main.yml 7.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205
  1. ---
  2. - fail:
  3. msg: "openshift_ca_host variable must be defined for this role"
  4. when: openshift_ca_host is not defined
  5. - fail:
  6. msg: "Both 'certfile' and 'keyfile' keys must be supplied when configuring openshift_master_ca_certificate"
  7. when: openshift_master_ca_certificate is defined and ('certfile' not in openshift_master_ca_certificate or 'keyfile' not in openshift_master_ca_certificate)
  8. - name: Install the base package for admin tooling
  9. package:
  10. name: "{{ openshift.common.service_type }}{{ openshift_pkg_version | default('') | oo_image_tag_to_rpm_version(include_dash=True) }}"
  11. state: present
  12. when: not openshift.common.is_containerized | bool
  13. register: install_result
  14. delegate_to: "{{ openshift_ca_host }}"
  15. run_once: true
  16. - name: Reload generated facts
  17. openshift_facts:
  18. when: hostvars[openshift_ca_host].install_result | changed
  19. - name: Create openshift_ca_config_dir if it does not exist
  20. file:
  21. path: "{{ openshift_ca_config_dir }}"
  22. state: directory
  23. delegate_to: "{{ openshift_ca_host }}"
  24. run_once: true
  25. - name: Determine if CA must be created
  26. stat:
  27. path: "{{ openshift_ca_config_dir }}/{{ item }}"
  28. register: g_master_ca_stat_result
  29. with_items:
  30. - ca-bundle.crt
  31. - ca.crt
  32. - ca.key
  33. delegate_to: "{{ openshift_ca_host }}"
  34. run_once: true
  35. - set_fact:
  36. master_ca_missing: "{{ False in (g_master_ca_stat_result.results
  37. | oo_collect(attribute='stat.exists')
  38. | list) }}"
  39. run_once: true
  40. - name: Retain original serviceaccount keys
  41. copy:
  42. src: "{{ item }}"
  43. dest: "{{ item }}.keep"
  44. remote_src: true
  45. with_items:
  46. - "{{ openshift_ca_config_dir }}/serviceaccounts.private.key"
  47. - "{{ openshift_ca_config_dir }}/serviceaccounts.public.key"
  48. when: openshift_certificates_redeploy | default(false) | bool
  49. - name: Deploy master ca certificate
  50. copy:
  51. src: "{{ item.src }}"
  52. dest: "{{ openshift_ca_config_dir }}/{{ item.dest }}"
  53. force: no
  54. with_items:
  55. - src: "{{ (openshift_master_ca_certificate | default({'certfile':none})).certfile }}"
  56. dest: ca.crt
  57. - src: "{{ (openshift_master_ca_certificate | default({'keyfile':none})).keyfile }}"
  58. dest: ca.key
  59. when: openshift_master_ca_certificate is defined
  60. delegate_to: "{{ openshift_ca_host }}"
  61. run_once: true
  62. - name: Create ca serial
  63. copy:
  64. content: "00"
  65. dest: "{{ openshift_ca_config_dir }}/ca.serial.txt"
  66. force: "{{ openshift_certificates_redeploy | default(false) | bool }}"
  67. when: openshift_master_ca_certificate is defined
  68. delegate_to: "{{ openshift_ca_host }}"
  69. run_once: true
  70. - find:
  71. paths: "{{ openshift.common.config_base }}/master/legacy-ca/"
  72. patterns: ".*-ca.crt"
  73. use_regex: true
  74. register: g_master_legacy_ca_result
  75. # This should NOT replace the CA due to --overwrite=false when a CA already exists.
  76. - name: Create the master certificates if they do not already exist
  77. command: >
  78. {{ hostvars[openshift_ca_host].openshift.common.client_binary }} adm ca create-master-certs
  79. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | oo_collect('cafile') %}
  80. --certificate-authority {{ named_ca_certificate }}
  81. {% endfor %}
  82. {% for legacy_ca_certificate in g_master_legacy_ca_result.files | default([]) | oo_collect('path') %}
  83. --certificate-authority {{ legacy_ca_certificate }}
  84. {% endfor %}
  85. --hostnames={{ hostvars[openshift_ca_host].openshift.common.all_hostnames | join(',') }}
  86. --master={{ openshift.master.api_url }}
  87. --public-master={{ openshift.master.public_api_url }}
  88. --cert-dir={{ openshift_ca_config_dir }}
  89. --expire-days={{ openshift_master_cert_expire_days }}
  90. --signer-expire-days={{ openshift_ca_cert_expire_days }}
  91. --overwrite=false
  92. when: master_ca_missing | bool or openshift_certificates_redeploy | default(false) | bool
  93. delegate_to: "{{ openshift_ca_host }}"
  94. run_once: true
  95. # Create client-ca-bundle.crt containing old and new OpenShift CA
  96. # certificates. This bundle will be used when rolling the OpenShift CA
  97. # certificate.
  98. - name: Create client-ca-bundle.crt
  99. block:
  100. - command: mktemp -d /tmp/openshift-ansible-XXXXXX
  101. register: openshift_ca_clientconfig_tmpdir
  102. delegate_to: "{{ openshift_ca_host }}"
  103. - copy:
  104. src: "{{ item }}"
  105. dest: "{{ openshift_ca_clientconfig_tmpdir.stdout }}/"
  106. remote_src: true
  107. with_items: "{{ g_master_legacy_ca_result.files | default([]) | oo_collect('path') }}"
  108. delegate_to: "{{ openshift_ca_host }}"
  109. run_once: true
  110. - copy:
  111. src: "{{ openshift_ca_config_dir }}/ca.crt"
  112. dest: "{{ openshift_ca_clientconfig_tmpdir.stdout }}/"
  113. remote_src: true
  114. delegate_to: "{{ openshift_ca_host }}"
  115. run_once: true
  116. - assemble:
  117. src: "{{ openshift_ca_clientconfig_tmpdir.stdout }}"
  118. dest: "{{ openshift_ca_config_dir }}/client-ca-bundle.crt"
  119. mode: 0644
  120. owner: root
  121. group: root
  122. delegate_to: "{{ openshift_ca_host }}"
  123. run_once: true
  124. - name: Test local loopback context
  125. command: >
  126. {{ hostvars[openshift_ca_host].openshift.common.client_binary }} config view
  127. --config={{ openshift_master_loopback_config }}
  128. changed_when: false
  129. register: loopback_config
  130. delegate_to: "{{ openshift_ca_host }}"
  131. run_once: true
  132. # create-api-client-config generates a ca.crt file which will
  133. # overwrite the OpenShift CA certificate. Generate the loopback
  134. # kubeconfig in a temporary directory and then copy files into the
  135. # master config dir to avoid overwriting ca.crt.
  136. - block:
  137. - name: Create temp directory for loopback master client config
  138. command: mktemp -d /tmp/openshift-ansible-XXXXXX
  139. register: openshift_ca_loopback_tmpdir
  140. - name: Generate the loopback master client config
  141. command: >
  142. {{ hostvars[openshift_ca_host].openshift.common.client_binary }} adm create-api-client-config
  143. --certificate-authority={{ openshift_ca_cert }}
  144. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | oo_collect('cafile') %}
  145. --certificate-authority {{ named_ca_certificate }}
  146. {% endfor %}
  147. --client-dir={{ openshift_ca_loopback_tmpdir.stdout }}
  148. --groups=system:masters,system:openshift-master
  149. --master={{ hostvars[openshift_ca_host].openshift.master.loopback_api_url }}
  150. --public-master={{ hostvars[openshift_ca_host].openshift.master.loopback_api_url }}
  151. --signer-cert={{ openshift_ca_cert }}
  152. --signer-key={{ openshift_ca_key }}
  153. --signer-serial={{ openshift_ca_serial }}
  154. --user=system:openshift-master
  155. --basename=openshift-master
  156. --expire-days={{ openshift_master_cert_expire_days }}
  157. - name: Copy generated loopback master client config to master config dir
  158. copy:
  159. src: "{{ openshift_ca_loopback_tmpdir.stdout }}/{{ item }}"
  160. dest: "{{ openshift_ca_config_dir }}"
  161. remote_src: true
  162. with_items:
  163. - openshift-master.crt
  164. - openshift-master.key
  165. - openshift-master.kubeconfig
  166. - name: Delete temp directory
  167. file:
  168. name: "{{ openshift_ca_loopback_tmpdir.stdout }}"
  169. state: absent
  170. when: loopback_context_string not in loopback_config.stdout
  171. delegate_to: "{{ openshift_ca_host }}"
  172. run_once: true
  173. - name: Restore original serviceaccount keys
  174. copy:
  175. src: "{{ item }}.keep"
  176. dest: "{{ item }}"
  177. remote_src: true
  178. with_items:
  179. - "{{ openshift_ca_config_dir }}/serviceaccounts.private.key"
  180. - "{{ openshift_ca_config_dir }}/serviceaccounts.public.key"
  181. when: openshift_certificates_redeploy | default(false) | bool
  182. - name: Remove backup serviceaccount keys
  183. file:
  184. path: "{{ item }}.keep"
  185. state: absent
  186. with_items:
  187. - "{{ openshift_ca_config_dir }}/serviceaccounts.private.key"
  188. - "{{ openshift_ca_config_dir }}/serviceaccounts.public.key"
  189. when: openshift_certificates_redeploy | default(false) | bool