Test if deployments from old-stable still works
I was having some issues when trying to deploy from old stable (11, bullseye). 12, bookworm current stable works fine.
Need to test if this is a general thing or an odd case here. If general we should either fix it or update the readme/requirements.
fatal: [cod]: FAILED! => {"changed": false, "msg": "AnsibleError: template error while templating string: unable to locate collection ansible.utils. String: # Create a number of general-purpose chains to allow traffic from\n# specific sets of hosts.\n\n{% macro allow_host_ips(h, chain) %}\n{% for ip in hostvars[h]['ips'] | ansible.utils.ipv4 | sort %}\nadd_rule4 -A {{ chain }} -s {{ ip }} -j ACCEPT\n{% endfor %}\n{% for ip in hostvars[h]['ips'] | ansible.utils.ipv6 | sort %}\nadd_rule6 -A {{ chain }} -s {{ ip }} -j ACCEPT\n{% endfor %}\n{% endmacro %}\n\n{% macro create_chain_from_host_group(chain, group) %}\ncreate_chain {{ chain }}\n{% for h in groups.get(group, [])|sort %}\n{% if h != inventory_hostname %}\n{{ allow_host_ips(h, chain) }}\n{% endif %}\n{% endfor %}\n{% endmacro %}\n\n# Chain that allows traffic from all hosts in the inventory.\n{{ create_chain_from_host_group('allow-cluster', 'all') }}\n{% for port in float_enabled_services | map('extract', services) | selectattr('ports', 'defined') | map(attribute='ports') | flatten | sort %}\nallow_port tcp {{ port }} -j allow-cluster\n{% endfor %}\n\n# Chain to allow traffic from hosts running monitoring probers.\n{% if 'prometheus' in services %}\n{{ create_chain_from_host_group('allow-monitoring', services['prometheus'].group_name) }}\n{% for network_name in net_overlays | map(attribute='name') if hostvars[inventory_hostname].get('ip_' + network_name) %}\n{% for host in services['prometheus'].hosts | sort if hostvars[host].get('ip_' + network_name) %}\nadd_rule4 -A allow-monitoring -s {{ hostvars[host]['ip_' + network_name] }} -j ACCEPT\n{% endfor %}\n{% endfor %}\n\n# Allow traffic from monitoring probers to local services (on the\n# public IP).\nallow_port tcp 3909 -j allow-monitoring # cgroups-exporter\nallow_port tcp 3903 -j allow-monitoring # mtail\nallow_port tcp 9004 -j allow-monitoring # auth-server\nallow_port tcp 9100 -j allow-monitoring # node-exporter\nallow_port tcp 9106 -j allow-monitoring # rsyslog-exporter\nallow_port tcp 9323 -j allow-monitoring # docker\nallow_port tcp 5331 -j allow-monitoring # backup-agent (tabacco)\n{% for port in float_enabled_services | map('extract', services) | selectattr('monitoring_endpoints', 'defined') | map(attribute='monitoring_endpoints') | flatten | map(attribute='port') | sort %}\nallow_port tcp {{ port }} -j allow-monitoring\n{% endfor %}\n{% endif %}\n\n{% if ssh_port != 22 %}\nallow_port tcp {{ ssh_port }}\n{% endif %}\n"}