Merge pull request #17 from guidograzioli/replace_serial_with_runonce

Replace use of serial with run_once
main
Guido Grazioli 2022-03-08 12:32:54 +01:00 committed by GitHub
commit f5cd6d8061
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 30 additions and 24 deletions

View File

@ -7,10 +7,10 @@
- prereqs - prereqs
- name: Include install tasks - name: Include install tasks
ansible.builtin.include_tasks: tasks/install.yml ansible.builtin.include_tasks: install.yml
- name: Include systemd tasks - name: Include systemd tasks
ansible.builtin.include_tasks: tasks/systemd.yml ansible.builtin.include_tasks: systemd.yml
- name: Link default logs directory - name: Link default logs directory
ansible.builtin.file: ansible.builtin.file:

View File

@ -0,0 +1,15 @@
---
- name: start keycloak
ansible.builtin.systemd:
name: keycloak
enabled: yes
state: started
become: yes
- name: "Wait until Keycloak becomes active {{ keycloak.health_url }}"
ansible.builtin.uri:
url: "{{ keycloak.health_url }}"
register: keycloak_status
until: keycloak_status.status == 200
retries: 25
delay: 10

View File

@ -1,4 +1,4 @@
- name: configure keycloak service script wrapper - name: Configure keycloak service script wrapper
become: yes become: yes
ansible.builtin.template: ansible.builtin.template:
src: keycloak-service.sh.j2 src: keycloak-service.sh.j2
@ -9,7 +9,7 @@
notify: notify:
- restart keycloak - restart keycloak
- name: configure sysconfig file for keycloak service - name: Configure sysconfig file for keycloak service
become: yes become: yes
ansible.builtin.template: ansible.builtin.template:
src: keycloak-sysconfig.j2 src: keycloak-sysconfig.j2
@ -20,7 +20,7 @@
notify: notify:
- restart keycloak - restart keycloak
- name: configure systemd unit file for keycloak service - name: Configure systemd unit file for keycloak service
ansible.builtin.template: ansible.builtin.template:
src: keycloak.service.j2 src: keycloak.service.j2
dest: /etc/systemd/system/keycloak.service dest: /etc/systemd/system/keycloak.service
@ -32,18 +32,19 @@
notify: notify:
- restart keycloak - restart keycloak
- name: reload systemd - name: Reload systemd
become: yes become: yes
ansible.builtin.systemd: ansible.builtin.systemd:
daemon_reload: yes daemon_reload: yes
when: systemdunit.changed when: systemdunit.changed
- name: start keycloak - name: Start and wait for keycloak service (first node db)
ansible.builtin.systemd: ansible.builtin.include_tasks: start_keycloak.yml
name: keycloak run_once: yes
enabled: yes when: keycloak_db_enabled
state: started
become: yes - name: Start and wait for keycloak service (remaining nodes)
ansible.builtin.include_tasks: start_keycloak.yml
- name: Check service status - name: Check service status
ansible.builtin.command: "systemctl status keycloak" ansible.builtin.command: "systemctl status keycloak"
@ -58,11 +59,3 @@
- name: Flush handlers - name: Flush handlers
ansible.builtin.meta: flush_handlers ansible.builtin.meta: flush_handlers
- name: "Wait until Keycloak becomes active {{ keycloak.health_url }}"
ansible.builtin.uri:
url: "{{ keycloak.health_url }}"
register: keycloak_status
until: keycloak_status.status == 200
retries: 25
delay: 10

View File

@ -633,7 +633,7 @@
<subsystem xmlns="urn:wildfly:metrics:1.0" security-enabled="false" exposed-subsystems="*" prefix="${wildfly.metrics.prefix:jboss}"/> <subsystem xmlns="urn:wildfly:metrics:1.0" security-enabled="false" exposed-subsystems="*" prefix="${wildfly.metrics.prefix:jboss}"/>
{% if keycloak_modcluster.enabled %} {% if keycloak_modcluster.enabled %}
<subsystem xmlns="urn:jboss:domain:modcluster:5.0"> <subsystem xmlns="urn:jboss:domain:modcluster:5.0">
<proxy name="default" advertise-socket="modcluster" listener="ajp" proxies="proxy1"> <proxy name="default" advertise="false" listener="ajp" proxies="proxy1">
<dynamic-load-provider> <dynamic-load-provider>
<load-metric type="cpu"/> <load-metric type="cpu"/>
</dynamic-load-provider> </dynamic-load-provider>
@ -744,7 +744,6 @@
<socket-binding name="management-http" interface="management" port="{{ keycloak_management_http_port }}"/> <socket-binding name="management-http" interface="management" port="{{ keycloak_management_http_port }}"/>
<socket-binding name="management-https" interface="management" port="{{ keycloak_management_https_port }}"/> <socket-binding name="management-https" interface="management" port="{{ keycloak_management_https_port }}"/>
<socket-binding name="jgroups-tcp" interface="jgroups" port="{{ keycloak_jgroups_port }}"/> <socket-binding name="jgroups-tcp" interface="jgroups" port="{{ keycloak_jgroups_port }}"/>
<socket-binding name="modcluster" multicast-address="${jboss.modcluster.multicast.address:224.0.1.105}" multicast-port="23364"/>
<socket-binding name="txn-recovery-environment" port="4712"/> <socket-binding name="txn-recovery-environment" port="4712"/>
<socket-binding name="txn-status-manager" port="4713"/> <socket-binding name="txn-status-manager" port="4713"/>
<outbound-socket-binding name="mail-smtp"> <outbound-socket-binding name="mail-smtp">

View File

@ -546,7 +546,7 @@
<subsystem xmlns="urn:wildfly:metrics:1.0" security-enabled="false" exposed-subsystems="*" prefix="${wildfly.metrics.prefix:jboss}"/> <subsystem xmlns="urn:wildfly:metrics:1.0" security-enabled="false" exposed-subsystems="*" prefix="${wildfly.metrics.prefix:jboss}"/>
{% if keycloak_modcluster.enabled %} {% if keycloak_modcluster.enabled %}
<subsystem xmlns="urn:jboss:domain:modcluster:5.0"> <subsystem xmlns="urn:jboss:domain:modcluster:5.0">
<proxy name="default" advertise-socket="modcluster" listener="ajp" proxies="proxy1"> <proxy name="default" advertise="false" listener="ajp" proxies="proxy1">
<dynamic-load-provider> <dynamic-load-provider>
<load-metric type="cpu"/> <load-metric type="cpu"/>
</dynamic-load-provider> </dynamic-load-provider>
@ -644,7 +644,6 @@
<socket-binding name="https" port="{{ keycloak_https_port }}"/> <socket-binding name="https" port="{{ keycloak_https_port }}"/>
<socket-binding name="management-http" interface="management" port="{{ keycloak_management_http_port }}"/> <socket-binding name="management-http" interface="management" port="{{ keycloak_management_http_port }}"/>
<socket-binding name="management-https" interface="management" port="{{ keycloak_management_https_port }}"/> <socket-binding name="management-https" interface="management" port="{{ keycloak_management_https_port }}"/>
<socket-binding name="modcluster" multicast-address="${jboss.modcluster.multicast.address:224.0.1.105}" multicast-port="23364"/>
<socket-binding name="txn-recovery-environment" port="4712"/> <socket-binding name="txn-recovery-environment" port="4712"/>
<socket-binding name="txn-status-manager" port="4713"/> <socket-binding name="txn-status-manager" port="4713"/>
<outbound-socket-binding name="mail-smtp"> <outbound-socket-binding name="mail-smtp">