123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232 |
- ---
- # TODO: add ability to configure certificates given either a local file to
- # point to or certificate contents, set in default cert locations.
- # Authentication Variable Validation
- # TODO: validate the different identity provider kinds as well
- - fail:
- msg: >
- Invalid OAuth grant method: {{ openshift_master_oauth_grant_method }}
- when: openshift_master_oauth_grant_method is defined and openshift_master_oauth_grant_method not in openshift_master_valid_grant_methods
- # HA Variable Validation
- - fail:
- msg: "openshift_master_cluster_method must be set to either 'native' or 'pacemaker' for multi-master installations"
- when: openshift_master_ha | bool and ((openshift_master_cluster_method is not defined) or (openshift_master_cluster_method is defined and openshift_master_cluster_method not in ["native", "pacemaker"]))
- - fail:
- msg: "'native' high availability is not supported for the requested OpenShift version"
- when: openshift_master_ha | bool and openshift_master_cluster_method == "native" and not openshift.common.version_gte_3_1_or_1_1 | bool
- - fail:
- msg: "openshift_master_cluster_password must be set for multi-master installations"
- when: openshift_master_ha | bool and openshift_master_cluster_method == "pacemaker" and (openshift_master_cluster_password is not defined or not openshift_master_cluster_password)
- - fail:
- msg: "Pacemaker based HA is not supported at this time when used with containerized installs"
- when: openshift_master_ha | bool and openshift_master_cluster_method == "pacemaker" and openshift.common.is_containerized | bool
- - name: Install Master package
- action: "{{ ansible_pkg_mgr }} name={{ openshift.common.service_type }}-master{{ openshift_version }} state=present"
- when: not openshift.common.is_containerized | bool
- - name: Pull master image
- command: >
- docker pull {{ openshift.master.master_image }}:{{ openshift_version }}
- when: openshift.common.is_containerized | bool
- - name: Create openshift.common.data_dir
- file:
- path: "{{ openshift.common.data_dir }}"
- state: directory
- mode: 0755
- owner: root
- group: root
- when: openshift.common.is_containerized | bool
- - name: Reload systemd units
- command: systemctl daemon-reload
- when: openshift.common.is_containerized | bool and install_result | changed
- - name: Re-gather package dependent master facts
- openshift_facts:
- - name: Create config parent directory if it does not exist
- file:
- path: "{{ openshift_master_config_dir }}"
- state: directory
- - name: Create the policy file if it does not already exist
- command: >
- {{ openshift.common.admin_binary }} create-bootstrap-policy-file
- --filename={{ openshift_master_policy }}
- args:
- creates: "{{ openshift_master_policy }}"
- notify:
- - restart master
- - restart master api
- - restart master controllers
- - name: Create the scheduler config
- template:
- dest: "{{ openshift_master_scheduler_conf }}"
- src: scheduler.json.j2
- backup: true
- notify:
- - restart master
- - restart master api
- - restart master controllers
- - name: Install httpd-tools if needed
- action: "{{ ansible_pkg_mgr }} name=httpd-tools state=present"
- when: (item.kind == 'HTPasswdPasswordIdentityProvider') and
- not openshift.common.is_atomic | bool
- with_items: openshift.master.identity_providers
- - name: Ensure htpasswd directory exists
- file:
- path: "{{ item.filename | dirname }}"
- state: directory
- when: item.kind == 'HTPasswdPasswordIdentityProvider'
- with_items: openshift.master.identity_providers
- - name: Create the htpasswd file if needed
- copy:
- dest: "{{ item.filename }}"
- content: ""
- mode: 0600
- force: no
- when: item.kind == 'HTPasswdPasswordIdentityProvider'
- with_items: openshift.master.identity_providers
- - name: Install the systemd units
- include: systemd_units.yml
- - name: Create session secrets file
- template:
- dest: "{{ openshift.master.session_secrets_file }}"
- src: sessionSecretsFile.yaml.v1.j2
- owner: root
- group: root
- mode: 0600
- when: openshift.master.session_auth_secrets is defined and openshift.master.session_encryption_secrets is defined
- notify:
- - restart master
- - restart master api
- - set_fact:
- translated_identity_providers: "{{ openshift.master.identity_providers | translate_idps('v1') }}"
- # TODO: add the validate parameter when there is a validation command to run
- - name: Create master config
- template:
- dest: "{{ openshift_master_config_file }}"
- src: master.yaml.v1.j2
- backup: true
- owner: root
- group: root
- mode: 0600
- notify:
- - restart master
- - restart master api
- - restart master controllers
- - include: set_loopback_context.yml
- when: openshift.common.version_gte_3_2_or_1_2
- - name: Start and enable master
- service: name={{ openshift.common.service_type }}-master enabled=yes state=started
- when: not openshift_master_ha | bool
- register: start_result
- notify: Verify API Server
- - name: Stop and disable non HA master when running HA
- service: name={{ openshift.common.service_type }}-master enabled=no state=stopped
- when: openshift_master_ha | bool
- - set_fact:
- master_service_status_changed: "{{ start_result | changed }}"
- when: not openshift_master_ha | bool
- - name: Mask master service
- command: systemctl mask {{ openshift.common.service_type }}-master
- when: openshift_master_ha | bool and openshift.master.cluster_method == 'native' and not openshift.common.is_containerized | bool
- - name: Start and enable master api
- service: name={{ openshift.common.service_type }}-master-api enabled=yes state=started
- when: openshift_master_ha | bool and openshift.master.cluster_method == 'native'
- register: start_result
- - set_fact:
- master_api_service_status_changed: "{{ start_result | changed }}"
- when: openshift_master_ha | bool and openshift.master.cluster_method == 'native'
- # A separate wait is required here for native HA since notifies will
- # be resolved after all tasks in the role.
- - name: Wait for API to become available
- # Using curl here since the uri module requires python-httplib2 and
- # wait_for port doesn't provide health information.
- command: >
- curl --silent --cacert {{ openshift.common.config_base }}/master/ca.crt
- {{ openshift.master.api_url }}/healthz/ready
- register: api_available_output
- until: api_available_output.stdout == 'ok'
- retries: 120
- delay: 1
- changed_when: false
- when: openshift_master_ha | bool and openshift.master.cluster_method == 'native' and master_api_service_status_changed | bool
- - name: Start and enable master controller
- service: name={{ openshift.common.service_type }}-master-controllers enabled=yes state=started
- when: openshift_master_ha | bool and openshift.master.cluster_method == 'native'
- register: start_result
- - set_fact:
- master_controllers_service_status_changed: "{{ start_result | changed }}"
- when: openshift_master_ha | bool and openshift.master.cluster_method == 'native'
- - name: Install cluster packages
- action: "{{ ansible_pkg_mgr }} name=pcs state=present"
- when: openshift_master_ha | bool and openshift.master.cluster_method == 'pacemaker'
- and not openshift.common.is_containerized | bool
- register: install_result
- - name: Start and enable cluster service
- service: name=pcsd enabled=yes state=started
- when: openshift_master_ha | bool and openshift.master.cluster_method == 'pacemaker'
- and not openshift.common.is_containerized | bool
- - name: Set the cluster user password
- shell: echo {{ openshift_master_cluster_password | quote }} | passwd --stdin hacluster
- when: install_result | changed
- - name: Lookup default group for ansible_ssh_user
- command: "/usr/bin/id -g {{ ansible_ssh_user }}"
- changed_when: false
- register: _ansible_ssh_user_gid
- - set_fact:
- client_users: "{{ [ansible_ssh_user, 'root'] | unique }}"
- - name: Create the client config dir(s)
- file:
- path: "~{{ item }}/.kube"
- state: directory
- mode: 0700
- owner: "{{ item }}"
- group: "{{ 'root' if item == 'root' else _ansible_ssh_user_gid.stdout }}"
- with_items: client_users
- # TODO: Update this file if the contents of the source file are not present in
- # the dest file, will need to make sure to ignore things that could be added
- - name: Copy the admin client config(s)
- command: cp {{ openshift_master_config_dir }}/admin.kubeconfig ~{{ item }}/.kube/config
- args:
- creates: ~{{ item }}/.kube/config
- with_items: client_users
- - name: Update the permissions on the admin client config(s)
- file:
- path: "~{{ item }}/.kube/config"
- state: file
- mode: 0700
- owner: "{{ item }}"
- group: "{{ 'root' if item == 'root' else _ansible_ssh_user_gid.stdout }}"
- with_items: client_users
|