generate_secrets.yaml 3.9 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273
  1. ---
  2. - name: Retrieving the cert to use when generating secrets for the logging components
  3. slurp: src="{{generated_certs_dir}}/{{item.file}}"
  4. register: key_pairs
  5. with_items:
  6. - { name: "ca_file", file: "ca.crt" }
  7. - { name: "kibana_key", file: "system.logging.kibana.key"}
  8. - { name: "kibana_cert", file: "system.logging.kibana.crt"}
  9. - { name: "curator_key", file: "system.logging.curator.key"}
  10. - { name: "curator_cert", file: "system.logging.curator.crt"}
  11. - { name: "fluentd_key", file: "system.logging.fluentd.key"}
  12. - { name: "fluentd_cert", file: "system.logging.fluentd.crt"}
  13. - { name: "kibana_internal_key", file: "kibana-internal.key"}
  14. - { name: "kibana_internal_cert", file: "kibana-internal.crt"}
  15. - { name: "server_tls", file: "server-tls.json"}
  16. - name: Generating secrets for logging components
  17. template: src=secret.j2 dest={{mktemp.stdout}}/templates/{{secret_name}}-secret.yaml
  18. vars:
  19. secret_name: logging-{{component}}
  20. secret_key_file: "{{component}}_key"
  21. secret_cert_file: "{{component}}_cert"
  22. secrets:
  23. - {key: ca, value: "{{key_pairs | entry_from_named_pair('ca_file')| b64decode }}"}
  24. - {key: key, value: "{{key_pairs | entry_from_named_pair(secret_key_file)| b64decode }}"}
  25. - {key: cert, value: "{{key_pairs | entry_from_named_pair(secret_cert_file)| b64decode }}"}
  26. secret_keys: ["ca", "cert", "key"]
  27. with_items:
  28. - kibana
  29. - curator
  30. - fluentd
  31. loop_control:
  32. loop_var: component
  33. when: secret_name not in openshift_logging_facts.{{component}}.secrets or
  34. secret_keys | difference(openshift_logging_facts.{{component}}.secrets["{{secret_name}}"]["keys"]) | length != 0
  35. check_mode: no
  36. - name: Generating secrets for kibana proxy
  37. template: src=secret.j2 dest={{mktemp.stdout}}/templates/{{secret_name}}-secret.yaml
  38. vars:
  39. secret_name: logging-kibana-proxy
  40. secrets:
  41. - {key: oauth-secret, value: "{{oauth_secret.stdout}}"}
  42. - {key: session-secret, value: "{{session_secret.stdout}}"}
  43. - {key: server-key, value: "{{kibana_key_file}}"}
  44. - {key: server-cert, value: "{{kibana_cert_file}}"}
  45. - {key: server-tls, value: "{{server_tls_file}}"}
  46. secret_keys: ["server-tls.json", "server-key", "session-secret", "oauth-secret", "server-cert"]
  47. kibana_key_file: "{{key_pairs | entry_from_named_pair('kibana_internal_key')| b64decode }}"
  48. kibana_cert_file: "{{key_pairs | entry_from_named_pair('kibana_internal_cert')| b64decode }}"
  49. server_tls_file: "{{key_pairs | entry_from_named_pair('server_tls')| b64decode }}"
  50. when: secret_name not in openshift_logging_facts.kibana.secrets or
  51. secret_keys | difference(openshift_logging_facts.kibana.secrets["{{secret_name}}"]["keys"]) | length != 0
  52. check_mode: no
  53. - name: Generating secrets for elasticsearch
  54. command: >
  55. {{openshift.common.client_binary}} --config={{ mktemp.stdout }}/admin.kubeconfig secrets new {{secret_name}}
  56. key={{generated_certs_dir}}/logging-es.jks truststore={{generated_certs_dir}}/truststore.jks
  57. searchguard.key={{generated_certs_dir}}/elasticsearch.jks searchguard.truststore={{generated_certs_dir}}/truststore.jks
  58. admin-key={{generated_certs_dir}}/system.admin.key admin-cert={{generated_certs_dir}}/system.admin.crt
  59. admin-ca={{generated_certs_dir}}/ca.crt admin.jks={{generated_certs_dir}}/system.admin.jks -o yaml
  60. vars:
  61. secret_name: logging-elasticsearch
  62. secret_keys: ["admin-cert", "searchguard.key", "admin-ca", "key", "truststore", "admin-key"]
  63. register: logging_es_secret
  64. when: secret_name not in openshift_logging_facts.elasticsearch.secrets or
  65. secret_keys | difference(openshift_logging_facts.elasticsearch.secrets["{{secret_name}}"]["keys"]) | length != 0
  66. check_mode: no
  67. - copy: content="{{logging_es_secret.stdout}}" dest={{mktemp.stdout}}/templates/logging-elasticsearch-secret.yaml
  68. when: logging_es_secret.stdout is defined
  69. check_mode: no