main.yml 6.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154
  1. ---
  2. - name: Ensure CA certificate exists on openshift_ca_host
  3. stat:
  4. path: "{{ openshift_ca_cert }}"
  5. register: g_ca_cert_stat_result
  6. delegate_to: "{{ openshift_ca_host }}"
  7. run_once: true
  8. - fail:
  9. msg: >
  10. CA certificate {{ openshift_ca_cert }} doesn't exist on CA host
  11. {{ openshift_ca_host }}. Apply 'openshift_ca' role to
  12. {{ openshift_ca_host }}.
  13. when: not g_ca_cert_stat_result.stat.exists | bool
  14. run_once: true
  15. - name: Check status of node certificates
  16. stat:
  17. path: "{{ openshift.common.config_base }}/node/{{ item }}"
  18. with_items:
  19. - "system:node:{{ openshift.common.hostname }}.crt"
  20. - "system:node:{{ openshift.common.hostname }}.key"
  21. - "system:node:{{ openshift.common.hostname }}.kubeconfig"
  22. - ca.crt
  23. - server.key
  24. - server.crt
  25. register: g_node_cert_stat_result
  26. when: not openshift_certificates_redeploy | default(false) | bool
  27. - set_fact:
  28. node_certs_missing: "{{ true if openshift_certificates_redeploy | default(false) | bool
  29. else (False in (g_node_cert_stat_result.results
  30. | default({})
  31. | oo_collect(attribute='stat.exists')
  32. | list)) }}"
  33. - name: Create openshift_generated_configs_dir if it does not exist
  34. file:
  35. path: "{{ openshift_generated_configs_dir }}"
  36. state: directory
  37. mode: 0700
  38. when: node_certs_missing | bool
  39. delegate_to: "{{ openshift_ca_host }}"
  40. - find:
  41. paths: "{{ openshift.common.config_base }}/master/legacy-ca/"
  42. patterns: ".*-ca.crt"
  43. use_regex: true
  44. register: g_master_legacy_ca_result
  45. delegate_to: "{{ openshift_ca_host }}"
  46. - name: Generate the node client config
  47. command: >
  48. {{ hostvars[openshift_ca_host].openshift.common.client_binary }} adm create-api-client-config
  49. {% for named_ca_certificate in hostvars[openshift_ca_host].openshift.master.named_certificates | default([]) | oo_collect('cafile') %}
  50. --certificate-authority {{ named_ca_certificate }}
  51. {% endfor %}
  52. {% for legacy_ca_certificate in g_master_legacy_ca_result.files | default([]) | oo_collect('path') %}
  53. --certificate-authority {{ legacy_ca_certificate }}
  54. {% endfor %}
  55. --certificate-authority={{ openshift_ca_cert }}
  56. --client-dir={{ openshift_generated_configs_dir }}/node-{{ hostvars[item].openshift.common.hostname }}
  57. --groups=system:nodes
  58. --master={{ hostvars[openshift_ca_host].openshift.master.api_url }}
  59. --signer-cert={{ openshift_ca_cert }}
  60. --signer-key={{ openshift_ca_key }}
  61. --signer-serial={{ openshift_ca_serial }}
  62. --user=system:node:{{ hostvars[item].openshift.common.hostname }}
  63. --expire-days={{ openshift_node_cert_expire_days }}
  64. args:
  65. creates: "{{ openshift_generated_configs_dir }}/node-{{ hostvars[item].openshift.common.hostname }}"
  66. with_items: "{{ hostvars
  67. | oo_select_keys(groups['oo_nodes_to_config'])
  68. | oo_collect(attribute='inventory_hostname', filters={'node_certs_missing':True}) }}"
  69. delegate_to: "{{ openshift_ca_host }}"
  70. run_once: true
  71. - name: Generate the node server certificate
  72. command: >
  73. {{ hostvars[openshift_ca_host].openshift.common.client_binary }} adm ca create-server-cert
  74. --cert={{ openshift_generated_configs_dir }}/node-{{ hostvars[item].openshift.common.hostname }}/server.crt
  75. --key={{ openshift_generated_configs_dir }}/node-{{ hostvars[item].openshift.common.hostname }}/server.key
  76. --expire-days={{ openshift_node_cert_expire_days }}
  77. --overwrite=true
  78. --hostnames={{ hostvars[item].openshift.common.hostname }},{{ hostvars[item].openshift.common.public_hostname }},{{ hostvars[item].openshift.common.ip }},{{ hostvars[item].openshift.common.public_ip }}
  79. --signer-cert={{ openshift_ca_cert }}
  80. --signer-key={{ openshift_ca_key }}
  81. --signer-serial={{ openshift_ca_serial }}
  82. args:
  83. creates: "{{ openshift_generated_configs_dir }}/node-{{ hostvars[item].openshift.common.hostname }}/server.crt"
  84. with_items: "{{ hostvars
  85. | oo_select_keys(groups['oo_nodes_to_config'])
  86. | oo_collect(attribute='inventory_hostname', filters={'node_certs_missing':True}) }}"
  87. delegate_to: "{{ openshift_ca_host }}"
  88. run_once: true
  89. - name: Create local temp directory for syncing certs
  90. local_action: command mktemp -d /tmp/openshift-ansible-XXXXXXX
  91. register: node_cert_mktemp
  92. changed_when: False
  93. when: node_certs_missing | bool
  94. become: no
  95. - name: Create a tarball of the node config directories
  96. command: >
  97. tar -czvf {{ openshift_node_generated_config_dir }}.tgz
  98. --transform 's|system:{{ openshift_node_cert_subdir }}|node|'
  99. -C {{ openshift_node_generated_config_dir }} .
  100. args:
  101. creates: "{{ openshift_node_generated_config_dir }}.tgz"
  102. # Disables the following warning:
  103. # Consider using unarchive module rather than running tar
  104. warn: no
  105. when: node_certs_missing | bool
  106. delegate_to: "{{ openshift_ca_host }}"
  107. - name: Retrieve the node config tarballs from the master
  108. fetch:
  109. src: "{{ openshift_node_generated_config_dir }}.tgz"
  110. dest: "{{ node_cert_mktemp.stdout }}/"
  111. flat: yes
  112. fail_on_missing: yes
  113. validate_checksum: yes
  114. when: node_certs_missing | bool
  115. delegate_to: "{{ openshift_ca_host }}"
  116. - name: Ensure certificate directory exists
  117. file:
  118. path: "{{ openshift_node_cert_dir }}"
  119. state: directory
  120. when: node_certs_missing | bool
  121. - name: Unarchive the tarball on the node
  122. unarchive:
  123. src: "{{ node_cert_mktemp.stdout }}/{{ openshift_node_cert_subdir }}.tgz"
  124. dest: "{{ openshift_node_cert_dir }}"
  125. when: node_certs_missing | bool
  126. - name: Delete local temp directory
  127. local_action: file path="{{ node_cert_mktemp.stdout }}" state=absent
  128. changed_when: False
  129. when: node_certs_missing | bool
  130. become: no
  131. - name: Copy OpenShift CA to system CA trust
  132. copy:
  133. src: "{{ item.cert }}"
  134. dest: "/etc/pki/ca-trust/source/anchors/{{ item.id }}-{{ item.cert | basename }}"
  135. remote_src: yes
  136. with_items:
  137. - id: openshift
  138. cert: "{{ openshift_node_cert_dir }}/ca.crt"
  139. notify:
  140. - update ca trust