main.yml 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283
  1. ---
  2. - fail:
  3. msg: "Both 'certfile' and 'keyfile' keys must be supplied when configuring openshift_master_ca_certificate"
  4. when: openshift_master_ca_certificate is defined and ('certfile' not in openshift_master_ca_certificate or 'keyfile' not in openshift_master_ca_certificate)
  5. - name: Install the base package for admin tooling
  6. package:
  7. name: "{{ openshift_service_type }}{{ openshift_pkg_version | default('') | lib_utils_oo_image_tag_to_rpm_version(include_dash=True) }}"
  8. state: present
  9. when: not hostvars[openshift_ca_host].openshift_is_atomic | bool
  10. register: install_result
  11. until: install_result is succeeded
  12. delegate_to: "{{ openshift_ca_host }}"
  13. run_once: true
  14. - name: Reload generated facts
  15. openshift_facts:
  16. when:
  17. - hostvars[openshift_ca_host].install_result | default({'changed':false}) is changed
  18. - name: Create openshift_ca_config_dir if it does not exist
  19. file:
  20. path: "{{ openshift_ca_config_dir }}"
  21. state: directory
  22. delegate_to: "{{ openshift_ca_host }}"
  23. run_once: true
  24. - name: Determine if CA must be created
  25. stat:
  26. path: "{{ openshift_ca_config_dir }}/{{ item }}"
  27. get_checksum: false
  28. get_attributes: false
  29. get_mime: false
  30. register: g_master_ca_stat_result
  31. with_items:
  32. - ca-bundle.crt
  33. - ca.crt
  34. - ca.key
  35. delegate_to: "{{ openshift_ca_host }}"
  36. run_once: true
  37. - name: Determine if front-proxy CA must be created
  38. stat:
  39. path: "{{ openshift_ca_config_dir }}/{{ item }}"
  40. get_checksum: false
  41. get_attributes: false
  42. get_mime: false
  43. register: g_master_front_proxy_ca_stat_result
  44. with_items:
  45. - front-proxy-ca.crt
  46. - front-proxy-ca.key
  47. delegate_to: "{{ openshift_ca_host }}"
  48. run_once: true
  49. - set_fact:
  50. master_ca_missing: "{{ False in (g_master_ca_stat_result.results
  51. | lib_utils_oo_collect(attribute='stat.exists')
  52. | list) }}"
  53. master_front_proxy_ca_missing: "{{ False in (g_master_front_proxy_ca_stat_result.results
  54. | lib_utils_oo_collect(attribute='stat.exists')
  55. | list) }}"
  56. run_once: true
  57. - name: Retain original serviceaccount keys
  58. copy:
  59. src: "{{ item }}"
  60. dest: "{{ item }}.keep"
  61. remote_src: true
  62. with_items:
  63. - "{{ openshift_ca_config_dir }}/serviceaccounts.private.key"
  64. - "{{ openshift_ca_config_dir }}/serviceaccounts.public.key"
  65. when: openshift_certificates_redeploy | default(false) | bool
  66. - name: Deploy master ca certificate
  67. copy:
  68. src: "{{ item.src }}"
  69. dest: "{{ openshift_ca_config_dir }}/{{ item.dest }}"
  70. force: no
  71. with_items:
  72. - src: "{{ (openshift_master_ca_certificate | default({'certfile':none})).certfile }}"
  73. dest: ca.crt
  74. - src: "{{ (openshift_master_ca_certificate | default({'keyfile':none})).keyfile }}"
  75. dest: ca.key
  76. when: openshift_master_ca_certificate is defined
  77. delegate_to: "{{ openshift_ca_host }}"
  78. run_once: true
  79. # Upload additional CA if necessary
  80. - name: Deploy additional ca
  81. copy:
  82. src: "{{ openshift_additional_ca }}"
  83. dest: "{{ openshift.common.config_base }}/master/additional_ca.crt"
  84. mode: 0644
  85. when: openshift_additional_ca is defined
  86. - name: Create ca serial
  87. copy:
  88. content: "00"
  89. dest: "{{ openshift_ca_config_dir }}/ca.serial.txt"
  90. force: "{{ openshift_certificates_redeploy | default(false) | bool }}"
  91. when: openshift_master_ca_certificate is defined
  92. delegate_to: "{{ openshift_ca_host }}"
  93. run_once: true
  94. - find:
  95. paths: "{{ openshift.common.config_base }}/master/legacy-ca/"
  96. patterns: ".*-ca.crt"
  97. use_regex: true
  98. register: g_master_legacy_ca_result
  99. # This should NOT replace the CA due to --overwrite=false when a CA already exists.
  100. - name: Create the front-proxy CA if it does not already exist
  101. command: >
  102. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm ca create-signer-cert
  103. --cert="{{ openshift_ca_config_dir }}/front-proxy-ca.crt"
  104. --key="{{ openshift_ca_config_dir }}/front-proxy-ca.key"
  105. --serial="{{ openshift_ca_config_dir }}/ca.serial.txt"
  106. --expire-days={{ openshift_ca_cert_expire_days }}
  107. --overwrite=false
  108. when: master_front_proxy_ca_missing | bool or openshift_certificates_redeploy | default(false) | bool
  109. delegate_to: "{{ openshift_ca_host }}"
  110. run_once: true
  111. # This should NOT replace the CA due to --overwrite=false when a CA already exists.
  112. - name: Create the master certificates if they do not already exist
  113. command: >
  114. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm ca create-master-certs
  115. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | lib_utils_oo_collect('cafile') %}
  116. --certificate-authority {{ named_ca_certificate }}
  117. {% endfor %}
  118. {% for legacy_ca_certificate in g_master_legacy_ca_result.files | default([]) | lib_utils_oo_collect('path') %}
  119. --certificate-authority {{ legacy_ca_certificate }}
  120. {% endfor %}
  121. {% if openshift_additional_ca is defined %}
  122. --certificate-authority {{ openshift.common.config_base }}/master/additional_ca.crt
  123. {% endif %}
  124. --hostnames={{ hostvars[openshift_ca_host].openshift.common.all_hostnames | join(',') }}
  125. --master={{ openshift.master.api_url }}
  126. --public-master={{ openshift.master.public_api_url }}
  127. --cert-dir={{ openshift_ca_config_dir }}
  128. --expire-days={{ openshift_master_cert_expire_days }}
  129. --signer-expire-days={{ openshift_ca_cert_expire_days }}
  130. --overwrite=false
  131. when: master_ca_missing | bool or openshift_certificates_redeploy | default(false) | bool
  132. delegate_to: "{{ openshift_ca_host }}"
  133. run_once: true
  134. # Create client-ca-bundle.crt containing old and new OpenShift CA
  135. # certificates. This bundle will be used when rolling the OpenShift CA
  136. # certificate.
  137. - name: Create client-ca-bundle.crt
  138. block:
  139. - command: mktemp -d /tmp/openshift-ansible-XXXXXX
  140. register: openshift_ca_clientconfig_tmpdir
  141. delegate_to: "{{ openshift_ca_host }}"
  142. - copy:
  143. src: "{{ item }}"
  144. dest: "{{ openshift_ca_clientconfig_tmpdir.stdout }}/"
  145. remote_src: true
  146. with_items: "{{ g_master_legacy_ca_result.files | default([]) | lib_utils_oo_collect('path') }}"
  147. delegate_to: "{{ openshift_ca_host }}"
  148. run_once: true
  149. - copy:
  150. src: "{{ openshift_ca_config_dir }}/ca.crt"
  151. dest: "{{ openshift_ca_clientconfig_tmpdir.stdout }}/"
  152. remote_src: true
  153. delegate_to: "{{ openshift_ca_host }}"
  154. run_once: true
  155. - assemble:
  156. src: "{{ openshift_ca_clientconfig_tmpdir.stdout }}"
  157. dest: "{{ openshift_ca_config_dir }}/client-ca-bundle.crt"
  158. mode: 0644
  159. owner: root
  160. group: root
  161. delegate_to: "{{ openshift_ca_host }}"
  162. run_once: true
  163. - name: Test local loopback context
  164. command: >
  165. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} config view
  166. --config={{ openshift_master_loopback_config }}
  167. changed_when: false
  168. register: loopback_config
  169. delegate_to: "{{ openshift_ca_host }}"
  170. run_once: true
  171. # create-api-client-config generates a ca.crt file which will
  172. # overwrite the OpenShift CA certificate. Generate the loopback
  173. # kubeconfig in a temporary directory and then copy files into the
  174. # master config dir to avoid overwriting ca.crt.
  175. - block:
  176. - name: Create temp directory for loopback master client config
  177. command: mktemp -d /tmp/openshift-ansible-XXXXXX
  178. register: openshift_ca_loopback_tmpdir
  179. - name: Generate the loopback master client config
  180. command: >
  181. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm create-api-client-config
  182. --certificate-authority={{ openshift_ca_cert }}
  183. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | lib_utils_oo_collect('cafile') %}
  184. --certificate-authority {{ named_ca_certificate }}
  185. {% endfor %}
  186. --client-dir={{ openshift_ca_loopback_tmpdir.stdout }}
  187. --groups=system:masters,system:openshift-master
  188. --master={{ hostvars[openshift_ca_host].openshift.master.loopback_api_url }}
  189. --public-master={{ hostvars[openshift_ca_host].openshift.master.loopback_api_url }}
  190. --signer-cert={{ openshift_ca_cert }}
  191. --signer-key={{ openshift_ca_key }}
  192. --signer-serial={{ openshift_ca_serial }}
  193. --user=system:openshift-master
  194. --basename=openshift-master
  195. --expire-days={{ openshift_master_cert_expire_days }}
  196. - name: Copy generated loopback master client config to master config dir
  197. copy:
  198. src: "{{ openshift_ca_loopback_tmpdir.stdout }}/{{ item }}"
  199. dest: "{{ openshift_ca_config_dir }}"
  200. remote_src: true
  201. with_items:
  202. - openshift-master.crt
  203. - openshift-master.key
  204. - openshift-master.kubeconfig
  205. - name: Delete temp directory
  206. file:
  207. name: "{{ openshift_ca_loopback_tmpdir.stdout }}"
  208. state: absent
  209. when: loopback_context_string not in loopback_config.stdout
  210. delegate_to: "{{ openshift_ca_host }}"
  211. run_once: true
  212. # create-api-client-config generates a ca.crt file which will
  213. # overwrite the OpenShift CA certificate. Generate the loopback
  214. # kubeconfig in a temporary directory and then copy files into the
  215. # master config dir to avoid overwriting ca.crt.
  216. - block:
  217. - name: Create temp directory for loopback master client config
  218. command: mktemp -d /tmp/openshift-ansible-XXXXXX
  219. register: openshift_ca_loopback_tmpdir
  220. - name: Generate the aggregator api-client config
  221. command: >
  222. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm create-api-client-config
  223. --certificate-authority={{ openshift_ca_cert }}
  224. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | lib_utils_oo_collect('cafile') %}
  225. --certificate-authority {{ named_ca_certificate }}
  226. {% endfor %}
  227. --client-dir={{ openshift_ca_loopback_tmpdir.stdout }}
  228. --user=aggregator-front-proxy
  229. --signer-cert="{{ openshift_ca_config_dir }}/front-proxy-ca.crt"
  230. --signer-key="{{ openshift_ca_config_dir }}/front-proxy-ca.key"
  231. --signer-serial={{ openshift_ca_serial }}
  232. --expire-days={{ openshift_master_cert_expire_days }}
  233. - name: Copy generated loopback master client config to master config dir
  234. copy:
  235. src: "{{ openshift_ca_loopback_tmpdir.stdout }}/{{ item }}"
  236. dest: "{{ openshift_ca_config_dir }}"
  237. remote_src: true
  238. with_items:
  239. - aggregator-front-proxy.crt
  240. - aggregator-front-proxy.key
  241. - aggregator-front-proxy.kubeconfig
  242. - name: Delete temp directory
  243. file:
  244. name: "{{ openshift_ca_loopback_tmpdir.stdout }}"
  245. state: absent
  246. delegate_to: "{{ openshift_ca_host }}"
  247. run_once: true
  248. - name: Restore original serviceaccount keys
  249. copy:
  250. src: "{{ item }}.keep"
  251. dest: "{{ item }}"
  252. remote_src: true
  253. with_items:
  254. - "{{ openshift_ca_config_dir }}/serviceaccounts.private.key"
  255. - "{{ openshift_ca_config_dir }}/serviceaccounts.public.key"
  256. when: openshift_certificates_redeploy | default(false) | bool
  257. - name: Remove backup serviceaccount keys
  258. file:
  259. path: "{{ item }}.keep"
  260. state: absent
  261. with_items:
  262. - "{{ openshift_ca_config_dir }}/serviceaccounts.private.key"
  263. - "{{ openshift_ca_config_dir }}/serviceaccounts.public.key"
  264. when: openshift_certificates_redeploy | default(false) | bool