main.yml 8.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232
  1. ---
  2. # TODO: add ability to configure certificates given either a local file to
  3. # point to or certificate contents, set in default cert locations.
  4. # Authentication Variable Validation
  5. # TODO: validate the different identity provider kinds as well
  6. - fail:
  7. msg: >
  8. Invalid OAuth grant method: {{ openshift_master_oauth_grant_method }}
  9. when: openshift_master_oauth_grant_method is defined and openshift_master_oauth_grant_method not in openshift_master_valid_grant_methods
  10. # HA Variable Validation
  11. - fail:
  12. msg: "openshift_master_cluster_method must be set to either 'native' or 'pacemaker' for multi-master installations"
  13. when: openshift_master_ha | bool and ((openshift_master_cluster_method is not defined) or (openshift_master_cluster_method is defined and openshift_master_cluster_method not in ["native", "pacemaker"]))
  14. - fail:
  15. msg: "'native' high availability is not supported for the requested OpenShift version"
  16. when: openshift_master_ha | bool and openshift_master_cluster_method == "native" and not openshift.common.version_gte_3_1_or_1_1 | bool
  17. - fail:
  18. msg: "openshift_master_cluster_password must be set for multi-master installations"
  19. when: openshift_master_ha | bool and openshift_master_cluster_method == "pacemaker" and (openshift_master_cluster_password is not defined or not openshift_master_cluster_password)
  20. - fail:
  21. msg: "Pacemaker based HA is not supported at this time when used with containerized installs"
  22. when: openshift_master_ha | bool and openshift_master_cluster_method == "pacemaker" and openshift.common.is_containerized | bool
  23. - name: Install Master package
  24. action: "{{ ansible_pkg_mgr }} name={{ openshift.common.service_type }}-master{{ openshift_version }} state=present"
  25. when: not openshift.common.is_containerized | bool
  26. - name: Pull master image
  27. command: >
  28. docker pull {{ openshift.master.master_image }}:{{ openshift_version }}
  29. when: openshift.common.is_containerized | bool
  30. - name: Create openshift.common.data_dir
  31. file:
  32. path: "{{ openshift.common.data_dir }}"
  33. state: directory
  34. mode: 0755
  35. owner: root
  36. group: root
  37. when: openshift.common.is_containerized | bool
  38. - name: Reload systemd units
  39. command: systemctl daemon-reload
  40. when: openshift.common.is_containerized | bool and install_result | changed
  41. - name: Re-gather package dependent master facts
  42. openshift_facts:
  43. - name: Create config parent directory if it does not exist
  44. file:
  45. path: "{{ openshift_master_config_dir }}"
  46. state: directory
  47. - name: Create the policy file if it does not already exist
  48. command: >
  49. {{ openshift.common.admin_binary }} create-bootstrap-policy-file
  50. --filename={{ openshift_master_policy }}
  51. args:
  52. creates: "{{ openshift_master_policy }}"
  53. notify:
  54. - restart master
  55. - restart master api
  56. - restart master controllers
  57. - name: Create the scheduler config
  58. template:
  59. dest: "{{ openshift_master_scheduler_conf }}"
  60. src: scheduler.json.j2
  61. backup: true
  62. notify:
  63. - restart master
  64. - restart master api
  65. - restart master controllers
  66. - name: Install httpd-tools if needed
  67. action: "{{ ansible_pkg_mgr }} name=httpd-tools state=present"
  68. when: (item.kind == 'HTPasswdPasswordIdentityProvider') and
  69. not openshift.common.is_atomic | bool
  70. with_items: openshift.master.identity_providers
  71. - name: Ensure htpasswd directory exists
  72. file:
  73. path: "{{ item.filename | dirname }}"
  74. state: directory
  75. when: item.kind == 'HTPasswdPasswordIdentityProvider'
  76. with_items: openshift.master.identity_providers
  77. - name: Create the htpasswd file if needed
  78. copy:
  79. dest: "{{ item.filename }}"
  80. content: ""
  81. mode: 0600
  82. force: no
  83. when: item.kind == 'HTPasswdPasswordIdentityProvider'
  84. with_items: openshift.master.identity_providers
  85. - name: Install the systemd units
  86. include: systemd_units.yml
  87. - name: Create session secrets file
  88. template:
  89. dest: "{{ openshift.master.session_secrets_file }}"
  90. src: sessionSecretsFile.yaml.v1.j2
  91. owner: root
  92. group: root
  93. mode: 0600
  94. when: openshift.master.session_auth_secrets is defined and openshift.master.session_encryption_secrets is defined
  95. notify:
  96. - restart master
  97. - restart master api
  98. - set_fact:
  99. translated_identity_providers: "{{ openshift.master.identity_providers | translate_idps('v1') }}"
  100. # TODO: add the validate parameter when there is a validation command to run
  101. - name: Create master config
  102. template:
  103. dest: "{{ openshift_master_config_file }}"
  104. src: master.yaml.v1.j2
  105. backup: true
  106. owner: root
  107. group: root
  108. mode: 0600
  109. notify:
  110. - restart master
  111. - restart master api
  112. - restart master controllers
  113. - include: set_loopback_context.yml
  114. when: openshift.common.version_gte_3_2_or_1_2
  115. - name: Start and enable master
  116. service: name={{ openshift.common.service_type }}-master enabled=yes state=started
  117. when: not openshift_master_ha | bool
  118. register: start_result
  119. notify: Verify API Server
  120. - name: Stop and disable non HA master when running HA
  121. service: name={{ openshift.common.service_type }}-master enabled=no state=stopped
  122. when: openshift_master_ha | bool
  123. - set_fact:
  124. master_service_status_changed: "{{ start_result | changed }}"
  125. when: not openshift_master_ha | bool
  126. - name: Mask master service
  127. command: systemctl mask {{ openshift.common.service_type }}-master
  128. when: openshift_master_ha | bool and openshift.master.cluster_method == 'native' and not openshift.common.is_containerized | bool
  129. - name: Start and enable master api
  130. service: name={{ openshift.common.service_type }}-master-api enabled=yes state=started
  131. when: openshift_master_ha | bool and openshift.master.cluster_method == 'native'
  132. register: start_result
  133. - set_fact:
  134. master_api_service_status_changed: "{{ start_result | changed }}"
  135. when: openshift_master_ha | bool and openshift.master.cluster_method == 'native'
  136. # A separate wait is required here for native HA since notifies will
  137. # be resolved after all tasks in the role.
  138. - name: Wait for API to become available
  139. # Using curl here since the uri module requires python-httplib2 and
  140. # wait_for port doesn't provide health information.
  141. command: >
  142. curl --silent --cacert {{ openshift.common.config_base }}/master/ca.crt
  143. {{ openshift.master.api_url }}/healthz/ready
  144. register: api_available_output
  145. until: api_available_output.stdout == 'ok'
  146. retries: 120
  147. delay: 1
  148. changed_when: false
  149. when: openshift_master_ha | bool and openshift.master.cluster_method == 'native' and master_api_service_status_changed | bool
  150. - name: Start and enable master controller
  151. service: name={{ openshift.common.service_type }}-master-controllers enabled=yes state=started
  152. when: openshift_master_ha | bool and openshift.master.cluster_method == 'native'
  153. register: start_result
  154. - set_fact:
  155. master_controllers_service_status_changed: "{{ start_result | changed }}"
  156. when: openshift_master_ha | bool and openshift.master.cluster_method == 'native'
  157. - name: Install cluster packages
  158. action: "{{ ansible_pkg_mgr }} name=pcs state=present"
  159. when: openshift_master_ha | bool and openshift.master.cluster_method == 'pacemaker'
  160. and not openshift.common.is_containerized | bool
  161. register: install_result
  162. - name: Start and enable cluster service
  163. service: name=pcsd enabled=yes state=started
  164. when: openshift_master_ha | bool and openshift.master.cluster_method == 'pacemaker'
  165. and not openshift.common.is_containerized | bool
  166. - name: Set the cluster user password
  167. shell: echo {{ openshift_master_cluster_password | quote }} | passwd --stdin hacluster
  168. when: install_result | changed
  169. - name: Lookup default group for ansible_ssh_user
  170. command: "/usr/bin/id -g {{ ansible_ssh_user }}"
  171. changed_when: false
  172. register: _ansible_ssh_user_gid
  173. - set_fact:
  174. client_users: "{{ [ansible_ssh_user, 'root'] | unique }}"
  175. - name: Create the client config dir(s)
  176. file:
  177. path: "~{{ item }}/.kube"
  178. state: directory
  179. mode: 0700
  180. owner: "{{ item }}"
  181. group: "{{ 'root' if item == 'root' else _ansible_ssh_user_gid.stdout }}"
  182. with_items: client_users
  183. # TODO: Update this file if the contents of the source file are not present in
  184. # the dest file, will need to make sure to ignore things that could be added
  185. - name: Copy the admin client config(s)
  186. command: cp {{ openshift_master_config_dir }}/admin.kubeconfig ~{{ item }}/.kube/config
  187. args:
  188. creates: ~{{ item }}/.kube/config
  189. with_items: client_users
  190. - name: Update the permissions on the admin client config(s)
  191. file:
  192. path: "~{{ item }}/.kube/config"
  193. state: file
  194. mode: 0700
  195. owner: "{{ item }}"
  196. group: "{{ 'root' if item == 'root' else _ansible_ssh_user_gid.stdout }}"
  197. with_items: client_users