generate_jks.yaml 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124
  1. ---
  2. # check if pod generated files exist -- if they all do don't run the pod
  3. - when:
  4. - openshift_logging_es_allow_external | default(False)
  5. - openshift_logging_es_hostname | default('') | regex_search('^[0-9]|[.][0-9]')
  6. block:
  7. - name: Report invalid external Elasticsearch hostnames for conclusion
  8. run_once: true
  9. set_stats:
  10. data:
  11. installer_phase_logging:
  12. message: "Elasticsearch external hostname {{ openshift_logging_es_hostname }} contains invalid characters for certificate subject Alt Name. Not adding to Elasticsearch certificate."
  13. - name: Report invalid external Elasticsearch hostnames
  14. debug:
  15. msg: "Elasticsearch external hostname {{ openshift_logging_es_hostname }} contains invalid characters for certificate subject Alt Name. Not adding to Elasticsearch certificate."
  16. - when:
  17. - openshift_logging_es_ops_allow_external | default(False)
  18. - openshift_logging_es_ops_hostname | default('') | regex_search('^[0-9]|[.][0-9]')
  19. block:
  20. - name: Report invalid external Elasticsearch ops hostnames for conclusion
  21. run_once: true
  22. set_stats:
  23. data:
  24. installer_phase_logging:
  25. message: "Elasticsearch external ops hostname {{ openshift_logging_es_ops_hostname }} contains invalid characters for certificate subject Alt Name. Not adding to Elasticsearch certificate."
  26. - name: Report invalid external Elasticsearch ops hostnames
  27. debug:
  28. msg: "Elasticsearch external hostname {{ openshift_logging_es_ops_hostname }} contains invalid characters for certificate subject Alt Name. Not adding to Elasticsearch certificate."
  29. - name: Checking for elasticsearch.jks
  30. stat: path="{{generated_certs_dir}}/elasticsearch.jks"
  31. register: elasticsearch_jks
  32. check_mode: no
  33. - name: Checking for logging-es.jks
  34. stat: path="{{generated_certs_dir}}/logging-es.jks"
  35. register: logging_es_jks
  36. check_mode: no
  37. - name: Checking for system.admin.jks
  38. stat: path="{{generated_certs_dir}}/system.admin.jks"
  39. register: system_admin_jks
  40. check_mode: no
  41. - name: Checking for truststore.jks
  42. stat: path="{{generated_certs_dir}}/truststore.jks"
  43. register: truststore_jks
  44. check_mode: no
  45. - name: Create placeholder for previously created JKS certs to prevent recreating...
  46. local_action: file path="{{local_tmp.stdout}}/elasticsearch.jks" state=touch mode="u=rw,g=r,o=r"
  47. when: elasticsearch_jks.stat.exists
  48. changed_when: False
  49. become: false
  50. - name: Create placeholder for previously created JKS certs to prevent recreating...
  51. local_action: file path="{{local_tmp.stdout}}/logging-es.jks" state=touch mode="u=rw,g=r,o=r"
  52. when: logging_es_jks.stat.exists
  53. changed_when: False
  54. become: false
  55. - name: Create placeholder for previously created JKS certs to prevent recreating...
  56. local_action: file path="{{local_tmp.stdout}}/system.admin.jks" state=touch mode="u=rw,g=r,o=r"
  57. when: system_admin_jks.stat.exists
  58. changed_when: False
  59. become: false
  60. - name: Create placeholder for previously created JKS certs to prevent recreating...
  61. local_action: file path="{{local_tmp.stdout}}/truststore.jks" state=touch mode="u=rw,g=r,o=r"
  62. when: truststore_jks.stat.exists
  63. changed_when: False
  64. become: false
  65. - name: pulling down signing items from host
  66. fetch:
  67. src: "{{generated_certs_dir}}/{{item}}"
  68. dest: "{{local_tmp.stdout}}/{{item}}"
  69. flat: yes
  70. with_items:
  71. - ca.crt
  72. - ca.key
  73. - ca.serial.txt
  74. - ca.crl.srl
  75. - ca.db
  76. when: not elasticsearch_jks.stat.exists or not logging_es_jks.stat.exists or not system_admin_jks.stat.exists or not truststore_jks.stat.exists
  77. - local_action: template src=signing.conf.j2 dest={{local_tmp.stdout}}/signing.conf
  78. vars:
  79. - top_dir: "{{local_tmp.stdout}}"
  80. become: false
  81. when: not elasticsearch_jks.stat.exists or not logging_es_jks.stat.exists or not system_admin_jks.stat.exists or not truststore_jks.stat.exists
  82. - name: Run JKS generation script
  83. local_action: script generate-jks.sh {{local_tmp.stdout}} {{openshift_logging_namespace}} {{openshift_logging_es_hostname | default()}} {{openshift_logging_es_ops_hostname | default()}}
  84. check_mode: no
  85. become: false
  86. when: not elasticsearch_jks.stat.exists or not logging_es_jks.stat.exists or not system_admin_jks.stat.exists or not truststore_jks.stat.exists
  87. - name: Pushing locally generated JKS certs to remote host...
  88. copy:
  89. src: "{{local_tmp.stdout}}/elasticsearch.jks"
  90. dest: "{{generated_certs_dir}}/elasticsearch.jks"
  91. when: not elasticsearch_jks.stat.exists
  92. - name: Pushing locally generated JKS certs to remote host...
  93. copy:
  94. src: "{{local_tmp.stdout}}/logging-es.jks"
  95. dest: "{{generated_certs_dir}}/logging-es.jks"
  96. when: not logging_es_jks.stat.exists
  97. - name: Pushing locally generated JKS certs to remote host...
  98. copy:
  99. src: "{{local_tmp.stdout}}/system.admin.jks"
  100. dest: "{{generated_certs_dir}}/system.admin.jks"
  101. when: not system_admin_jks.stat.exists
  102. - name: Pushing locally generated JKS certs to remote host...
  103. copy:
  104. src: "{{local_tmp.stdout}}/truststore.jks"
  105. dest: "{{generated_certs_dir}}/truststore.jks"
  106. when: not truststore_jks.stat.exists