_profile }}"
region: "{{ aws_efs.region }}"
group_names: "{{ aws_efs.security_groups }}"
return_type: ids
aws_security_groups:
profile: "{{ aws_efs.aws_profile }}"
region: "{{ aws_efs.region }}"
group_names: "{{ aws_efs.security_groups }}"
return_type: ids
when: aws_efs.security_groups | length > 0

- name: Reset subnet ids info
Expand Down
9 changes: 5 additions & 4 deletions roles/aws/aws_elasticache/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -3,10 +3,11 @@
ansible.builtin.include_role:
name: aws/aws_security_groups
vars:
profile: "{{ aws_elasticache.aws_profile }}"
region: "{{ aws_elasticache.region }}"
group_names: "{{ aws_elasticache.elasticache_security_groups }}"
return_type: ids
aws_security_groups:
profile: "{{ aws_elasticache.aws_profile }}"
region: "{{ aws_elasticache.region }}"
group_names: "{{ aws_elasticache.elasticache_security_groups }}"
return_type: ids
when: aws_elasticache.elasticache_security_groups | length > 0

- name: Create ElastiCache subnet group.
Expand Down
9 changes: 5 additions & 4 deletions roles/aws/aws_elb/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -113,10 +113,11 @@
ansible.builtin.include_role:
name: aws/aws_security_groups
vars:
profile: "{{ aws_elb.aws_profile }}"
region: "{{ aws_elb.region }}"
group_names: "{{ aws_elb.elb_security_groups }}"
return_type: ids
aws_security_groups:
profile: "{{ aws_elb.aws_profile }}"
region: "{{ aws_elb.region }}"
group_names: "{{ aws_elb.elb_security_groups }}"
return_type: ids
when: aws_elb.elb_security_groups | length > 0

- name: Create the ALB.
Expand Down
9 changes: 5 additions & 4 deletions roles/aws/aws_opensearch/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,10 +4,11 @@
ansible.builtin.include_role:
name: aws/aws_security_groups
vars:
profile: "{{ aws_opensearch.aws_profile }}"
region: "{{ aws_opensearch.region }}"
group_names: "{{ aws_opensearch.security_groups }}"
return_type: ids
aws_security_groups:
profile: "{{ aws_opensearch.aws_profile }}"
region: "{{ aws_opensearch.region }}"
group_names: "{{ aws_opensearch.security_groups }}"
return_type: ids
when: aws_opensearch.security_groups | length > 0

- name: Get the current AWS account caller identity information
Expand Down
9 changes: 5 additions & 4 deletions roles/aws/aws_rds/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -67,10 +67,11 @@
ansible.builtin.include_role:
name: aws/aws_security_groups
vars:
profile: "{{ aws_rds.aws_profile }}"
region: "{{ aws_rds.region }}"
group_names: "{{ aws_rds.security_groups }}"
return_type: ids
aws_security_groups:
profile: "{{ aws_rds.aws_profile }}"
region: "{{ aws_rds.region }}"
group_names: "{{ aws_rds.security_groups }}"
return_type: ids
when: aws_rds.security_groups | length > 0

- name: Create RDS instance
Expand Down
11 changes: 8 additions & 3 deletions roles/debian/ansible/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -4,12 +4,17 @@
pkg: ansible
state: absent

- name: Ensure Ansible is not installed globally with pip3 on older versions of Debian.
- name: Ensure Ansible is not installed globally with pip or pip3 on older versions of Debian.
ansible.builtin.pip:
name: ansible
name:
- ansible
- ansible-core
state: absent
executable: pip3
executable: "{{ item }}"
when: ansible_distribution_major_version | int < 12
with_items:
- pip
- pip3
failed_when: false # don't stop the build if there's no system pip

- name: Set up Python packages.
Expand Down
11 changes: 6 additions & 5 deletions roles/debian/gitlab_runner/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -42,11 +42,12 @@
apply:
delegate_to: localhost # this is how you delegate the include_role module
vars:
profile: "{{ gitlab_runner.fargate.profile }}"
region: "{{ gitlab_runner.fargate.region }}"
group_names:
- "{{ gitlab_runner.fargate.security_group }}"
return_type: ids
aws_security_groups:
profile: "{{ gitlab_runner.fargate.profile }}"
region: "{{ gitlab_runner.fargate.region }}"
group_names:
- "{{ gitlab_runner.fargate.security_group }}"
return_type: ids
when: gitlab_runner.install_fargate

- name: Create the Fargate driver directory if it does not exist.
Expand Down
10 changes: 6 additions & 4 deletions scripts/_common.sh
Original file line number Diff line number Diff line change
Expand Up @@ -34,10 +34,12 @@ if [ ! -d "$ANSIBLE_DATA_DIR" ]; then
mkdir "$ANSIBLE_DATA_DIR"
fi
# Load the contents of profile.d in case we added items to $PATH there.
for f in /etc/profile.d/*; do
# shellcheck source=/dev/null
. "$f"
done
if [ -n "$(ls -A /etc/profile.d)" ]; then
for f in /etc/profile.d/*; do
# shellcheck source=/dev/null
. "$f"
done
fi
# Parse options arguments.
parse_options(){
while [ "${1:-}" ]; do
Expand Down