main.yml 4.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137
  1. ---
  2. - name: Ensure CA certificate exists on openshift_ca_host
  3. stat:
  4. path: "{{ openshift_ca_cert }}"
  5. register: g_ca_cert_stat_result
  6. delegate_to: "{{ openshift_ca_host }}"
  7. run_once: true
  8. - fail:
  9. msg: >
  10. CA certificate {{ openshift_ca_cert }} doesn't exist on CA host
  11. {{ openshift_ca_host }}. Apply 'openshift_ca' role to
  12. {{ openshift_ca_host }}.
  13. when: not g_ca_cert_stat_result.stat.exists | bool
  14. run_once: true
  15. - name: Check status of node certificates
  16. stat:
  17. path: "{{ openshift.common.config_base }}/node/{{ item }}"
  18. with_items:
  19. - "system:node:{{ openshift.common.hostname }}.crt"
  20. - "system:node:{{ openshift.common.hostname }}.key"
  21. - "system:node:{{ openshift.common.hostname }}.kubeconfig"
  22. - ca.crt
  23. - server.key
  24. - server.crt
  25. register: g_node_cert_stat_result
  26. when: not openshift_certificates_redeploy | default(false) | bool
  27. - set_fact:
  28. node_certs_missing: "{{ true if openshift_certificates_redeploy | default(false) | bool
  29. else (False in (g_node_cert_stat_result.results
  30. | default({})
  31. | oo_collect(attribute='stat.exists')
  32. | list)) }}"
  33. - name: Create openshift_generated_configs_dir if it does not exist
  34. file:
  35. path: "{{ openshift_generated_configs_dir }}"
  36. state: directory
  37. mode: 0700
  38. when: node_certs_missing | bool
  39. delegate_to: "{{ openshift_ca_host }}"
  40. - name: Generate the node client config
  41. command: >
  42. {{ openshift.common.admin_binary }} create-api-client-config
  43. {% for named_ca_certificate in hostvars[openshift_ca_host].openshift.master.named_certificates | default([]) | oo_collect('cafile') %}
  44. --certificate-authority {{ named_ca_certificate }}
  45. {% endfor %}
  46. --certificate-authority={{ openshift_ca_cert }}
  47. --client-dir={{ openshift_node_generated_config_dir }}
  48. --groups=system:nodes
  49. --master={{ hostvars[openshift_ca_host].openshift.master.api_url }}
  50. --signer-cert={{ openshift_ca_cert }}
  51. --signer-key={{ openshift_ca_key }}
  52. --signer-serial={{ openshift_ca_serial }}
  53. --user=system:node:{{ openshift.common.hostname }}
  54. args:
  55. creates: "{{ openshift_node_generated_config_dir }}"
  56. when: node_certs_missing | bool
  57. delegate_to: "{{ openshift_ca_host }}"
  58. - name: Generate the node server certificate
  59. command: >
  60. {{ openshift.common.admin_binary }} ca create-server-cert
  61. --cert={{ openshift_node_generated_config_dir }}/server.crt
  62. --key={{ openshift_generated_configs_dir }}/node-{{ openshift.common.hostname }}/server.key
  63. --overwrite=true
  64. --hostnames={{ openshift.common.all_hostnames |join(",") }}
  65. --signer-cert={{ openshift_ca_cert }}
  66. --signer-key={{ openshift_ca_key }}
  67. --signer-serial={{ openshift_ca_serial }}
  68. args:
  69. creates: "{{ openshift_node_generated_config_dir }}/server.crt"
  70. when: node_certs_missing | bool
  71. delegate_to: "{{ openshift_ca_host}}"
  72. - name: Create local temp directory for syncing certs
  73. local_action: command mktemp -d /tmp/openshift-ansible-XXXXXXX
  74. register: node_cert_mktemp
  75. changed_when: False
  76. when: node_certs_missing | bool
  77. delegate_to: localhost
  78. become: no
  79. - name: Create a tarball of the node config directories
  80. command: >
  81. tar -czvf {{ openshift_node_generated_config_dir }}.tgz
  82. --transform 's|system:{{ openshift_node_cert_subdir }}|node|'
  83. -C {{ openshift_node_generated_config_dir }} .
  84. args:
  85. creates: "{{ openshift_node_generated_config_dir }}.tgz"
  86. # Disables the following warning:
  87. # Consider using unarchive module rather than running tar
  88. warn: no
  89. when: node_certs_missing | bool
  90. delegate_to: "{{ openshift_ca_host }}"
  91. - name: Retrieve the node config tarballs from the master
  92. fetch:
  93. src: "{{ openshift_node_generated_config_dir }}.tgz"
  94. dest: "{{ node_cert_mktemp.stdout }}/"
  95. flat: yes
  96. fail_on_missing: yes
  97. validate_checksum: yes
  98. when: node_certs_missing | bool
  99. delegate_to: "{{ openshift_ca_host }}"
  100. - name: Ensure certificate directory exists
  101. file:
  102. path: "{{ openshift_node_cert_dir }}"
  103. state: directory
  104. when: node_certs_missing | bool
  105. - name: Unarchive the tarball on the node
  106. unarchive:
  107. src: "{{ node_cert_mktemp.stdout }}/{{ openshift_node_cert_subdir }}.tgz"
  108. dest: "{{ openshift_node_cert_dir }}"
  109. when: node_certs_missing | bool
  110. - file: name={{ node_cert_mktemp.stdout }} state=absent
  111. changed_when: False
  112. when: node_certs_missing | bool
  113. delegate_to: localhost
  114. become: no
  115. - name: Copy OpenShift CA to system CA trust
  116. copy:
  117. src: "{{ item.cert }}"
  118. dest: "/etc/pki/ca-trust/source/anchors/{{ item.id }}-{{ item.cert | basename }}"
  119. remote_src: yes
  120. with_items:
  121. - id: openshift
  122. cert: "{{ openshift_node_cert_dir }}/ca.crt"
  123. notify:
  124. - update ca trust