secure.yml 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111
  1. ---
  2. - name: Include reencrypt route configuration
  3. include_tasks: secure/reencrypt.yml
  4. when: openshift_hosted_registry_routetermination == 'reencrypt'
  5. - name: Include passthrough route configuration
  6. include_tasks: secure/passthrough.yml
  7. when: openshift_hosted_registry_routetermination == 'passthrough'
  8. - name: Fetch the docker-registry route
  9. oc_route:
  10. name: docker-registry
  11. namespace: default
  12. state: list
  13. register: docker_registry_route
  14. - name: Retrieve registry service for the clusterip
  15. oc_service:
  16. namespace: "{{ openshift_hosted_registry_namespace }}"
  17. name: docker-registry
  18. state: list
  19. register: docker_registry_service
  20. - name: Generate self-signed docker-registry certificates
  21. oc_adm_ca_server_cert:
  22. signer_cert: "{{ openshift_master_config_dir }}/ca.crt"
  23. signer_key: "{{ openshift_master_config_dir }}/ca.key"
  24. signer_serial: "{{ openshift_master_config_dir }}/ca.serial.txt"
  25. hostnames:
  26. - "{{ docker_registry_service.results.clusterip }}"
  27. - "{{ docker_registry_route.results[0].spec.host }}"
  28. - "{{ openshift_hosted_registry_name }}.default.svc"
  29. - "{{ openshift_hosted_registry_name }}.default.svc.{{ openshift_cluster_domain }}"
  30. - "{{ openshift_hosted_registry_routehost | default(omit) }}"
  31. cert: "{{ docker_registry_cert_path }}"
  32. key: "{{ docker_registry_key_path }}"
  33. expire_days: "{{ openshift_hosted_registry_cert_expire_days }}"
  34. register: registry_self_cert
  35. when: docker_registry_self_signed
  36. # Setting up REGISTRY_HTTP_TLS_CLIENTCAS as the cacert doesn't seem to work.
  37. # If we need to set up a cacert, bundle it with the cert.
  38. - when: docker_registry_cacert_path is defined
  39. block:
  40. - name: Retrieve certificate files to generate certificate bundle
  41. slurp:
  42. src: "{{ item }}"
  43. with_items:
  44. - "{{ docker_registry_cert_path }}"
  45. - "{{ docker_registry_cacert_path }}"
  46. register: certificate_files
  47. - name: Generate certificate bundle
  48. copy:
  49. content: "{{ certificate_files.results | map(attribute='content') | map('b64decode') | join('') }}"
  50. dest: "{{ openshift_master_config_dir }}/named_certificates/docker-registry.pem"
  51. - name: Reset the certificate path to use the bundle
  52. set_fact:
  53. docker_registry_cert_path: "{{ openshift_master_config_dir }}/named_certificates/docker-registry.pem"
  54. - name: Create the secret for the registry certificates
  55. oc_secret:
  56. name: registry-certificates
  57. namespace: "{{ openshift_hosted_registry_namespace }}"
  58. files:
  59. - name: registry.crt
  60. path: "{{ docker_registry_cert_path }}"
  61. - name: registry.key
  62. path: "{{ docker_registry_key_path }}"
  63. register: create_registry_certificates_secret_out
  64. - name: Add the secret to the registry's pod service accounts
  65. oc_serviceaccount_secret:
  66. service_account: "{{ item }}"
  67. secret: registry-certificates
  68. namespace: "{{ openshift_hosted_registry_namespace }}"
  69. with_items:
  70. - registry
  71. - default
  72. - name: Set facts for secure registry
  73. set_fact:
  74. registry_secure_volume_mounts:
  75. - name: registry-certificates
  76. path: /etc/secrets
  77. type: secret
  78. secret_name: registry-certificates
  79. registry_secure_env_vars:
  80. REGISTRY_HTTP_TLS_CERTIFICATE: /etc/secrets/registry.crt
  81. REGISTRY_HTTP_TLS_KEY: /etc/secrets/registry.key
  82. registry_secure_edits:
  83. - key: spec.template.spec.containers[0].livenessProbe.httpGet.scheme
  84. value: HTTPS
  85. action: put
  86. - key: spec.template.spec.containers[0].readinessProbe.httpGet.scheme
  87. value: HTTPS
  88. action: put
  89. - name: Detect if there has been certificate changes
  90. set_fact:
  91. registry_cert_changed: true
  92. when: ( registry_self_cert is defined and registry_self_cert.changed ) or
  93. create_registry_certificates_secret_out.changed
  94. - name: Update openshift_hosted facts with secure registry variables
  95. set_fact:
  96. openshift_hosted_registry_volumes: "{{ openshift_hosted_registry_volumes | union(registry_secure_volume_mounts) }}"
  97. openshift_hosted_registry_env_vars: "{{ openshift_hosted_registry_env_vars | combine(registry_secure_env_vars) }}"
  98. openshift_hosted_registry_edits: "{{ openshift_hosted_registry_edits | union(registry_secure_edits) }}"
  99. openshift_hosted_registry_force: "{{ openshift_hosted_registry_force | union([registry_cert_changed | default(false)]) }}"