config.yml 18 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408
  1. ---
  2. - name: Set master facts and determine if external etcd certs need to be generated
  3. hosts: oo_masters_to_config
  4. vars:
  5. t_oo_option_master_debug_level: "{{ lookup('oo_option', 'openshift_master_debug_level') }}"
  6. pre_tasks:
  7. - name: Check for RPM generated config marker file .config_managed
  8. stat:
  9. path: /etc/origin/.config_managed
  10. register: rpmgenerated_config
  11. - name: Remove RPM generated config files if present
  12. file:
  13. path: "/etc/origin/{{ item }}"
  14. state: absent
  15. when: rpmgenerated_config.stat.exists == true and deployment_type in ['openshift-enterprise', 'atomic-enterprise']
  16. with_items:
  17. - master
  18. - node
  19. - .config_managed
  20. - set_fact:
  21. openshift_master_pod_eviction_timeout: "{{ lookup('oo_option', 'openshift_master_pod_eviction_timeout') | default(none, true) }}"
  22. when: openshift_master_pod_eviction_timeout is not defined
  23. - set_fact:
  24. openshift_master_etcd_port: "{{ (etcd_client_port | default('2379')) if (groups.oo_etcd_to_config is defined and groups.oo_etcd_to_config) else none }}"
  25. openshift_master_etcd_hosts: "{{ hostvars
  26. | oo_select_keys(groups['oo_etcd_to_config']
  27. | default([]))
  28. | oo_collect('openshift.common.hostname')
  29. | default(none, true) }}"
  30. - set_fact:
  31. openshift_master_debug_level: "{{ t_oo_option_master_debug_level }}"
  32. when: openshift_master_debug_level is not defined and t_oo_option_master_debug_level != ""
  33. - set_fact:
  34. openshift_master_default_subdomain: "{{ lookup('oo_option', 'openshift_master_default_subdomain') | default(None, true) }}"
  35. when: openshift_master_default_subdomain is not defined
  36. - set_fact:
  37. openshift_hosted_metrics_deploy: "{{ lookup('oo_option', 'openshift_hosted_metrics_deploy') | default(false, true) }}"
  38. when: openshift_hosted_metrics_deploy is not defined
  39. - set_fact:
  40. openshift_hosted_metrics_duration: "{{ lookup('oo_option', 'openshift_hosted_metrics_duration') | default(7) }}"
  41. when: openshift_hosted_metrics_duration is not defined
  42. - set_fact:
  43. openshift_hosted_metrics_resolution: "{{ lookup('oo_option', 'openshift_hosted_metrics_resolution') | default(10) }}"
  44. when: openshift_hosted_metrics_resolution is not defined
  45. roles:
  46. - openshift_facts
  47. post_tasks:
  48. - openshift_facts:
  49. role: master
  50. local_facts:
  51. api_port: "{{ openshift_master_api_port | default(None) }}"
  52. api_url: "{{ openshift_master_api_url | default(None) }}"
  53. api_use_ssl: "{{ openshift_master_api_use_ssl | default(None) }}"
  54. controllers_port: "{{ openshift_master_controllers_port | default(None) }}"
  55. public_api_url: "{{ openshift_master_public_api_url | default(None) }}"
  56. cluster_hostname: "{{ openshift_master_cluster_hostname | default(None) }}"
  57. cluster_public_hostname: "{{ openshift_master_cluster_public_hostname | default(None) }}"
  58. console_path: "{{ openshift_master_console_path | default(None) }}"
  59. console_port: "{{ openshift_master_console_port | default(None) }}"
  60. console_url: "{{ openshift_master_console_url | default(None) }}"
  61. console_use_ssl: "{{ openshift_master_console_use_ssl | default(None) }}"
  62. public_console_url: "{{ openshift_master_public_console_url | default(None) }}"
  63. ha: "{{ openshift_master_ha | default(groups.oo_masters | length > 1) }}"
  64. master_count: "{{ openshift_master_count | default(groups.oo_masters | length) }}"
  65. - openshift_facts:
  66. role: hosted
  67. openshift_env:
  68. openshift_hosted_registry_storage_kind: 'nfs'
  69. when: openshift_hosted_registry_storage_kind is not defined and groups.oo_nfs_to_config is defined and groups.oo_nfs_to_config | length > 0
  70. - name: Check status of external etcd certificatees
  71. stat:
  72. path: "{{ openshift.common.config_base }}/master/{{ item }}"
  73. with_items:
  74. - master.etcd-client.crt
  75. - master.etcd-ca.crt
  76. register: g_external_etcd_cert_stat_result
  77. - set_fact:
  78. etcd_client_certs_missing: "{{ g_external_etcd_cert_stat_result.results
  79. | oo_collect(attribute='stat.exists')
  80. | list | intersect([false])}}"
  81. etcd_cert_subdir: openshift-master-{{ openshift.common.hostname }}
  82. etcd_cert_config_dir: "{{ openshift.common.config_base }}/master"
  83. etcd_cert_prefix: master.etcd-
  84. etcd_hostname: "{{ openshift.common.hostname }}"
  85. etcd_ip: "{{ openshift.common.ip }}"
  86. when: groups.oo_etcd_to_config is defined and groups.oo_etcd_to_config
  87. - name: Create temp directory for syncing certs
  88. hosts: localhost
  89. connection: local
  90. become: no
  91. gather_facts: no
  92. tasks:
  93. - name: Create local temp directory for syncing certs
  94. local_action: command mktemp -d /tmp/openshift-ansible-XXXXXXX
  95. register: g_master_mktemp
  96. changed_when: False
  97. - name: Configure etcd certificates
  98. hosts: oo_first_etcd
  99. vars:
  100. etcd_generated_certs_dir: /etc/etcd/generated_certs
  101. etcd_needing_client_certs: "{{ hostvars
  102. | oo_select_keys(groups['oo_masters_to_config'])
  103. | default([])
  104. | oo_filter_list(filter_attr='etcd_client_certs_missing') }}"
  105. sync_tmpdir: "{{ hostvars.localhost.g_master_mktemp.stdout }}"
  106. roles:
  107. - openshift_etcd_certificates
  108. post_tasks:
  109. - name: Create a tarball of the etcd certs
  110. command: >
  111. tar -czvf {{ etcd_generated_certs_dir }}/{{ item.etcd_cert_subdir }}.tgz
  112. -C {{ etcd_generated_certs_dir }}/{{ item.etcd_cert_subdir }} .
  113. args:
  114. creates: "{{ etcd_generated_certs_dir }}/{{ item.etcd_cert_subdir }}.tgz"
  115. with_items: "{{ etcd_needing_client_certs | default([]) }}"
  116. - name: Retrieve the etcd cert tarballs
  117. fetch:
  118. src: "{{ etcd_generated_certs_dir }}/{{ item.etcd_cert_subdir }}.tgz"
  119. dest: "{{ sync_tmpdir }}/"
  120. flat: yes
  121. fail_on_missing: yes
  122. validate_checksum: yes
  123. with_items: "{{ etcd_needing_client_certs | default([]) }}"
  124. - name: Copy the external etcd certs to the masters
  125. hosts: oo_masters_to_config
  126. vars:
  127. sync_tmpdir: "{{ hostvars.localhost.g_master_mktemp.stdout }}"
  128. tasks:
  129. - name: Ensure certificate directory exists
  130. file:
  131. path: "{{ openshift.common.config_base }}/master"
  132. state: directory
  133. when: etcd_client_certs_missing is defined and etcd_client_certs_missing
  134. - name: Unarchive the tarball on the master
  135. unarchive:
  136. src: "{{ sync_tmpdir }}/{{ etcd_cert_subdir }}.tgz"
  137. dest: "{{ etcd_cert_config_dir }}"
  138. when: etcd_client_certs_missing is defined and etcd_client_certs_missing
  139. - file:
  140. path: "{{ etcd_cert_config_dir }}/{{ item }}"
  141. owner: root
  142. group: root
  143. mode: 0600
  144. with_items:
  145. - master.etcd-client.crt
  146. - master.etcd-client.key
  147. - master.etcd-ca.crt
  148. when: etcd_client_certs_missing is defined and etcd_client_certs_missing
  149. # Must be run before generating master certs which involved openshift_cli role and needs
  150. # to pull down the correct docker container:
  151. - name: Determine openshift_version to configure on first master
  152. hosts: oo_first_master
  153. any_errors_fatal: true
  154. # We do initial seeding of openshift_version if possible with these tasks. The openshift_docker role
  155. # will make absolutely sure it's set to a specific version after this.
  156. pre_tasks:
  157. - debug: var=openshift.common
  158. - debug: var=openshift_image_tag
  159. - debug: var=openshift_release
  160. - debug: var=openshift_version
  161. roles:
  162. - openshift_docker
  163. - name: Determine if master certificates need to be generated
  164. hosts: oo_first_master:oo_masters_to_config
  165. tasks:
  166. - set_fact:
  167. openshift_master_certs_no_etcd:
  168. - admin.crt
  169. - master.kubelet-client.crt
  170. - "{{ 'master.proxy-client.crt' if openshift.common.version_gte_3_1_or_1_1 else omit }}"
  171. - master.server.crt
  172. - openshift-master.crt
  173. - openshift-registry.crt
  174. - openshift-router.crt
  175. - etcd.server.crt
  176. openshift_master_certs_etcd:
  177. - master.etcd-client.crt
  178. - set_fact:
  179. openshift_master_certs: "{{ (openshift_master_certs_no_etcd | union(openshift_master_certs_etcd)) if (groups.oo_etcd_to_config is defined and groups.oo_etcd_to_config) else openshift_master_certs_no_etcd }}"
  180. - name: Check status of master certificates
  181. stat:
  182. path: "{{ openshift.common.config_base }}/master/{{ item }}"
  183. with_items: "{{ openshift_master_certs }}"
  184. register: g_master_cert_stat_result
  185. - set_fact:
  186. master_certs_missing: "{{ False in (g_master_cert_stat_result.results
  187. | oo_collect(attribute='stat.exists')
  188. | list ) }}"
  189. master_cert_subdir: master-{{ openshift.common.hostname }}
  190. master_cert_config_dir: "{{ openshift.common.config_base }}/master"
  191. - set_fact:
  192. openshift_infra_nodes: "{{ hostvars | oo_select_keys(groups['oo_nodes_to_config'])
  193. | oo_nodes_with_label('region', 'infra')
  194. | oo_collect('inventory_hostname') }}"
  195. when: openshift_infra_nodes is not defined and groups.oo_nodes_to_config | default([]) | length > 0
  196. - name: Configure master certificates
  197. hosts: oo_first_master
  198. vars:
  199. master_generated_certs_dir: "{{ openshift.common.config_base }}/generated-configs"
  200. masters_needing_certs: "{{ hostvars
  201. | oo_select_keys(groups['oo_masters_to_config'] | difference(groups['oo_first_master']))
  202. | oo_filter_list(filter_attr='master_certs_missing') }}"
  203. master_hostnames: "{{ hostvars
  204. | oo_select_keys(groups['oo_masters_to_config'])
  205. | oo_collect('openshift.common.all_hostnames')
  206. | oo_flatten | unique }}"
  207. sync_tmpdir: "{{ hostvars.localhost.g_master_mktemp.stdout }}"
  208. openshift_docker_hosted_registry_network: "{{ hostvars[groups.oo_first_master.0].openshift.common.portal_net }}"
  209. roles:
  210. - openshift_master_certificates
  211. post_tasks:
  212. - name: Remove generated etcd client certs when using external etcd
  213. file:
  214. path: "{{ master_generated_certs_dir }}/{{ item.0.master_cert_subdir }}/{{ item.1 }}"
  215. state: absent
  216. when: groups.oo_etcd_to_config is defined and groups.oo_etcd_to_config
  217. with_nested:
  218. - "{{ masters_needing_certs | default([]) }}"
  219. - - master.etcd-client.crt
  220. - master.etcd-client.key
  221. - name: Create a tarball of the master certs
  222. command: >
  223. tar -czvf {{ master_generated_certs_dir }}/{{ item.master_cert_subdir }}.tgz
  224. -C {{ master_generated_certs_dir }}/{{ item.master_cert_subdir }} .
  225. args:
  226. creates: "{{ master_generated_certs_dir }}/{{ item.master_cert_subdir }}.tgz"
  227. with_items: "{{ masters_needing_certs | default([]) }}"
  228. - name: Retrieve the master cert tarball from the master
  229. fetch:
  230. src: "{{ master_generated_certs_dir }}/{{ item.master_cert_subdir }}.tgz"
  231. dest: "{{ sync_tmpdir }}/"
  232. flat: yes
  233. fail_on_missing: yes
  234. validate_checksum: yes
  235. with_items: "{{ masters_needing_certs | default([]) }}"
  236. - name: Configure load balancers
  237. hosts: oo_lb_to_config
  238. vars:
  239. sync_tmpdir: "{{ hostvars.localhost.g_master_mktemp.stdout }}"
  240. haproxy_limit_nofile: 100000
  241. haproxy_global_maxconn: 20000
  242. haproxy_default_maxconn: 20000
  243. haproxy_frontend_port: "{{ hostvars[groups.oo_first_master.0].openshift.master.api_port }}"
  244. haproxy_frontends:
  245. - name: atomic-openshift-api
  246. mode: tcp
  247. options:
  248. - tcplog
  249. binds:
  250. - "*:{{ hostvars[groups.oo_first_master.0].openshift.master.api_port }}"
  251. default_backend: atomic-openshift-api
  252. haproxy_backends:
  253. - name: atomic-openshift-api
  254. mode: tcp
  255. option: tcplog
  256. balance: source
  257. servers: "{{ hostvars | oo_select_keys(groups['oo_masters']) | oo_haproxy_backend_masters }}"
  258. roles:
  259. - role: openshift_facts
  260. - role: haproxy
  261. when: hostvars[groups.oo_first_master.0].openshift.master.ha | bool
  262. - name: Check for cached session secrets
  263. hosts: oo_first_master
  264. roles:
  265. - role: openshift_facts
  266. post_tasks:
  267. - openshift_facts:
  268. role: master
  269. local_facts:
  270. session_auth_secrets: "{{ openshift_master_session_auth_secrets | default(openshift.master.session_auth_secrets | default(None)) }}"
  271. session_encryption_secrets: "{{ openshift_master_session_encryption_secrets | default(openshift.master.session_encryption_secrets | default(None)) }}"
  272. - name: Generate master session secrets
  273. hosts: oo_first_master
  274. vars:
  275. g_session_secrets_present: "{{ (openshift.master.session_auth_secrets | default([]) and openshift.master.session_encryption_secrets | default([])) | length > 0 }}"
  276. g_session_auth_secrets: "{{ [ 24 | oo_generate_secret ] }}"
  277. g_session_encryption_secrets: "{{ [ 24 | oo_generate_secret ] }}"
  278. roles:
  279. - role: openshift_facts
  280. tasks:
  281. - openshift_facts:
  282. role: master
  283. local_facts:
  284. session_auth_secrets: "{{ g_session_auth_secrets }}"
  285. session_encryption_secrets: "{{ g_session_encryption_secrets }}"
  286. when: not g_session_secrets_present | bool
  287. - name: Parse named certificates
  288. hosts: localhost
  289. connection: local
  290. become: no
  291. vars:
  292. internal_hostnames: "{{ hostvars[groups.oo_first_master.0].openshift.common.internal_hostnames }}"
  293. named_certificates: "{{ hostvars[groups.oo_first_master.0].openshift_master_named_certificates | default([]) }}"
  294. named_certificates_dir: "{{ hostvars[groups.oo_first_master.0].master_cert_config_dir }}/named_certificates/"
  295. tasks:
  296. - set_fact:
  297. parsed_named_certificates: "{{ named_certificates | oo_parse_named_certificates(named_certificates_dir, internal_hostnames) }}"
  298. when: named_certificates | length > 0
  299. - name: Deploy named certificates
  300. hosts: oo_masters_to_config
  301. vars:
  302. named_certs_dir: "{{ master_cert_config_dir }}/named_certificates/"
  303. named_certs_specified: "{{ openshift_master_named_certificates is defined }}"
  304. overwrite_named_certs: "{{ openshift_master_overwrite_named_certificates | default(false) }}"
  305. roles:
  306. - role: openshift_facts
  307. post_tasks:
  308. - openshift_facts:
  309. role: master
  310. local_facts:
  311. named_certificates: "{{ hostvars.localhost.parsed_named_certificates | default([]) }}"
  312. additive_facts_to_overwrite:
  313. - "{{ 'master.named_certificates' if overwrite_named_certs | bool else omit }}"
  314. - name: Clear named certificates
  315. file:
  316. path: "{{ named_certs_dir }}"
  317. state: absent
  318. when: overwrite_named_certs | bool
  319. - name: Ensure named certificate directory exists
  320. file:
  321. path: "{{ named_certs_dir }}"
  322. state: directory
  323. mode: 0700
  324. when: named_certs_specified | bool
  325. - name: Land named certificates
  326. copy: src="{{ item.certfile }}" dest="{{ named_certs_dir }}"
  327. with_items: openshift_master_named_certificates
  328. when: named_certs_specified | bool
  329. - name: Land named certificate keys
  330. copy: src="{{ item.keyfile }}" dest="{{ named_certs_dir }}" mode=0600
  331. with_items: openshift_master_named_certificates
  332. when: named_certs_specified | bool
  333. - name: Configure masters
  334. hosts: oo_masters_to_config
  335. any_errors_fatal: true
  336. serial: 1
  337. vars:
  338. sync_tmpdir: "{{ hostvars.localhost.g_master_mktemp.stdout }}"
  339. # Do not pass a version if this is first master. (openshift_docker will sort it out)
  340. # For subsequent masters we pass either pre-existing version for the master (if already installed),
  341. # otherwise the first master version.
  342. openshift_version: "{{ openshift.common.version if openshift.common.version is defined else oo_first_master.openshift.common.version.split('-')[0] }}"
  343. when: inventory_hostname != groups.oo_first_master.0
  344. openshift_master_ha: "{{ openshift.master.ha }}"
  345. openshift_master_count: "{{ openshift.master.master_count }}"
  346. openshift_master_session_auth_secrets: "{{ hostvars[groups.oo_first_master.0].openshift.master.session_auth_secrets }}"
  347. openshift_master_session_encryption_secrets: "{{ hostvars[groups.oo_first_master.0].openshift.master.session_encryption_secrets }}"
  348. openshift_docker_hosted_registry_network: "{{ hostvars[groups.oo_first_master.0].openshift.common.portal_net }}"
  349. openshift_no_proxy_internal_hostnames: "{{ hostvars | oo_select_keys(groups['oo_nodes_to_config']
  350. | union(groups['oo_masters_to_config'])
  351. | union(groups['oo_etcd_to_config'] | default([])))
  352. | oo_collect('openshift.common.hostname') | default([]) | join (',')
  353. }}"
  354. when: "{{ (openshift_http_proxy is defined or openshift_https_proxy is defined) and
  355. openshift_generate_no_proxy_hosts | default(True) | bool }}"
  356. pre_tasks:
  357. - name: Ensure certificate directory exists
  358. file:
  359. path: "{{ openshift.common.config_base }}/master"
  360. state: directory
  361. when: master_certs_missing | bool and 'oo_first_master' not in group_names
  362. - name: Unarchive the tarball on the master
  363. unarchive:
  364. src: "{{ sync_tmpdir }}/{{ master_cert_subdir }}.tgz"
  365. dest: "{{ master_cert_config_dir }}"
  366. when: master_certs_missing | bool and 'oo_first_master' not in group_names
  367. roles:
  368. - openshift_master
  369. - role: nickhammond.logrotate
  370. - role: nuage_master
  371. when: openshift.common.use_nuage | bool
  372. post_tasks:
  373. - name: Create group for deployment type
  374. group_by: key=oo_masters_deployment_type_{{ openshift.common.deployment_type }}
  375. changed_when: False
  376. - name: Delete temporary directory on localhost
  377. hosts: localhost
  378. connection: local
  379. become: no
  380. gather_facts: no
  381. tasks:
  382. - file: name={{ g_master_mktemp.stdout }} state=absent
  383. changed_when: False