redeploy-openshift-ca.yml 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298
  1. ---
  2. - name: Check cert expirys
  3. hosts: oo_nodes_to_config:oo_masters_to_config:oo_etcd_to_config
  4. vars:
  5. openshift_certificate_expiry_show_all: yes
  6. roles:
  7. # Sets 'check_results' per host which contains health status for
  8. # etcd, master and node certificates. We will use 'check_results'
  9. # to determine if any certificates were expired prior to running
  10. # this playbook. Service restarts will be skipped if any
  11. # certificates were previously expired.
  12. - role: openshift_certificate_expiry
  13. # Update master config when ca-bundle not referenced. Services will be
  14. # restarted below after new CA certificate has been distributed.
  15. - name: Ensure ca-bundle.crt is referenced in master configuration
  16. hosts: oo_masters_to_config
  17. tasks:
  18. - slurp:
  19. src: "{{ openshift.common.config_base }}/master/master-config.yaml"
  20. register: g_master_config_output
  21. - modify_yaml:
  22. dest: "{{ openshift.common.config_base }}/master/master-config.yaml"
  23. yaml_key: kubeletClientInfo.ca
  24. yaml_value: ca-bundle.crt
  25. when: (g_master_config_output.content|b64decode|from_yaml).kubeletClientInfo.ca != 'ca-bundle.crt'
  26. - modify_yaml:
  27. dest: "{{ openshift.common.config_base }}/master/master-config.yaml"
  28. yaml_key: serviceAccountConfig.masterCA
  29. yaml_value: ca-bundle.crt
  30. when: (g_master_config_output.content|b64decode|from_yaml).serviceAccountConfig.masterCA != 'ca-bundle.crt'
  31. - modify_yaml:
  32. dest: "{{ openshift.common.config_base }}/master/master-config.yaml"
  33. yaml_key: oauthConfig.masterCA
  34. yaml_value: ca-bundle.crt
  35. when: (g_master_config_output.content|b64decode|from_yaml).oauthConfig.masterCA != 'ca-bundle.crt'
  36. - modify_yaml:
  37. dest: "{{ openshift.common.config_base }}/master/master-config.yaml"
  38. yaml_key: etcdClientInfo.ca
  39. yaml_value: ca-bundle.crt
  40. when:
  41. - groups.oo_etcd_to_config | default([]) | length == 0
  42. - (g_master_config_output.content|b64decode|from_yaml).etcdClientInfo.ca != 'ca-bundle.crt'
  43. - modify_yaml:
  44. dest: "{{ openshift.common.config_base }}/master/master-config.yaml"
  45. yaml_key: etcdConfig.peerServingInfo.clientCA
  46. yaml_value: ca-bundle.crt
  47. when:
  48. - groups.oo_etcd_to_config | default([]) | length == 0
  49. - (g_master_config_output.content|b64decode|from_yaml).etcdConfig.peerServingInfo.clientCA != 'ca-bundle.crt'
  50. - modify_yaml:
  51. dest: "{{ openshift.common.config_base }}/master/master-config.yaml"
  52. yaml_key: etcdConfig.servingInfo.clientCA
  53. yaml_value: ca-bundle.crt
  54. when:
  55. - groups.oo_etcd_to_config | default([]) | length == 0
  56. - (g_master_config_output.content|b64decode|from_yaml).etcdConfig.servingInfo.clientCA != 'ca-bundle.crt'
  57. # Set servingInfo.clientCA to client-ca-bundle.crt in order to roll the CA certificate.
  58. # This change will be reverted in playbooks/redeploy-certificates.yml
  59. - modify_yaml:
  60. dest: "{{ openshift.common.config_base }}/master/master-config.yaml"
  61. yaml_key: servingInfo.clientCA
  62. yaml_value: client-ca-bundle.crt
  63. when: (g_master_config_output.content|b64decode|from_yaml).servingInfo.clientCA != 'client-ca-bundle.crt'
  64. - name: Copy current OpenShift CA to legacy directory
  65. hosts: oo_masters_to_config
  66. pre_tasks:
  67. - name: Create legacy-ca directory
  68. file:
  69. path: "{{ openshift.common.config_base }}/master/legacy-ca"
  70. state: directory
  71. mode: 0700
  72. owner: root
  73. group: root
  74. - command: mktemp -u XXXXXX
  75. register: g_legacy_ca_mktemp
  76. changed_when: false
  77. # Copy CA certificate, key, serial and bundle to legacy-ca with a
  78. # prefix generated by mktemp, ie. XXXXXX-ca.crt.
  79. #
  80. # The following roles will pick up all CA certificates matching
  81. # /.*-ca.crt/ in the legacy-ca directory and ensure they are present
  82. # in the OpenShift CA bundle.
  83. # - openshift_ca
  84. # - openshift_master_certificates
  85. # - openshift_node_certificates
  86. - name: Copy current OpenShift CA to legacy directory
  87. copy:
  88. src: "{{ openshift.common.config_base }}/master/{{ item }}"
  89. dest: "{{ openshift.common.config_base }}/master/legacy-ca/{{ g_legacy_ca_mktemp.stdout }}-{{ item }}"
  90. remote_src: true
  91. # It is possible that redeploying failed and files may be missing.
  92. # Ignore errors in this case. Files should have been copied to
  93. # legacy-ca directory in previous run.
  94. ignore_errors: true
  95. with_items:
  96. - "ca.crt"
  97. - "ca.key"
  98. - "ca.serial.txt"
  99. - "ca-bundle.crt"
  100. - name: Create temporary directory for creating new CA certificate
  101. hosts: oo_first_master
  102. tasks:
  103. - name: Create temporary directory for creating new CA certificate
  104. command: >
  105. mktemp -d /tmp/openshift-ansible-XXXXXXX
  106. register: g_new_openshift_ca_mktemp
  107. changed_when: false
  108. - name: Create OpenShift CA
  109. hosts: oo_first_master
  110. vars:
  111. # Set openshift_ca_config_dir to a temporary directory where CA
  112. # will be created. We'll replace the existing CA with the CA
  113. # created in the temporary directory.
  114. openshift_ca_config_dir: "{{ hostvars[groups.oo_first_master.0].g_new_openshift_ca_mktemp.stdout }}"
  115. roles:
  116. - role: openshift_master_facts
  117. - role: openshift_named_certificates
  118. - role: openshift_ca
  119. openshift_ca_host: "{{ groups.oo_first_master.0 }}"
  120. - name: Create temp directory for syncing certs
  121. hosts: localhost
  122. connection: local
  123. gather_facts: no
  124. tasks:
  125. - name: Create local temp directory for syncing certs
  126. local_action: command mktemp -d /tmp/openshift-ansible-XXXXXXX
  127. register: g_master_mktemp
  128. changed_when: false
  129. - name: Retrieve OpenShift CA
  130. hosts: oo_first_master
  131. vars:
  132. openshift_ca_host: "{{ groups.oo_first_master.0 }}"
  133. tasks:
  134. - name: Retrieve CA certificate, key, bundle and serial
  135. fetch:
  136. src: "{{ hostvars[openshift_ca_host].g_new_openshift_ca_mktemp.stdout }}/{{ item }}"
  137. dest: "{{ hostvars['localhost'].g_master_mktemp.stdout }}/"
  138. flat: yes
  139. fail_on_missing: yes
  140. validate_checksum: yes
  141. with_items:
  142. - ca.crt
  143. - ca.key
  144. - ca-bundle.crt
  145. - ca.serial.txt
  146. - client-ca-bundle.crt
  147. delegate_to: "{{ openshift_ca_host }}"
  148. run_once: true
  149. changed_when: false
  150. - name: Distribute OpenShift CA to masters
  151. hosts: oo_masters_to_config
  152. vars:
  153. openshift_ca_host: "{{ groups.oo_first_master.0 }}"
  154. tasks:
  155. - name: Deploy CA certificate, key, bundle and serial
  156. copy:
  157. src: "{{ hostvars['localhost'].g_master_mktemp.stdout }}/{{ item }}"
  158. dest: "{{ openshift.common.config_base }}/master/"
  159. with_items:
  160. - ca.crt
  161. - ca.key
  162. - ca-bundle.crt
  163. - ca.serial.txt
  164. - client-ca-bundle.crt
  165. - name: Update master client kubeconfig CA data
  166. kubeclient_ca:
  167. client_path: "{{ openshift.common.config_base }}/master/openshift-master.kubeconfig"
  168. ca_path: "{{ openshift.common.config_base }}/master/ca-bundle.crt"
  169. - name: Update admin client kubeconfig CA data
  170. kubeclient_ca:
  171. client_path: "{{ openshift.common.config_base }}/master/admin.kubeconfig"
  172. ca_path: "{{ openshift.common.config_base }}/master/ca-bundle.crt"
  173. - name: Lookup default group for ansible_ssh_user
  174. command: "/usr/bin/id -g {{ ansible_ssh_user | quote }}"
  175. changed_when: false
  176. register: _ansible_ssh_user_gid
  177. - set_fact:
  178. client_users: "{{ [ansible_ssh_user, 'root'] | unique }}"
  179. - name: Create the client config dir(s)
  180. file:
  181. path: "~{{ item }}/.kube"
  182. state: directory
  183. mode: 0700
  184. owner: "{{ item }}"
  185. group: "{{ 'root' if item == 'root' else _ansible_ssh_user_gid.stdout }}"
  186. with_items: "{{ client_users }}"
  187. - name: Copy the admin client config(s)
  188. copy:
  189. src: "{{ openshift.common.config_base }}/master/admin.kubeconfig"
  190. dest: "~{{ item }}/.kube/config"
  191. remote_src: yes
  192. with_items: "{{ client_users }}"
  193. - name: Update the permissions on the admin client config(s)
  194. file:
  195. path: "~{{ item }}/.kube/config"
  196. state: file
  197. mode: 0700
  198. owner: "{{ item }}"
  199. group: "{{ 'root' if item == 'root' else _ansible_ssh_user_gid.stdout }}"
  200. with_items: "{{ client_users }}"
  201. - import_playbook: restart.yml
  202. # Do not restart masters when master or etcd certificates were previously expired.
  203. when:
  204. # masters
  205. - ('expired' not in hostvars
  206. | lib_utils_oo_select_keys(groups['oo_masters_to_config'])
  207. | lib_utils_oo_collect('check_results.check_results.ocp_certs')
  208. | lib_utils_oo_collect('health', {'path':hostvars[groups.oo_first_master.0].openshift.common.config_base ~ "/master/master.server.crt"}))
  209. - ('expired' not in hostvars
  210. | lib_utils_oo_select_keys(groups['oo_masters_to_config'])
  211. | lib_utils_oo_collect('check_results.check_results.ocp_certs')
  212. | lib_utils_oo_collect('health', {'path':hostvars[groups.oo_first_master.0].openshift.common.config_base ~ "/master/ca-bundle.crt"}))
  213. # etcd
  214. - ('expired' not in (hostvars
  215. | lib_utils_oo_select_keys(groups['etcd'])
  216. | lib_utils_oo_collect('check_results.check_results.etcd')
  217. | lib_utils_oo_collect('health')))
  218. - name: Distribute OpenShift CA certificate to nodes
  219. hosts: oo_nodes_to_config
  220. vars:
  221. openshift_ca_host: "{{ groups.oo_first_master.0 }}"
  222. tasks:
  223. - copy:
  224. src: "{{ hostvars['localhost'].g_master_mktemp.stdout }}/ca-bundle.crt"
  225. dest: "{{ openshift.common.config_base }}/node/ca.crt"
  226. - name: Copy OpenShift CA to system CA trust
  227. copy:
  228. src: "{{ item.cert }}"
  229. dest: "/etc/pki/ca-trust/source/anchors/{{ item.id }}-{{ item.cert | basename }}"
  230. remote_src: yes
  231. with_items:
  232. - id: openshift
  233. cert: "{{ openshift.common.config_base }}/node/ca.crt"
  234. notify:
  235. - update ca trust
  236. - name: Update node client kubeconfig CA data
  237. kubeclient_ca:
  238. client_path: "{{ openshift.common.config_base }}/node/system:node:{{ openshift.common.hostname }}.kubeconfig"
  239. ca_path: "{{ openshift.common.config_base }}/node/ca.crt"
  240. handlers:
  241. # Normally this handler would restart docker after updating ca
  242. # trust. We'll do that when we restart nodes to avoid restarting
  243. # docker on all nodes in parallel.
  244. - name: update ca trust
  245. command: update-ca-trust
  246. - name: Delete temporary directory on CA host
  247. hosts: oo_first_master
  248. tasks:
  249. - file:
  250. path: "{{ g_new_openshift_ca_mktemp.stdout }}"
  251. state: absent
  252. - name: Delete temporary directory on localhost
  253. hosts: localhost
  254. connection: local
  255. gather_facts: no
  256. tasks:
  257. - file:
  258. name: "{{ g_master_mktemp.stdout }}"
  259. state: absent
  260. changed_when: false
  261. - import_playbook: ../../openshift-node/private/restart.yml
  262. # Do not restart nodes when node, master or etcd certificates were previously expired.
  263. when:
  264. # nodes
  265. - ('expired' not in hostvars
  266. | lib_utils_oo_select_keys(groups['oo_nodes_to_config'])
  267. | lib_utils_oo_collect('check_results.check_results.ocp_certs')
  268. | lib_utils_oo_collect('health', {'path':hostvars[groups.oo_nodes_to_config.0].openshift.common.config_base ~ "/node/server.crt"}))
  269. - ('expired' not in hostvars
  270. | lib_utils_oo_select_keys(groups['oo_nodes_to_config'])
  271. | lib_utils_oo_collect('check_results.check_results.ocp_certs')
  272. | lib_utils_oo_collect('health', {'path':hostvars[groups.oo_nodes_to_config.0].openshift.common.config_base ~ "/node/ca.crt"}))
  273. # masters
  274. - ('expired' not in hostvars
  275. | lib_utils_oo_select_keys(groups['oo_masters_to_config'])
  276. | lib_utils_oo_collect('check_results.check_results.ocp_certs')
  277. | lib_utils_oo_collect('health', {'path':hostvars[groups.oo_first_master.0].openshift.common.config_base ~ "/master/master.server.crt"}))
  278. - ('expired' not in hostvars
  279. | lib_utils_oo_select_keys(groups['oo_masters_to_config'])
  280. | lib_utils_oo_collect('check_results.check_results.ocp_certs')
  281. | lib_utils_oo_collect('health', {'path':hostvars[groups.oo_first_master.0].openshift.common.config_base ~ "/master/ca-bundle.crt"}))
  282. # etcd
  283. - ('expired' not in (hostvars
  284. | lib_utils_oo_select_keys(groups['etcd'])
  285. | lib_utils_oo_collect('check_results.check_results.etcd')
  286. | lib_utils_oo_collect('health')))