123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104 |
- ---
- - name: Calico Node | Error if invalid cert arguments
- fail:
- msg: "Must provide all or none for the following etcd params: calico_etcd_cert_dir, calico_etcd_ca_cert_file, calico_etcd_cert_file, calico_etcd_key_file, calico_etcd_endpoints"
- when:
- - calico_etcd_cert_dir is defined or calico_etcd_ca_cert_file is defined or calico_etcd_cert_file is defined or calico_etcd_key_file is defined or calico_etcd_endpoints is defined
- - not (calico_etcd_cert_dir is defined and calico_etcd_ca_cert_file is defined and calico_etcd_cert_file is defined and calico_etcd_key_file is defined and calico_etcd_endpoints is defined)
- - name: Calico Node | Generate OpenShift-etcd certs
- include_role:
- name: etcd
- tasks_from: client_certificates
- when: calico_etcd_ca_cert_file is not defined or calico_etcd_cert_file is not defined or calico_etcd_key_file is not defined or calico_etcd_endpoints is not defined or calico_etcd_cert_dir is not defined
- vars:
- etcd_cert_prefix: calico.etcd-
- etcd_cert_config_dir: "{{ openshift.common.config_base }}/calico"
- embedded_etcd: "{{ hostvars[groups.oo_first_master.0].openshift.master.embedded_etcd }}"
- etcd_ca_host: "{{ groups.oo_etcd_to_config.0 }}"
- etcd_cert_subdir: "openshift-calico-{{ openshift.common.hostname }}"
- - name: Calico Node | Set etcd cert location facts
- when: calico_etcd_ca_cert_file is not defined or calico_etcd_cert_file is not defined or calico_etcd_key_file is not defined or calico_etcd_endpoints is not defined or calico_etcd_cert_dir is not defined
- set_fact:
- calico_etcd_ca_cert_file: "/etc/origin/calico/calico.etcd-ca.crt"
- calico_etcd_cert_file: "/etc/origin/calico/calico.etcd-client.crt"
- calico_etcd_key_file: "/etc/origin/calico/calico.etcd-client.key"
- calico_etcd_endpoints: "{{ hostvars[groups.oo_first_master.0].openshift.master.etcd_urls | join(',') }}"
- calico_etcd_cert_dir: "/etc/origin/calico/"
- - name: Calico Node | Error if no certs set.
- fail:
- msg: "Invalid etcd configuration for calico."
- when: item is not defined or item == ''
- with_items:
- - calico_etcd_ca_cert_file
- - calico_etcd_cert_file
- - calico_etcd_key_file
- - calico_etcd_endpoints
- - name: Calico Node | Assure the calico certs are present
- stat:
- path: "{{ item }}"
- with_items:
- - "{{ calico_etcd_ca_cert_file }}"
- - "{{ calico_etcd_cert_file }}"
- - "{{ calico_etcd_key_file }}"
- - name: Calico Node | Configure Calico service unit file
- template:
- dest: "/lib/systemd/system/calico.service"
- src: calico.service.j2
- - name: Calico Node | Enable calico
- become: yes
- systemd:
- name: calico
- daemon_reload: yes
- state: started
- enabled: yes
- register: start_result
- - name: Calico Node | Assure CNI conf dir exists
- become: yes
- file: path="{{ cni_conf_dir }}" state=directory
- - name: Calico Node | Generate Calico CNI config
- become: yes
- template:
- src: "10-calico.conf.j2"
- dest: "{{ cni_conf_dir }}/10-calico.conf"
- - name: Calico Node | Assures Kuberentes CNI bin dir exists
- become: yes
- file: path="{{ cni_bin_dir }}" state=directory
- - name: Calico Node | Download Calico CNI Plugin
- become: yes
- get_url:
- url: "{{ calico_url_cni }}"
- dest: "{{ cni_bin_dir }}"
- mode: a+x
- - name: Calico Node | Download Calico IPAM Plugin
- become: yes
- get_url:
- url: "{{ calico_url_ipam }}"
- dest: "{{ cni_bin_dir }}"
- mode: a+x
- - name: Calico Node | Download and extract standard CNI plugins
- become: yes
- unarchive:
- remote_src: True
- src: "{{ cni_url }}"
- dest: "{{ cni_bin_dir }}"
- - name: Calico Node | Assure Calico conf dir exists
- become: yes
- file: path=/etc/calico/ state=directory
- - name: Calico Node | Set calicoctl.cfg
- template:
- src: calicoctl.cfg.j2
- dest: "/etc/calico/calicoctl.cfg"
|