main.yml 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266
  1. ---
  2. - fail:
  3. msg: "Both 'certfile' and 'keyfile' keys must be supplied when configuring openshift_master_ca_certificate"
  4. when: openshift_master_ca_certificate is defined and ('certfile' not in openshift_master_ca_certificate or 'keyfile' not in openshift_master_ca_certificate)
  5. - name: Install the base package for admin tooling
  6. package:
  7. name: "{{ openshift_service_type }}{{ openshift_pkg_version | default('') | lib_utils_oo_image_tag_to_rpm_version(include_dash=True) }}"
  8. state: present
  9. when: not openshift_is_containerized | bool
  10. register: install_result
  11. until: install_result is succeeded
  12. delegate_to: "{{ openshift_ca_host }}"
  13. run_once: true
  14. - name: Reload generated facts
  15. openshift_facts:
  16. when:
  17. - hostvars[openshift_ca_host].install_result | default({'changed':false}) is changed
  18. - name: Create openshift_ca_config_dir if it does not exist
  19. file:
  20. path: "{{ openshift_ca_config_dir }}"
  21. state: directory
  22. delegate_to: "{{ openshift_ca_host }}"
  23. run_once: true
  24. - name: Determine if CA must be created
  25. stat:
  26. path: "{{ openshift_ca_config_dir }}/{{ item }}"
  27. register: g_master_ca_stat_result
  28. with_items:
  29. - ca-bundle.crt
  30. - ca.crt
  31. - ca.key
  32. delegate_to: "{{ openshift_ca_host }}"
  33. run_once: true
  34. - name: Determine if front-proxy CA must be created
  35. stat:
  36. path: "{{ openshift_ca_config_dir }}/{{ item }}"
  37. register: g_master_front_proxy_ca_stat_result
  38. with_items:
  39. - front-proxy-ca.crt
  40. - front-proxy-ca.key
  41. delegate_to: "{{ openshift_ca_host }}"
  42. run_once: true
  43. - set_fact:
  44. master_ca_missing: "{{ False in (g_master_ca_stat_result.results
  45. | lib_utils_oo_collect(attribute='stat.exists')
  46. | list) }}"
  47. master_front_proxy_ca_missing: "{{ False in (g_master_front_proxy_ca_stat_result.results
  48. | lib_utils_oo_collect(attribute='stat.exists')
  49. | list) }}"
  50. run_once: true
  51. - name: Retain original serviceaccount keys
  52. copy:
  53. src: "{{ item }}"
  54. dest: "{{ item }}.keep"
  55. remote_src: true
  56. with_items:
  57. - "{{ openshift_ca_config_dir }}/serviceaccounts.private.key"
  58. - "{{ openshift_ca_config_dir }}/serviceaccounts.public.key"
  59. when: openshift_certificates_redeploy | default(false) | bool
  60. - name: Deploy master ca certificate
  61. copy:
  62. src: "{{ item.src }}"
  63. dest: "{{ openshift_ca_config_dir }}/{{ item.dest }}"
  64. force: no
  65. with_items:
  66. - src: "{{ (openshift_master_ca_certificate | default({'certfile':none})).certfile }}"
  67. dest: ca.crt
  68. - src: "{{ (openshift_master_ca_certificate | default({'keyfile':none})).keyfile }}"
  69. dest: ca.key
  70. when: openshift_master_ca_certificate is defined
  71. delegate_to: "{{ openshift_ca_host }}"
  72. run_once: true
  73. - name: Create ca serial
  74. copy:
  75. content: "00"
  76. dest: "{{ openshift_ca_config_dir }}/ca.serial.txt"
  77. force: "{{ openshift_certificates_redeploy | default(false) | bool }}"
  78. when: openshift_master_ca_certificate is defined
  79. delegate_to: "{{ openshift_ca_host }}"
  80. run_once: true
  81. - find:
  82. paths: "{{ openshift.common.config_base }}/master/legacy-ca/"
  83. patterns: ".*-ca.crt"
  84. use_regex: true
  85. register: g_master_legacy_ca_result
  86. # This should NOT replace the CA due to --overwrite=false when a CA already exists.
  87. - name: Create the front-proxy CA if it does not already exist
  88. command: >
  89. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm ca create-signer-cert
  90. --cert="{{ openshift_ca_config_dir }}/front-proxy-ca.crt"
  91. --key="{{ openshift_ca_config_dir }}/front-proxy-ca.key"
  92. --serial="{{ openshift_ca_config_dir }}/ca.serial.txt"
  93. --expire-days={{ openshift_ca_cert_expire_days }}
  94. --overwrite=false
  95. when: master_front_proxy_ca_missing | bool or openshift_certificates_redeploy | default(false) | bool
  96. delegate_to: "{{ openshift_ca_host }}"
  97. run_once: true
  98. # This should NOT replace the CA due to --overwrite=false when a CA already exists.
  99. - name: Create the master certificates if they do not already exist
  100. command: >
  101. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm ca create-master-certs
  102. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | lib_utils_oo_collect('cafile') %}
  103. --certificate-authority {{ named_ca_certificate }}
  104. {% endfor %}
  105. {% for legacy_ca_certificate in g_master_legacy_ca_result.files | default([]) | lib_utils_oo_collect('path') %}
  106. --certificate-authority {{ legacy_ca_certificate }}
  107. {% endfor %}
  108. --hostnames={{ hostvars[openshift_ca_host].openshift.common.all_hostnames | join(',') }}
  109. --master={{ openshift.master.api_url }}
  110. --public-master={{ openshift.master.public_api_url }}
  111. --cert-dir={{ openshift_ca_config_dir }}
  112. --expire-days={{ openshift_master_cert_expire_days }}
  113. --signer-expire-days={{ openshift_ca_cert_expire_days }}
  114. --overwrite=false
  115. when: master_ca_missing | bool or openshift_certificates_redeploy | default(false) | bool
  116. delegate_to: "{{ openshift_ca_host }}"
  117. run_once: true
  118. # Create client-ca-bundle.crt containing old and new OpenShift CA
  119. # certificates. This bundle will be used when rolling the OpenShift CA
  120. # certificate.
  121. - name: Create client-ca-bundle.crt
  122. block:
  123. - command: mktemp -d /tmp/openshift-ansible-XXXXXX
  124. register: openshift_ca_clientconfig_tmpdir
  125. delegate_to: "{{ openshift_ca_host }}"
  126. - copy:
  127. src: "{{ item }}"
  128. dest: "{{ openshift_ca_clientconfig_tmpdir.stdout }}/"
  129. remote_src: true
  130. with_items: "{{ g_master_legacy_ca_result.files | default([]) | lib_utils_oo_collect('path') }}"
  131. delegate_to: "{{ openshift_ca_host }}"
  132. run_once: true
  133. - copy:
  134. src: "{{ openshift_ca_config_dir }}/ca.crt"
  135. dest: "{{ openshift_ca_clientconfig_tmpdir.stdout }}/"
  136. remote_src: true
  137. delegate_to: "{{ openshift_ca_host }}"
  138. run_once: true
  139. - assemble:
  140. src: "{{ openshift_ca_clientconfig_tmpdir.stdout }}"
  141. dest: "{{ openshift_ca_config_dir }}/client-ca-bundle.crt"
  142. mode: 0644
  143. owner: root
  144. group: root
  145. delegate_to: "{{ openshift_ca_host }}"
  146. run_once: true
  147. - name: Test local loopback context
  148. command: >
  149. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} config view
  150. --config={{ openshift_master_loopback_config }}
  151. changed_when: false
  152. register: loopback_config
  153. delegate_to: "{{ openshift_ca_host }}"
  154. run_once: true
  155. # create-api-client-config generates a ca.crt file which will
  156. # overwrite the OpenShift CA certificate. Generate the loopback
  157. # kubeconfig in a temporary directory and then copy files into the
  158. # master config dir to avoid overwriting ca.crt.
  159. - block:
  160. - name: Create temp directory for loopback master client config
  161. command: mktemp -d /tmp/openshift-ansible-XXXXXX
  162. register: openshift_ca_loopback_tmpdir
  163. - name: Generate the loopback master client config
  164. command: >
  165. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm create-api-client-config
  166. --certificate-authority={{ openshift_ca_cert }}
  167. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | lib_utils_oo_collect('cafile') %}
  168. --certificate-authority {{ named_ca_certificate }}
  169. {% endfor %}
  170. --client-dir={{ openshift_ca_loopback_tmpdir.stdout }}
  171. --groups=system:masters,system:openshift-master
  172. --master={{ hostvars[openshift_ca_host].openshift.master.loopback_api_url }}
  173. --public-master={{ hostvars[openshift_ca_host].openshift.master.loopback_api_url }}
  174. --signer-cert={{ openshift_ca_cert }}
  175. --signer-key={{ openshift_ca_key }}
  176. --signer-serial={{ openshift_ca_serial }}
  177. --user=system:openshift-master
  178. --basename=openshift-master
  179. --expire-days={{ openshift_master_cert_expire_days }}
  180. - name: Copy generated loopback master client config to master config dir
  181. copy:
  182. src: "{{ openshift_ca_loopback_tmpdir.stdout }}/{{ item }}"
  183. dest: "{{ openshift_ca_config_dir }}"
  184. remote_src: true
  185. with_items:
  186. - openshift-master.crt
  187. - openshift-master.key
  188. - openshift-master.kubeconfig
  189. - name: Delete temp directory
  190. file:
  191. name: "{{ openshift_ca_loopback_tmpdir.stdout }}"
  192. state: absent
  193. when: loopback_context_string not in loopback_config.stdout
  194. delegate_to: "{{ openshift_ca_host }}"
  195. run_once: true
  196. # create-api-client-config generates a ca.crt file which will
  197. # overwrite the OpenShift CA certificate. Generate the loopback
  198. # kubeconfig in a temporary directory and then copy files into the
  199. # master config dir to avoid overwriting ca.crt.
  200. - block:
  201. - name: Create temp directory for loopback master client config
  202. command: mktemp -d /tmp/openshift-ansible-XXXXXX
  203. register: openshift_ca_loopback_tmpdir
  204. - name: Generate the aggregator api-client config
  205. command: >
  206. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm create-api-client-config
  207. --certificate-authority={{ openshift_ca_cert }}
  208. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | lib_utils_oo_collect('cafile') %}
  209. --certificate-authority {{ named_ca_certificate }}
  210. {% endfor %}
  211. --client-dir={{ openshift_ca_loopback_tmpdir.stdout }}
  212. --user=aggregator-front-proxy
  213. --signer-cert="{{ openshift_ca_config_dir }}/front-proxy-ca.crt"
  214. --signer-key="{{ openshift_ca_config_dir }}/front-proxy-ca.key"
  215. --signer-serial={{ openshift_ca_serial }}
  216. --expire-days={{ openshift_master_cert_expire_days }}
  217. - name: Copy generated loopback master client config to master config dir
  218. copy:
  219. src: "{{ openshift_ca_loopback_tmpdir.stdout }}/{{ item }}"
  220. dest: "{{ openshift_ca_config_dir }}"
  221. remote_src: true
  222. with_items:
  223. - aggregator-front-proxy.crt
  224. - aggregator-front-proxy.key
  225. - aggregator-front-proxy.kubeconfig
  226. - name: Delete temp directory
  227. file:
  228. name: "{{ openshift_ca_loopback_tmpdir.stdout }}"
  229. state: absent
  230. delegate_to: "{{ openshift_ca_host }}"
  231. run_once: true
  232. - name: Restore original serviceaccount keys
  233. copy:
  234. src: "{{ item }}.keep"
  235. dest: "{{ item }}"
  236. remote_src: true
  237. with_items:
  238. - "{{ openshift_ca_config_dir }}/serviceaccounts.private.key"
  239. - "{{ openshift_ca_config_dir }}/serviceaccounts.public.key"
  240. when: openshift_certificates_redeploy | default(false) | bool
  241. - name: Remove backup serviceaccount keys
  242. file:
  243. path: "{{ item }}.keep"
  244. state: absent
  245. with_items:
  246. - "{{ openshift_ca_config_dir }}/serviceaccounts.private.key"
  247. - "{{ openshift_ca_config_dir }}/serviceaccounts.public.key"
  248. when: openshift_certificates_redeploy | default(false) | bool