main.yml 8.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218
  1. ---
  2. - name: Check status of master certificates
  3. stat:
  4. path: "{{ openshift_master_config_dir }}/{{ item }}"
  5. with_items:
  6. - admin.crt
  7. - ca.crt
  8. - ca-bundle.crt
  9. - master.kubelet-client.crt
  10. - master.proxy-client.crt
  11. - master.server.crt
  12. - openshift-master.crt
  13. - service-signer.crt
  14. register: g_master_cert_stat_result
  15. when: not openshift_certificates_redeploy | default(false) | bool
  16. - set_fact:
  17. master_certs_missing: "{{ true if openshift_certificates_redeploy | default(false) | bool
  18. else (False in (g_master_cert_stat_result.results
  19. | default({})
  20. | lib_utils_oo_collect(attribute='stat.exists')
  21. | list)) }}"
  22. - name: Ensure the generated_configs directory present
  23. file:
  24. path: "{{ openshift_master_generated_config_dir }}"
  25. state: directory
  26. mode: 0700
  27. when: master_certs_missing | bool and inventory_hostname != openshift_ca_host
  28. delegate_to: "{{ openshift_ca_host }}"
  29. - find:
  30. paths: "{{ openshift_master_config_dir }}/legacy-ca/"
  31. patterns: ".*-ca.crt"
  32. use_regex: true
  33. register: g_master_legacy_ca_result
  34. delegate_to: "{{ openshift_ca_host }}"
  35. - name: Create the master server certificate
  36. command: >
  37. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm ca create-server-cert
  38. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | lib_utils_oo_collect('cafile') %}
  39. --certificate-authority {{ named_ca_certificate }}
  40. {% endfor %}
  41. {% for legacy_ca_certificate in g_master_legacy_ca_result.files | default([]) | lib_utils_oo_collect('path') %}
  42. --certificate-authority {{ legacy_ca_certificate }}
  43. {% endfor %}
  44. --hostnames={{ hostvars[item].openshift.common.all_hostnames | join(',') }}
  45. --cert={{ openshift_generated_configs_dir }}/master-{{ hostvars[item].openshift.common.hostname }}/master.server.crt
  46. --key={{ openshift_generated_configs_dir }}/master-{{ hostvars[item].openshift.common.hostname }}/master.server.key
  47. --expire-days={{ openshift_master_cert_expire_days }}
  48. --signer-cert={{ openshift_ca_cert }}
  49. --signer-key={{ openshift_ca_key }}
  50. --signer-serial={{ openshift_ca_serial }}
  51. --overwrite=false
  52. when: item != openshift_ca_host
  53. with_items: "{{ hostvars
  54. | lib_utils_oo_select_keys(groups['oo_masters_to_config'])
  55. | lib_utils_oo_collect(attribute='inventory_hostname', filters={'master_certs_missing':True}) }}"
  56. delegate_to: "{{ openshift_ca_host }}"
  57. run_once: true
  58. - name: Generate the loopback master client config
  59. command: >
  60. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm create-api-client-config
  61. --certificate-authority={{ openshift_ca_cert }}
  62. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | lib_utils_oo_collect('cafile') %}
  63. --certificate-authority {{ named_ca_certificate }}
  64. {% endfor %}
  65. --client-dir={{ openshift_generated_configs_dir }}/master-{{ hostvars[item].openshift.common.hostname }}
  66. --groups=system:masters,system:openshift-master
  67. --master={{ hostvars[item].openshift.master.loopback_api_url }}
  68. --public-master={{ hostvars[item].openshift.master.loopback_api_url }}
  69. --signer-cert={{ openshift_ca_cert }}
  70. --signer-key={{ openshift_ca_key }}
  71. --signer-serial={{ openshift_ca_serial }}
  72. --user=system:openshift-master
  73. --basename=openshift-master
  74. --expire-days={{ openshift_master_cert_expire_days }}
  75. args:
  76. creates: "{{ openshift_generated_configs_dir }}/master-{{ hostvars[item].openshift.common.hostname }}/openshift-master.kubeconfig"
  77. with_items: "{{ hostvars
  78. | lib_utils_oo_select_keys(groups['oo_masters_to_config'])
  79. | lib_utils_oo_collect(attribute='inventory_hostname', filters={'master_certs_missing':True}) }}"
  80. when: item != openshift_ca_host
  81. delegate_to: "{{ openshift_ca_host }}"
  82. run_once: true
  83. - file:
  84. src: "{{ openshift_master_config_dir }}/{{ item }}"
  85. dest: "{{ openshift_master_generated_config_dir }}/{{ item }}"
  86. state: hard
  87. force: true
  88. with_items:
  89. # certificates_to_synchronize is a custom filter in lib_utils
  90. - "{{ hostvars[inventory_hostname] | certificates_to_synchronize }}"
  91. when: master_certs_missing | bool and inventory_hostname != openshift_ca_host
  92. delegate_to: "{{ openshift_ca_host }}"
  93. - name: Remove generated etcd client certs when using external etcd
  94. file:
  95. path: "{{ openshift_master_generated_config_dir }}/{{ item }}"
  96. state: absent
  97. # Do we need this boolean here?
  98. when: openshift_master_etcd_hosts | length > 0
  99. with_items:
  100. - master.etcd-client.crt
  101. - master.etcd-client.key
  102. delegate_to: "{{ openshift_ca_host }}"
  103. - name: Create local temp directory for syncing certs
  104. local_action: command mktemp -d /tmp/openshift-ansible-XXXXXXX
  105. register: g_master_certs_mktemp
  106. changed_when: False
  107. when: master_certs_missing | bool
  108. - name: Chmod local temp directory for syncing certs
  109. local_action: command chmod 777 "{{ g_master_certs_mktemp.stdout }}"
  110. changed_when: False
  111. when: master_certs_missing | bool
  112. - name: Create a tarball of the master certs
  113. command: >
  114. tar -czvf {{ openshift_master_generated_config_dir }}.tgz
  115. -C {{ openshift_master_generated_config_dir }} .
  116. args:
  117. creates: "{{ openshift_master_generated_config_dir }}.tgz"
  118. when: master_certs_missing | bool and inventory_hostname != openshift_ca_host
  119. delegate_to: "{{ openshift_ca_host }}"
  120. - name: Retrieve the master cert tarball from the master
  121. fetch:
  122. src: "{{ openshift_master_generated_config_dir }}.tgz"
  123. dest: "{{ g_master_certs_mktemp.stdout }}/"
  124. flat: yes
  125. fail_on_missing: yes
  126. validate_checksum: yes
  127. when: master_certs_missing | bool and inventory_hostname != openshift_ca_host
  128. delegate_to: "{{ openshift_ca_host }}"
  129. - name: Ensure certificate directory exists
  130. file:
  131. path: "{{ openshift_master_config_dir }}"
  132. state: directory
  133. when: master_certs_missing | bool and inventory_hostname != openshift_ca_host
  134. - name: Unarchive the tarball on the master
  135. unarchive:
  136. src: "{{ g_master_certs_mktemp.stdout }}/{{ openshift_master_cert_subdir }}.tgz"
  137. dest: "{{ openshift_master_config_dir }}"
  138. when: master_certs_missing | bool and inventory_hostname != openshift_ca_host
  139. - name: Delete local temp directory
  140. local_action: file path="{{ g_master_certs_mktemp.stdout }}" state=absent
  141. changed_when: False
  142. when: master_certs_missing | bool
  143. - name: Lookup default group for ansible_ssh_user
  144. command: "/usr/bin/id -g {{ ansible_ssh_user | quote }}"
  145. changed_when: false
  146. register: _ansible_ssh_user_gid
  147. - set_fact:
  148. client_users: "{{ [ansible_ssh_user, 'root'] | unique }}"
  149. - name: Create the client config dir(s)
  150. file:
  151. path: "~{{ item }}/.kube"
  152. state: directory
  153. mode: 0700
  154. owner: "{{ item }}"
  155. group: "{{ 'root' if item == 'root' else _ansible_ssh_user_gid.stdout }}"
  156. with_items: "{{ client_users }}"
  157. # TODO: Update this file if the contents of the source file are not present in
  158. # the dest file, will need to make sure to ignore things that could be added
  159. - name: Copy the admin client config(s)
  160. copy:
  161. src: "{{ openshift_master_config_dir }}/admin.kubeconfig"
  162. dest: "~{{ item }}/.kube/config"
  163. remote_src: yes
  164. force: "{{ openshift_certificates_redeploy | default(false) }}"
  165. with_items: "{{ client_users }}"
  166. - name: Update the permissions on the admin client config(s)
  167. file:
  168. path: "~{{ item }}/.kube/config"
  169. state: file
  170. mode: 0700
  171. owner: "{{ item }}"
  172. group: "{{ 'root' if item == 'root' else _ansible_ssh_user_gid.stdout }}"
  173. with_items: "{{ client_users }}"
  174. # Ensure ca-bundle exists for 3.2+ configuration
  175. - name: Check for ca-bundle.crt
  176. stat:
  177. path: "{{ openshift.common.config_base }}/master/ca-bundle.crt"
  178. register: ca_bundle_stat
  179. failed_when: false
  180. - name: Check for ca.crt
  181. stat:
  182. path: "{{ openshift.common.config_base }}/master/ca.crt"
  183. register: ca_crt_stat
  184. failed_when: false
  185. - name: Migrate ca.crt to ca-bundle.crt
  186. command: mv ca.crt ca-bundle.crt
  187. args:
  188. chdir: "{{ openshift.common.config_base }}/master"
  189. when: ca_crt_stat.stat.isreg and not ca_bundle_stat.stat.exists
  190. - name: Link ca.crt to ca-bundle.crt
  191. file:
  192. src: "{{ openshift.common.config_base }}/master/ca-bundle.crt"
  193. path: "{{ openshift.common.config_base }}/master/ca.crt"
  194. state: link
  195. when: ca_crt_stat.stat.isreg and not ca_bundle_stat.stat.exists