generate_jks.yaml 3.4 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394
  1. ---
  2. # check if pod generated files exist -- if they all do don't run the pod
  3. - name: Checking for elasticsearch.jks
  4. stat: path="{{generated_certs_dir}}/elasticsearch.jks"
  5. register: elasticsearch_jks
  6. check_mode: no
  7. - name: Checking for logging-es.jks
  8. stat: path="{{generated_certs_dir}}/logging-es.jks"
  9. register: logging_es_jks
  10. check_mode: no
  11. - name: Checking for system.admin.jks
  12. stat: path="{{generated_certs_dir}}/system.admin.jks"
  13. register: system_admin_jks
  14. check_mode: no
  15. - name: Checking for truststore.jks
  16. stat: path="{{generated_certs_dir}}/truststore.jks"
  17. register: truststore_jks
  18. check_mode: no
  19. - name: Create placeholder for previously created JKS certs to prevent recreating...
  20. local_action: file path="{{local_tmp.stdout}}/elasticsearch.jks" state=touch mode="u=rw,g=r,o=r"
  21. when: elasticsearch_jks.stat.exists
  22. changed_when: False
  23. become: no
  24. - name: Create placeholder for previously created JKS certs to prevent recreating...
  25. local_action: file path="{{local_tmp.stdout}}/logging-es.jks" state=touch mode="u=rw,g=r,o=r"
  26. when: logging_es_jks.stat.exists
  27. changed_when: False
  28. become: no
  29. - name: Create placeholder for previously created JKS certs to prevent recreating...
  30. local_action: file path="{{local_tmp.stdout}}/system.admin.jks" state=touch mode="u=rw,g=r,o=r"
  31. when: system_admin_jks.stat.exists
  32. changed_when: False
  33. become: no
  34. - name: Create placeholder for previously created JKS certs to prevent recreating...
  35. local_action: file path="{{local_tmp.stdout}}/truststore.jks" state=touch mode="u=rw,g=r,o=r"
  36. when: truststore_jks.stat.exists
  37. changed_when: False
  38. become: no
  39. - name: pulling down signing items from host
  40. fetch:
  41. src: "{{generated_certs_dir}}/{{item}}"
  42. dest: "{{local_tmp.stdout}}/{{item}}"
  43. flat: yes
  44. with_items:
  45. - ca.crt
  46. - ca.key
  47. - ca.serial.txt
  48. - ca.crl.srl
  49. - ca.db
  50. when: not elasticsearch_jks.stat.exists or not logging_es_jks.stat.exists or not system_admin_jks.stat.exists or not truststore_jks.stat.exists
  51. - local_action: template src=signing.conf.j2 dest={{local_tmp.stdout}}/signing.conf
  52. vars:
  53. - top_dir: "{{local_tmp.stdout}}"
  54. when: not elasticsearch_jks.stat.exists or not logging_es_jks.stat.exists or not system_admin_jks.stat.exists or not truststore_jks.stat.exists
  55. become: no
  56. - name: Run JKS generation script
  57. local_action: script generate-jks.sh {{local_tmp.stdout}} {{openshift_logging_namespace}}
  58. check_mode: no
  59. become: no
  60. when: not elasticsearch_jks.stat.exists or not logging_es_jks.stat.exists or not system_admin_jks.stat.exists or not truststore_jks.stat.exists
  61. - name: Pushing locally generated JKS certs to remote host...
  62. copy:
  63. src: "{{local_tmp.stdout}}/elasticsearch.jks"
  64. dest: "{{generated_certs_dir}}/elasticsearch.jks"
  65. when: not elasticsearch_jks.stat.exists
  66. - name: Pushing locally generated JKS certs to remote host...
  67. copy:
  68. src: "{{local_tmp.stdout}}/logging-es.jks"
  69. dest: "{{generated_certs_dir}}/logging-es.jks"
  70. when: not logging_es_jks.stat.exists
  71. - name: Pushing locally generated JKS certs to remote host...
  72. copy:
  73. src: "{{local_tmp.stdout}}/system.admin.jks"
  74. dest: "{{generated_certs_dir}}/system.admin.jks"
  75. when: not system_admin_jks.stat.exists
  76. - name: Pushing locally generated JKS certs to remote host...
  77. copy:
  78. src: "{{local_tmp.stdout}}/truststore.jks"
  79. dest: "{{generated_certs_dir}}/truststore.jks"
  80. when: not truststore_jks.stat.exists