ip → ansible.utils.ip

linter
_shirenn 2022-07-04 23:53:01 +02:00
parent 55e1fdc184
commit a0ac6e7293
49 changed files with 101 additions and 101 deletions

View File

@ -4,7 +4,7 @@ glob_adh:
listen_local: listen_local:
- "127.0.0.1:80" - "127.0.0.1:80"
- "[::1]:80" - "[::1]:80"
listen_network: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipwrap }}" listen_network: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ansible.utils.ipwrap }}"
club_vhosts: club_vhosts:
- from: pot-vieux.crans.org - from: pot-vieux.crans.org
to: club-vieux/www to: club-vieux/www

View File

@ -1,7 +1,7 @@
--- ---
glob_home_nounou: glob_home_nounou:
mounts: mounts:
- ip: "{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}" - ip: "{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}"
mountpoint: /pool/home mountpoint: /pool/home
target: /home_nounou target: /home_nounou
name: home_nounou name: home_nounou

View File

@ -3,31 +3,31 @@ glob_network_interfaces:
vlan: vlan:
- name: srv - name: srv
id: 2 id: 2
gateway: "{{ query('ldap', 'ip', 'passerelle', 'srv') | ipv4 | first }}" gateway: "{{ query('ldap', 'ip', 'passerelle', 'srv') | ansible.utils.ipv4 | first }}"
dns: "{{ query('ldap', 'ip', 'passerelle', 'srv') | ipv4 | first }}" dns: "{{ query('ldap', 'ip', 'passerelle', 'srv') | ansible.utils.ipv4 | first }}"
gateway_v6: "{{ query('ldap', 'ip', 'passerelle', 'srv') | ipv6 | first }}" gateway_v6: "{{ query('ldap', 'ip', 'passerelle', 'srv') | ansible.utils.ipv6 | first }}"
- name: srv_nat - name: srv_nat
id: 3 id: 3
gateway: "{{ query('ldap', 'ip', 'passerelle', 'srv-nat') | ipv4 | first }}" gateway: "{{ query('ldap', 'ip', 'passerelle', 'srv-nat') | ansible.utils.ipv4 | first }}"
dns: "{{ query('ldap', 'ip', 'passerelle', 'srv-nat') | ipv4 | first }}" dns: "{{ query('ldap', 'ip', 'passerelle', 'srv-nat') | ansible.utils.ipv4 | first }}"
gateway_v6: "{{ query('ldap', 'ip', 'passerelle', 'srv-nat') | ipv6 | first }}" gateway_v6: "{{ query('ldap', 'ip', 'passerelle', 'srv-nat') | ansible.utils.ipv6 | first }}"
- name: san - name: san
id: 4 id: 4
extra: extra:
- "mtu 9000" - "mtu 9000"
- name: adm - name: adm
id: 10 id: 10
dns: "{{ query('ldap', 'ip', 'routeur-sam', 'adm') | ipv4 | first }} {{ query('ldap', 'ip', 'routeur-daniel', 'adm') | ipv4 | first }}" dns: "{{ query('ldap', 'ip', 'routeur-sam', 'adm') | ansible.utils.ipv4 | first }} {{ query('ldap', 'ip', 'routeur-daniel', 'adm') | ansible.utils.ipv4 | first }}"
- name: adh - name: adh
id: 12 id: 12
gateway: "{{ query('ldap', 'ip', 'passerelle', 'adh') | ipv4 | first }}" gateway: "{{ query('ldap', 'ip', 'passerelle', 'adh') | ansible.utils.ipv4 | first }}"
dns: "{{ query('ldap', 'ip', 'passerelle', 'adh') | ipv4 | first }}" dns: "{{ query('ldap', 'ip', 'passerelle', 'adh') | ansible.utils.ipv4 | first }}"
gateway_v6: "{{ query('ldap', 'ip', 'passerelle', 'adh') | ipv6 | first }}" gateway_v6: "{{ query('ldap', 'ip', 'passerelle', 'adh') | ansible.utils.ipv6 | first }}"
- name: adh_adm - name: adh_adm
id: 13 id: 13
- name: renater - name: renater
id: 38 id: 38
gateway: "{{ query('ldap', 'ip', 'dsi', 'renater') | ipv4 | first }}" gateway: "{{ query('ldap', 'ip', 'dsi', 'renater') | ansible.utils.ipv4 | first }}"
- name: lp - name: lp
id: 56 id: 56
- name: auto - name: auto

View File

@ -1,3 +1,3 @@
--- ---
glob_prometheus_nginx_exporter: glob_prometheus_nginx_exporter:
listen_addr: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipv4 | first }}" listen_addr: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ansible.utils.ipv4 | first }}"

View File

@ -1,3 +1,3 @@
--- ---
glob_prometheus_node_exporter: glob_prometheus_node_exporter:
listen_addr: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipv4 | first }}" listen_addr: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ansible.utils.ipv4 | first }}"

View File

@ -1,3 +1,3 @@
--- ---
glob_rsyslog_client: glob_rsyslog_client:
server: "{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}" server: "{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}"

View File

@ -1,7 +1,7 @@
--- ---
loc_home_nounou: loc_home_nounou:
mounts: mounts:
- ip: "{{ query('ldap', 'ip', 'thot', 'adm') | ipv4 | first }}" - ip: "{{ query('ldap', 'ip', 'thot', 'adm') | ansible.utils.ipv4 | first }}"
mountpoint: /home_nounou mountpoint: /home_nounou
target: /home_nounou target: /home_nounou
name: home_nounou name: home_nounou

View File

@ -1,4 +1,4 @@
--- ---
loc_ldap: loc_ldap:
servers: servers:
- "{{ query('ldap', 'ip', 'thot', 'adm') | ipv4 | first }}" - "{{ query('ldap', 'ip', 'thot', 'adm') | ansible.utils.ipv4 | first }}"

View File

@ -8,14 +8,14 @@ glob_constellation:
- 'intranet.crans.org' - 'intranet.crans.org'
email: email:
ssl: false ssl: false
host: "{{ query('ldap', 'ip', 'redisdead', 'adm') | ipv4 | first }}" host: "{{ query('ldap', 'ip', 'redisdead', 'adm') | ansible.utils.ipv4 | first }}"
port: 25 port: 25
user: '' user: ''
password: '' password: ''
from: "root@crans.org" from: "root@crans.org"
from_full: "Crans <root@crans.org>" from_full: "Crans <root@crans.org>"
database: database:
host: "{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}" host: "{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}"
port: 5432 port: 5432
user: 'constellation' user: 'constellation'
password: "{{ vault.constellation.django_db_password }}" password: "{{ vault.constellation.django_db_password }}"

View File

@ -13,7 +13,7 @@ glob_django_cas:
secret_key: "{{ vault.cas.secret_key }}" secret_key: "{{ vault.cas.secret_key }}"
mail: mail:
address: 'root@crans.org' address: 'root@crans.org'
host: "{{ query('ldap', 'ip', 'redisdead', 'adm') | ipv4 | first }}" host: "{{ query('ldap', 'ip', 'redisdead', 'adm') | ansible.utils.ipv4 | first }}"
port: 25 port: 25
loc_nginx: loc_nginx:

View File

@ -1,9 +1,9 @@
--- ---
glob_dovecot: glob_dovecot:
ldap: ldap:
uri: "ldap://{{ query('ldap', 'ip', 're2o-ldap', 'adm') | ipv4 | first }}/" uri: "ldap://{{ query('ldap', 'ip', 're2o-ldap', 'adm') | ansible.utils.ipv4 | first }}/"
dn: 'cn=dovecot,ou=service-users,dc=crans,dc=org' dn: 'cn=dovecot,ou=service-users,dc=crans,dc=org'
pass: "{{ vault.dovecot_dnpass }}" pass: "{{ vault.dovecot_dnpass }}"
users_base: 'cn=Utilisateurs,dc=crans,dc=org' users_base: 'cn=Utilisateurs,dc=crans,dc=org'
home_path: '/home_adh' home_path: '/home_adh'
inet_listener: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipwrap | join(', ') }}" inet_listener: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ansible.utils.ipwrap | join(', ') }}"

View File

@ -1,3 +1,3 @@
--- ---
glob_ethercalc: glob_ethercalc:
ip: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipv4 | first }}" ip: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ansible.utils.ipv4 | first }}"

View File

@ -19,5 +19,5 @@ glob_horde:
admin_dest_hostname: webmail.adm.crans.org admin_dest_hostname: webmail.adm.crans.org
zone_ipv4: 172.16.10.0/24 zone_ipv4: 172.16.10.0/24
zone_ipv6: fd00:0:0:10::/64 zone_ipv6: fd00:0:0:10::/64
ipv4: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipv4 | first }}" ipv4: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ansible.utils.ipv4 | first }}"
ipv6: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipv6 | first }}" ipv6: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ansible.utils.ipv6 | first }}"

View File

@ -2,7 +2,7 @@
glob_keepalived: glob_keepalived:
mail_source: keepalived@crans.org mail_source: keepalived@crans.org
mail_destination: root@crans.org mail_destination: root@crans.org
smtp_server: "{{ query('ldap', 'ip', 'redisdead', 'adm') | ipv4 | first }}" smtp_server: "{{ query('ldap', 'ip', 'redisdead', 'adm') | ansible.utils.ipv4 | first }}"
routeur_id: "{{ ansible_hostname }}" routeur_id: "{{ ansible_hostname }}"
pool: pool:
VI_ALL: VI_ALL:

View File

@ -57,13 +57,13 @@ glob_mailman3:
database: database:
user: "mailman3" user: "mailman3"
pass: "{{ vault.mailman3.database.pass }}" pass: "{{ vault.mailman3.database.pass }}"
host: "{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}" host: "{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}"
port: 5432 port: 5432
name: "mailman3" name: "mailman3"
web_database: web_database:
user: "mailman3web" user: "mailman3web"
pass: "{{ vault.mailman3.web_database.pass }}" pass: "{{ vault.mailman3.web_database.pass }}"
host: "{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}" host: "{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}"
port: 5432 port: 5432
name: "mailman3web" name: "mailman3web"
restadmin_pass: "{{ vault.mailman3.restadmin_pass }}" restadmin_pass: "{{ vault.mailman3.restadmin_pass }}"

View File

@ -8,14 +8,14 @@ glob_printer:
- 'imprimante.crans.org' - 'imprimante.crans.org'
email: email:
ssl: false ssl: false
host: "{{ query('ldap', 'ip', 'redisdead', 'adm') | ipv4 | first }}" host: "{{ query('ldap', 'ip', 'redisdead', 'adm') | ansible.utils.ipv4 | first }}"
port: 25 port: 25
user: '' user: ''
password: '' password: ''
from: "root@crans.org" from: "root@crans.org"
from_full: "Crans <root@crans.org>" from_full: "Crans <root@crans.org>"
database: database:
host: "{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}" host: "{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}"
port: 5432 port: 5432
user: 'helloworld' user: 'helloworld'
password: "{{ vault.printer.django_db_password }}" password: "{{ vault.printer.django_db_password }}"
@ -27,9 +27,9 @@ glob_printer:
note_id: 2088 note_id: 2088
note_alias: 'Crans' note_alias: 'Crans'
printer_name: 'Lexmark_X950_Series' printer_name: 'Lexmark_X950_Series'
domain: "{{ query('ldap', 'ip', 'printer', 'lp') | ipv4 | first }}" domain: "{{ query('ldap', 'ip', 'printer', 'lp') | ansible.utils.ipv4 | first }}"
scan_server: scan_server:
address: "{{ query('ldap', 'ip', ansible_hostname, 'lp') | ipv4 | first }}" address: "{{ query('ldap', 'ip', ansible_hostname, 'lp') | ansible.utils.ipv4 | first }}"
port: 9751 port: 9751
debug: false debug: false
owner: www-data owner: www-data
@ -38,7 +38,7 @@ glob_printer:
settings_local_owner: www-data settings_local_owner: www-data
settings_local_group: _nounou settings_local_group: _nounou
ldap: ldap:
uri: "ldaps://{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}/" uri: "ldaps://{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}/"
dn_template: uid=%(user)s,ou=passwd,dc=crans,dc=org dn_template: uid=%(user)s,ou=passwd,dc=crans,dc=org
group_search: ou=group,dc=crans,dc=org group_search: ou=group,dc=crans,dc=org
read_group: cn=_user,ou=group,dc=crans,dc=org read_group: cn=_user,ou=group,dc=crans,dc=org

View File

@ -1,8 +1,8 @@
--- ---
glob_re2o_front: glob_re2o_front:
server_names: server_names:
- "{{ query('ldap', 'ip', 're2o', 'adm') | ipv4 | first }}" - "{{ query('ldap', 'ip', 're2o', 'adm') | ansible.utils.ipv4 | first }}"
- "[{{ query('ldap', 'ip', 're2o', 'adm') | ipv6 | first }}]" - "[{{ query('ldap', 'ip', 're2o', 'adm') | ansible.utils.ipv6 | first }}]"
- re2o.adm.crans.org - re2o.adm.crans.org
- intranet.adm.crans.org - intranet.adm.crans.org
- re2o.crans.org - re2o.crans.org

View File

@ -1,7 +1,7 @@
--- ---
glob_re2o_ldap: glob_re2o_ldap:
suffix: dc=crans,dc=org suffix: dc=crans,dc=org
url: "ldaps://{{ query('ldap', 'ip', 'yson-partou', 'adm') | ipv4 | first }}:636" url: "ldaps://{{ query('ldap', 'ip', 'yson-partou', 'adm') | ansible.utils.ipv4 | first }}:636"
root_password_hash: "{{ vault.slapd.re2o.admin.bindpass_hash }}" root_password_hash: "{{ vault.slapd.re2o.admin.bindpass_hash }}"
certificate: "{{ vault.slapd.re2o.certificate }}" certificate: "{{ vault.slapd.re2o.certificate }}"
private_key: "{{ vault.slapd.re2o.private_key }}" private_key: "{{ vault.slapd.re2o.private_key }}"

View File

@ -35,7 +35,7 @@ loc_nginx:
service_name: "roundcube" service_name: "roundcube"
ssl: [] ssl: []
servers: servers:
- server_name: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipwrap + [ansible_hostname, ansible_hostname + '.adm.crans.org'] }}" - server_name: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ansible.utils.ipwrap + [ansible_hostname, ansible_hostname + '.adm.crans.org'] }}"
default: true default: true
root: "/var/lib/roundcube" root: "/var/lib/roundcube"
locations: locations:

View File

@ -1,6 +1,6 @@
--- ---
glob_slapd: glob_slapd:
master_ip: "{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}" master_ip: "{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}"
regex: "^(role:(dhcp|dns|dns-primary|dns-secondary|ftp|gitlab|miroir|ntp|pve|radius|backup)|ecdsa-sha2-nistp256:.*|ssh-(ed25519|dss|rsa):.*|description:.*|location:.*)$" regex: "^(role:(dhcp|dns|dns-primary|dns-secondary|ftp|gitlab|miroir|ntp|pve|radius|backup)|ecdsa-sha2-nistp256:.*|ssh-(ed25519|dss|rsa):.*|description:.*|location:.*)$"
replication_credentials: "{{ vault.slapd.tealc.replication_credentials }}" replication_credentials: "{{ vault.slapd.tealc.replication_credentials }}"
private_key: "{{ vault.slapd.tealc.private_key }}" private_key: "{{ vault.slapd.tealc.private_key }}"

View File

@ -4,17 +4,17 @@ glob_sssd:
domain: tealc.adm.crans.org domain: tealc.adm.crans.org
enumerate: "true" enumerate: "true"
servers: servers:
- "ldaps://{{ query('ldap','ip','tealc','adm') | ipv4 | first }}/" - "ldaps://{{ query('ldap','ip','tealc','adm') | ansible.utils.ipv4 | first }}/"
- "ldaps://{{ query('ldap','ip','sam','adm') | ipv4 | first }}/" - "ldaps://{{ query('ldap','ip','sam','adm') | ansible.utils.ipv4 | first }}/"
- "ldaps://{{ query('ldap','ip','daniel','adm') | ipv4 | first }}/" - "ldaps://{{ query('ldap','ip','daniel','adm') | ansible.utils.ipv4 | first }}/"
- "ldaps://{{ query('ldap','ip','jack','adm') | ipv4 | first }}/" - "ldaps://{{ query('ldap','ip','jack','adm') | ansible.utils.ipv4 | first }}/"
base: "dc=crans,dc=org" base: "dc=crans,dc=org"
secondary: secondary:
domain: re2o-ldap.adm.crans.org domain: re2o-ldap.adm.crans.org
enumerate: "false" enumerate: "false"
servers: servers:
- "ldaps://{{ query('ldap','ip','re2o-ldap','adm') | ipv4 | first }}/" - "ldaps://{{ query('ldap','ip','re2o-ldap','adm') | ansible.utils.ipv4 | first }}/"
- "ldaps://{{ query('ldap','ip','terenez','adm') | ipv4 | first }}/" - "ldaps://{{ query('ldap','ip','terenez','adm') | ansible.utils.ipv4 | first }}/"
base: "dc=crans,dc=org" base: "dc=crans,dc=org"
bind: bind:
dn: "{{ vault.sssd.secondary_ldap.binddn }}" dn: "{{ vault.sssd.secondary_ldap.binddn }}"

View File

@ -1,7 +1,7 @@
--- ---
loc_home_nounou: loc_home_nounou:
mounts: mounts:
- ip: "{{ query('ldap', 'ip', 'ft', 'adm') | ipv4 | first }}" - ip: "{{ query('ldap', 'ip', 'ft', 'adm') | ansible.utils.ipv4 | first }}"
mountpoint: /home_nounou mountpoint: /home_nounou
target: /home_nounou target: /home_nounou
name: home_nounou name: home_nounou

View File

@ -1,4 +1,4 @@
--- ---
loc_ldap: loc_ldap:
servers: servers:
- "{{ query('ldap', 'ip', 'ft', 'adm') | ipv4 | first }}" - "{{ query('ldap', 'ip', 'ft', 'adm') | ansible.utils.ipv4 | first }}"

View File

@ -18,7 +18,7 @@ glob_service_proxmox_user:
config: config:
ldap: ldap:
admin: admin:
uri: "ldaps://{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}/" uri: "ldaps://{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}/"
userBase: "ou=passwd,dc=crans,dc=org" userBase: "ou=passwd,dc=crans,dc=org"
realm: "pam" realm: "pam"
dependencies: dependencies:

View File

@ -12,11 +12,11 @@ glob_service_proxmox_user:
config: config:
ldap: ldap:
admin: admin:
uri: "ldaps://{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}/" uri: "ldaps://{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}/"
userBase: "ou=passwd,dc=crans,dc=org" userBase: "ou=passwd,dc=crans,dc=org"
realm: "pam" realm: "pam"
user: user:
uri: "ldaps://{{ query('ldap', 'ip', 'flirt', 'adm') | ipv4 | first }}/" uri: "ldaps://{{ query('ldap', 'ip', 'flirt', 'adm') | ansible.utils.ipv4 | first }}/"
userBase: "ou=users,dc=adh,dc=crans,dc=org" userBase: "ou=users,dc=adh,dc=crans,dc=org"
realm: "pve" realm: "pve"
binddn: "{{ vault.ldap_adh_reader.binddn }}" binddn: "{{ vault.ldap_adh_reader.binddn }}"

View File

@ -6,7 +6,7 @@ loc_nginx:
service_name: wiki service_name: wiki
ssl: [] ssl: []
servers: servers:
- server_name: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ipwrap + [ansible_hostname, ansible_hostname + '.adm.crans.org'] }}" - server_name: "{{ query('ldap', 'ip', ansible_hostname, 'adm') | ansible.utils.ipwrap + [ansible_hostname, ansible_hostname + '.adm.crans.org'] }}"
default: true default: true
access_log: "/var/log/nginx/wiki.log combined" access_log: "/var/log/nginx/wiki.log combined"
error_log: "/var/log/nginx/wiki.error.log" error_log: "/var/log/nginx/wiki.error.log"

View File

@ -4,14 +4,14 @@ interfaces:
loc_home_nounou: loc_home_nounou:
mounts: mounts:
- ip: "{{ query('ldap', 'ip', 'ft', 'adm') | ipv4 | first }}" - ip: "{{ query('ldap', 'ip', 'ft', 'adm') | ansible.utils.ipv4 | first }}"
mountpoint: /home_nounou mountpoint: /home_nounou
target: /home_nounou target: /home_nounou
name: home_nounou name: home_nounou
owner: root owner: root
group: _user group: _user
mode: '0750' mode: '0750'
- ip: "{{ query('ldap', 'ip', 'ft', 'adm') | ipv4 | first }}" - ip: "{{ query('ldap', 'ip', 'ft', 'adm') | ansible.utils.ipv4 | first }}"
mountpoint: /rpool/backup mountpoint: /rpool/backup
target: /backup target: /backup
name: backup name: backup

View File

@ -4,14 +4,14 @@ interfaces:
loc_home_nounou: loc_home_nounou:
mounts: mounts:
- ip: "{{ query('ldap', 'ip', 'thot', 'adm') | ipv4 | first }}" - ip: "{{ query('ldap', 'ip', 'thot', 'adm') | ansible.utils.ipv4 | first }}"
mountpoint: /home_nounou mountpoint: /home_nounou
target: /home_nounou target: /home_nounou
name: home_nounou name: home_nounou
owner: root owner: root
group: _user group: _user
mode: '0750' mode: '0750'
- ip: "{{ query('ldap', 'ip', 'thot', 'adm') | ipv4 | first }}" - ip: "{{ query('ldap', 'ip', 'thot', 'adm') | ansible.utils.ipv4 | first }}"
mountpoint: /rpool/backup mountpoint: /rpool/backup
target: /backup target: /backup
name: backup name: backup

View File

@ -12,9 +12,9 @@ loc_wireguard:
peers: peers:
- public_key: "{{ vault.wireguard.sputnik.pubkey }}" - public_key: "{{ vault.wireguard.sputnik.pubkey }}"
allowed_ips: allowed_ips:
- "{{ query('ldap', 'ip', 'sputnik', 'adm') | ipv4 | first }}/32" - "{{ query('ldap', 'ip', 'sputnik', 'adm') | ansible.utils.ipv4 | first }}/32"
- "{{ query('ldap', 'ip', 'sputnik', 'adm') | ipv6 | first }}/128" - "{{ query('ldap', 'ip', 'sputnik', 'adm') | ansible.utils.ipv6 | first }}/128"
endpoint: "{{ query('ldap', 'ip', 'sputnik', 'srv') | ipv4 | first }}:51820" endpoint: "{{ query('ldap', 'ip', 'sputnik', 'srv') | ansible.utils.ipv4 | first }}:51820"
post_up: post_up:
- "sysctl -w net.ipv4.conf.%i.proxy_arp=1" - "sysctl -w net.ipv4.conf.%i.proxy_arp=1"
- "sysctl -w net.ipv6.conf.%i.proxy_ndp=1" - "sysctl -w net.ipv6.conf.%i.proxy_ndp=1"
@ -63,7 +63,7 @@ loc_wireguard:
loc_service_proxy: loc_service_proxy:
config: config:
ldap: ldap:
server: "ldaps://{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}/" server: "ldaps://{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}/"
protocol: "proxy" protocol: "proxy"
filter: "adm.crans.org" filter: "adm.crans.org"
proxy: proxy:

View File

@ -1,13 +1,13 @@
--- ---
loc_slapd: loc_slapd:
ip: "{{ query('ldap', 'ip', 'daniel', 'adm') | ipv4 | first }}" ip: "{{ query('ldap', 'ip', 'daniel', 'adm') | ansible.utils.ipv4 | first }}"
replica: true replica: true
replica_rid: 2 replica_rid: 2
loc_postgres: loc_postgres:
version: 13 version: 13
replica: true replica: true
addresses: "['daniel.adm.crans.org'] + {{ query('ldap', 'ip', 'daniel', 'adm') | ipaddr('address') }}" addresses: "['daniel.adm.crans.org'] + {{ query('ldap', 'ip', 'daniel', 'adm') | ansible.utils.ipaddr('address') }}"
loc_service_proxmox_user: loc_service_proxmox_user:
cron: null cron: null

View File

@ -6,6 +6,6 @@ loc_borg:
- /var - /var
loc_slapd: loc_slapd:
ip: "{{ query('ldap', 'ip', 'ft', 'adm') | ipv4 | first }}" ip: "{{ query('ldap', 'ip', 'ft', 'adm') | ansible.utils.ipv4 | first }}"
replica: true replica: true
replica_rid: 6 replica_rid: 6

View File

@ -5,4 +5,4 @@ interfaces:
lp: ens20 lp: ens20
loc_snmp_exporter: loc_snmp_exporter:
listen_address: "{{ query('ldap', 'ip', 'helloworld', 'adm') | ipv4 | first }}:9116" listen_address: "{{ query('ldap', 'ip', 'helloworld', 'adm') | ansible.utils.ipv4 | first }}:9116"

View File

@ -1,13 +1,13 @@
--- ---
loc_slapd: loc_slapd:
ip: "{{ query('ldap', 'ip', 'jack', 'adm') | ipv4 | first }}" ip: "{{ query('ldap', 'ip', 'jack', 'adm') | ansible.utils.ipv4 | first }}"
replica: true replica: true
replica_rid: 3 replica_rid: 3
loc_postgres: loc_postgres:
version: 13 version: 13
replica: true replica: true
addresses: "['jack.adm.crans.org'] + {{ query('ldap', 'ip', 'jack', 'adm') | ipaddr('address') }}" addresses: "['jack.adm.crans.org'] + {{ query('ldap', 'ip', 'jack', 'adm') | ansible.utils.ipaddr('address') }}"
loc_service_proxmox_user: loc_service_proxmox_user:
cron: null cron: null

View File

@ -4,4 +4,4 @@ interfaces:
srv_nat: eth1 srv_nat: eth1
loc_re2o_ldap_replica: loc_re2o_ldap_replica:
url: "ldaps://{{ query('ldap', 'ip', 'yson-partou', 'adm') | ipv4 | first }}:636" url: "ldaps://{{ query('ldap', 'ip', 'yson-partou', 'adm') | ansible.utils.ipv4 | first }}:636"

View File

@ -14,7 +14,7 @@ loc_wireguard:
allowed_ips: allowed_ips:
- "{{ query('ldap', 'network', 'adm') }}" - "{{ query('ldap', 'network', 'adm') }}"
- "fd00:0:0:{{ query('ldap', 'vlanid', 'adm') }}::/64" - "fd00:0:0:{{ query('ldap', 'vlanid', 'adm') }}::/64"
endpoint: "{{ query('ldap', 'ip', 'boeing', 'srv') | ipv4 | first }}:51821" endpoint: "{{ query('ldap', 'ip', 'boeing', 'srv') | ansible.utils.ipv4 | first }}:51821"
persistent_keepalive: 25 persistent_keepalive: 25
post_up: post_up:
- "sysctl -w net.ipv4.conf.%i.proxy_arp=1" - "sysctl -w net.ipv4.conf.%i.proxy_arp=1"
@ -29,7 +29,7 @@ loc_wireguard:
loc_service_proxy: loc_service_proxy:
config: config:
ldap: ldap:
server: "ldaps://{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}/" server: "ldaps://{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}/"
protocol: "proxy" protocol: "proxy"
filter: "adm.crans.org" filter: "adm.crans.org"
proxy: proxy:

View File

@ -14,7 +14,7 @@ loc_wireguard:
allowed_ips: allowed_ips:
- "{{ query('ldap', 'network', 'adm') }}" - "{{ query('ldap', 'network', 'adm') }}"
- "fd00:0:0:{{ query('ldap', 'vlanid', 'adm') }}::/64" - "fd00:0:0:{{ query('ldap', 'vlanid', 'adm') }}::/64"
endpoint: "{{ query('ldap', 'ip', 'boeing', 'srv') | ipv4 | first }}:51822" endpoint: "{{ query('ldap', 'ip', 'boeing', 'srv') | ansible.utils.ipv4 | first }}:51822"
persistent_keepalive: 25 persistent_keepalive: 25
post_up: post_up:
- "sysctl -w net.ipv4.conf.%i.proxy_arp=1" - "sysctl -w net.ipv4.conf.%i.proxy_arp=1"
@ -30,7 +30,7 @@ loc_wireguard:
loc_service_proxy: loc_service_proxy:
config: config:
ldap: ldap:
server: "ldaps://{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}/" server: "ldaps://{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}/"
protocol: "proxy" protocol: "proxy"
filter: "adm.crans.org" filter: "adm.crans.org"
proxy: proxy:

View File

@ -6,11 +6,11 @@ loc_borg:
- /var - /var
loc_slapd: loc_slapd:
ip: "{{ query('ldap', 'ip', 'sam', 'adm') | ipv4 | first }}" ip: "{{ query('ldap', 'ip', 'sam', 'adm') | ansible.utils.ipv4 | first }}"
replica: true replica: true
replica_rid: 1 replica_rid: 1
loc_postgres: loc_postgres:
version: 13 version: 13
replica: true replica: true
addresses: "['sam.adm.crans.org'] + {{ query('ldap', 'ip', 'sam', 'adm') | ipaddr('address') }}" addresses: "['sam.adm.crans.org'] + {{ query('ldap', 'ip', 'sam', 'adm') | ansible.utils.ipaddr('address') }}"

View File

@ -12,8 +12,8 @@ loc_wireguard:
tunnels: tunnels:
- name: "sputnik" - name: "sputnik"
addresses: addresses:
- "{{ query('ldap', 'ip', 'sputnik', 'adm') | ipv4 | first }}/24" - "{{ query('ldap', 'ip', 'sputnik', 'adm') | ansible.utils.ipv4 | first }}/24"
- "{{ query('ldap', 'ip', 'sputnik', 'adm') | ipv6 | first }}/64" - "{{ query('ldap', 'ip', 'sputnik', 'adm') | ansible.utils.ipv6 | first }}/64"
listen_port: 51820 listen_port: 51820
private_key: "{{ vault.wireguard.sputnik.privkey }}" private_key: "{{ vault.wireguard.sputnik.privkey }}"
peers: peers:
@ -21,12 +21,12 @@ loc_wireguard:
allowed_ips: allowed_ips:
- "{{ query('ldap', 'network', 'adm') }}" - "{{ query('ldap', 'network', 'adm') }}"
- "fd00:0:0:{{ query('ldap', 'vlanid', 'adm') }}::/64" - "fd00:0:0:{{ query('ldap', 'vlanid', 'adm') }}::/64"
endpoint: "{{ query('ldap', 'ip', 'boeing', 'srv') | ipv4 | first }}:51820" endpoint: "{{ query('ldap', 'ip', 'boeing', 'srv') | ansible.utils.ipv4 | first }}:51820"
post_up: post_up:
- "/sbin/ip link set sputnik alias adm" - "/sbin/ip link set sputnik alias adm"
loc_slapd: loc_slapd:
ip: "{{ query('ldap', 'ip', 'sputnik', 'adm') | ipv4 | first }}" ip: "{{ query('ldap', 'ip', 'sputnik', 'adm') | ansible.utils.ipv4 | first }}"
replica: true replica: true
replica_rid: 4 replica_rid: 4

View File

@ -27,13 +27,13 @@ loc_postgres:
- {db: mailman3web, user: mailman3web} - {db: mailman3web, user: mailman3web}
- {db: all, user: all, subnets: ['127.0.0.1/32', '::1/128'], local: true} - {db: all, user: all, subnets: ['127.0.0.1/32', '::1/128'], local: true}
- {db: replication, user: replication, local: true} - {db: replication, user: replication, local: true}
addresses: "['tealc.adm.crans.org'] + {{ query('ldap', 'ip', 'tealc', 'adm') | ipaddr('address') }}" addresses: "['tealc.adm.crans.org'] + {{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipaddr('address') }}"
backup: backup:
dir: /var/local/db-backup dir: /var/local/db-backup
frequency: "{{ 60 | random(seed=inventory_hostname) }} {{ ((24 | random(seed=inventory_hostname))+12)%24 }} * * *" frequency: "{{ 60 | random(seed=inventory_hostname) }} {{ ((24 | random(seed=inventory_hostname))+12)%24 }} * * *"
loc_slapd: loc_slapd:
ip: "{{ query('ldap', 'ip', 'tealc', 'adm') | ipv4 | first }}" ip: "{{ query('ldap', 'ip', 'tealc', 'adm') | ansible.utils.ipv4 | first }}"
replica: false replica: false
loc_borg: loc_borg:

View File

@ -6,6 +6,6 @@ loc_borg:
- /var - /var
loc_slapd: loc_slapd:
ip: "{{ query('ldap', 'ip', 'thot', 'adm') | ipv4 | first }}" ip: "{{ query('ldap', 'ip', 'thot', 'adm') | ansible.utils.ipv4 | first }}"
replica: true replica: true
replica_rid: 5 replica_rid: 5

View File

@ -11,8 +11,8 @@ loc_wireguard:
peers: peers:
- public_key: "{{ vault.wireguard.charybde.pubkey }}" - public_key: "{{ vault.wireguard.charybde.pubkey }}"
allowed_ips: allowed_ips:
- "{{ query('ldap', 'ip', 'charybde', 'adm') | ipv4 | first }}/32" - "{{ query('ldap', 'ip', 'charybde', 'adm') | ansible.utils.ipv4 | first }}/32"
- "{{ query('ldap', 'ip', 'charybde', 'adm') | ipv6 | first }}/128" - "{{ query('ldap', 'ip', 'charybde', 'adm') | ansible.utils.ipv6 | first }}/128"
endpoint: "{{ query('ldap', 'ip', 'freebox', 'srv') | ipv4 | first }}:51820" endpoint: "{{ query('ldap', 'ip', 'freebox', 'srv') | ansible.utils.ipv4 | first }}:51820"
post_up: "sysctl -w net.ipv4.conf.ens18.proxy_arp=1; sysctl -w net.ipv4.conf.gulp.proxy_arp=1; sysctl -w net.ipv6.conf.ens18.proxy_ndp=1; sysctl -w net.ipv6.conf.gulp.proxy_ndp=1; ip neigh add proxy {{ query('ldap', 'ip', 'charybde', 'adm') | ipv6 | first }} dev ens18" post_up: "sysctl -w net.ipv4.conf.ens18.proxy_arp=1; sysctl -w net.ipv4.conf.gulp.proxy_arp=1; sysctl -w net.ipv6.conf.ens18.proxy_ndp=1; sysctl -w net.ipv6.conf.gulp.proxy_ndp=1; ip neigh add proxy {{ query('ldap', 'ip', 'charybde', 'adm') | ansible.utils.ipv6 | first }} dev ens18"
post_down: "sysctl -w net.ipv4.conf.ens18.proxy_arp=0; sysctl -w net.ipv4.conf.gulp.proxy_arp=0; sysctl -w net.ipv6.conf.ens18.proxy_ndp=0; sysctl -w net.ipv6.conf.gulp.proxy_ndp=0; ip neigh delete proxy {{ query('ldap', 'ip', 'charybde', 'adm') | ipv6 | first }} dev ens18" post_down: "sysctl -w net.ipv4.conf.ens18.proxy_arp=0; sysctl -w net.ipv4.conf.gulp.proxy_arp=0; sysctl -w net.ipv6.conf.ens18.proxy_ndp=0; sysctl -w net.ipv6.conf.gulp.proxy_ndp=0; ip neigh delete proxy {{ query('ldap', 'ip', 'charybde', 'adm') | ansible.utils.ipv6 | first }} dev ens18"

View File

@ -379,7 +379,7 @@ class LookupModule(LookupBase):
prefixv6: "{{ lookup('re2oapi', 'previxv6', 'adherents', 'adm') }}" prefixv6: "{{ lookup('re2oapi', 'previxv6', 'adherents', 'adm') }}"
tasks: tasks:
- debug: - debug:
msg: "{{ prefixv6 | ipwrap }}" msg: "{{ prefixv6 | ansible.utils.ipwrap }}"
The following will get the ip addresses of all servers with role The following will get the ip addresses of all servers with role
dns-authorithary-master on vlan 2. dns-authorithary-master on vlan 2.

View File

@ -11,14 +11,14 @@ $TTL 0
) )
@ IN NS passerelle.infra.crans.org @ IN NS passerelle.infra.crans.org
passerelle.infra.crans.org IN A {{ (query('ldap', 'ip', 'passerelle', 'infra') | ipv4)[0] }} passerelle.infra.crans.org IN A {{ (query('ldap', 'ip', 'passerelle', 'infra') | ansible.utils.ipv4)[0] }}
* IN CNAME crans.org * IN CNAME crans.org
*.org IN CNAME crans.org *.org IN CNAME crans.org
*.fr IN CNAME crans.org *.fr IN CNAME crans.org
*.com IN CNAME crans.org *.com IN CNAME crans.org
intranet.crans.org IN A 172.16.32.156 ; (query('ldap', 'ip', 'intranet', 'infra') | ipv4)[0] intranet.crans.org IN A 172.16.32.156 ; (query('ldap', 'ip', 'intranet', 'infra') | ansible.utils.ipv4)[0]
intranet.infra.crans.org IN A 172.16.32.156 intranet.infra.crans.org IN A 172.16.32.156
unifi.infra.crans.org IN A {{ (query('ldap', 'ip', 'unifi', 'infra') | ipv4)[0] }} unifi.infra.crans.org IN A {{ (query('ldap', 'ip', 'unifi', 'infra') | ansible.utils.ipv4)[0] }}

View File

@ -35,7 +35,7 @@ include "./dhcp-failover.conf";
{% for subnet in dhcp.subnets %} {% for subnet in dhcp.subnets %}
subnet {{ subnet.network | ipaddr('network') }} netmask {{ subnet.network | ipaddr('netmask') }} { subnet {{ subnet.network | ansible.utils.netaddr('network') }} netmask {{ subnet.network | ansible.utils.netaddr('netmask') }} {
interface "{{ interfaces[subnet.vlan] }}"; interface "{{ interfaces[subnet.vlan] }}";
{% if subnet.default_lease_time is defined %} {% if subnet.default_lease_time is defined %}
default-lease-time {{ subnet.default_lease_time }}; default-lease-time {{ subnet.default_lease_time }};
@ -43,8 +43,8 @@ subnet {{ subnet.network | ipaddr('network') }} netmask {{ subnet.network | ipad
{% if subnet.max_lease_time is defined %} {% if subnet.max_lease_time is defined %}
max-lease-time {{ subnet.max_lease_time }}; max-lease-time {{ subnet.max_lease_time }};
{% endif %} {% endif %}
option subnet-mask {{ subnet.network | ipaddr('netmask') }}; option subnet-mask {{ subnet.network | ansible.utils.netaddr('netmask') }};
option broadcast-address {{ subnet.network | ipaddr('broadcast') }}; option broadcast-address {{ subnet.network | ansible.utils.netaddr('broadcast') }};
{% if subnet.routers is defined %} {% if subnet.routers is defined %}
option routers {{ subnet.routers }}; option routers {{ subnet.routers }};
{% endif %} {% endif %}

View File

@ -24,7 +24,7 @@ vrrp_instance {{ instance.name }} {
virtual_ipaddress { virtual_ipaddress {
{% for zone in keepalived.pool[instance.name].zones %} {% for zone in keepalived.pool[instance.name].zones %}
{% if zone.brd is undefined or zone.brd %} {% if zone.brd is undefined or zone.brd %}
{{ zone.ipv4 }} brd {{ zone.ipv4 | ipaddr('broadcast') }} dev {{ interfaces[zone.vlan] }} scope global {{ zone.ipv4 }} brd {{ zone.ipv4 | ansible.utils.ipaddr('broadcast') }} dev {{ interfaces[zone.vlan] }} scope global
{% else %} {% else %}
{{ zone.ipv4 }} dev {{ interfaces[zone.vlan] }} scope global {{ zone.ipv4 }} dev {{ interfaces[zone.vlan] }} scope global
{% endif %} {% endif %}

View File

@ -6,13 +6,13 @@ auto {{ interfaces[item.name] }}
iface {{ interfaces[item.name] }} inet dhcp iface {{ interfaces[item.name] }} inet dhcp
iface {{ interfaces[item.name] }} inet6 auto iface {{ interfaces[item.name] }} inet6 auto
{% else %} {% else %}
{% set subnet_network = (query('ldap', 'network', vlan_name) | ipaddr('network')) %} {% set subnet_network = (query('ldap', 'network', vlan_name) | ansible.utils.ipaddr('network')) %}
{% set subnet_netmask = (query('ldap', 'network', vlan_name) | ipaddr('netmask')) %} {% set subnet_netmask = (query('ldap', 'network', vlan_name) | ansible.utils.ipaddr('netmask')) %}
{% set ips = query('ldap', 'ip', ansible_hostname, vlan_name) %} {% set ips = query('ldap', 'ip', ansible_hostname, vlan_name) %}
{% if (ips | ipv4 | length) > 0 %} {% if (ips | ansible.utils.ipv4 | length) > 0 %}
auto {{ interfaces[item.name] }} auto {{ interfaces[item.name] }}
iface {{ interfaces[item.name] }} inet static iface {{ interfaces[item.name] }} inet static
{% for ip in (ips | ipv4) %} {% for ip in (ips | ansible.utils.ipv4) %}
address {{ ip }} address {{ ip }}
{% endfor %} {% endfor %}
network {{ subnet_network }} network {{ subnet_network }}
@ -46,9 +46,9 @@ iface {{ interfaces[item.name] }} inet static
{% endif %} {% endif %}
{% endif %} {% endif %}
{% if (ips | ipv6 | length) > 0 %} {% if (ips | ansible.utils.ipv6 | length) > 0 %}
iface {{ interfaces[item.name] }} inet6 static iface {{ interfaces[item.name] }} inet6 static
{% for ip in (ips | ipv6) %} {% for ip in (ips | ansible.utils.ipv6) %}
address {{ ip }}/64 address {{ ip }}/64
{% endfor %} {% endfor %}
{% if item.gateway_v6 is defined %} {% if item.gateway_v6 is defined %}

View File

@ -45,7 +45,7 @@ restrict source notrap nomodify noquery
# Server on adm can sync # Server on adm can sync
{% for cidr in ntp_server.open %} {% for cidr in ntp_server.open %}
restrict {{ cidr | ipaddr('network') }} mask {{ cidr | ipaddr('netmask') }} notrap nomodify restrict {{ cidr | ansible.utils.ipaddr('network') }} mask {{ cidr | ansible.utils.ipaddr('netmask') }} notrap nomodify
{% endfor %} {% endfor %}
# Clients from this (example!) subnet have unlimited access, but only if # Clients from this (example!) subnet have unlimited access, but only if

View File

@ -3,7 +3,7 @@
{% if postfix.primary or postfix.secondary %} {% if postfix.primary or postfix.secondary %}
# Les mailing-listes sont delivrees sur un serveur à part # Les mailing-listes sont delivrees sur un serveur à part
lists.crans.org smtp:[{{ query('ldap', 'ip', 'mailman', 'adm') | ipv4 | first }}] lists.crans.org smtp:[{{ query('ldap', 'ip', 'mailman', 'adm') | ansible.utils.ipv4 | first }}]
# C'est le serveur des adherents qui fait les livraisons des # C'est le serveur des adherents qui fait les livraisons des
# adresses clubs et adherents # adresses clubs et adherents
crans.org smtp:[users.adm.crans.org] crans.org smtp:[users.adm.crans.org]

View File

@ -7,7 +7,7 @@ server {
listen 80; listen 80;
listen [::]:80; listen [::]:80;
server_name {{ (query('ldap', 'ip', 're2o', 'adm') | ipv4)[0] }} re2o.adm.crans.org intranet.crans.org intranet.infra.crans.org; # Modify this value according to your infrastructure. server_name {{ (query('ldap', 'ip', 're2o', 'adm') | ansible.utils.ipv4)[0] }} re2o.adm.crans.org intranet.crans.org intranet.infra.crans.org; # Modify this value according to your infrastructure.
charset utf-8; charset utf-8;
server_tokens off; server_tokens off;