generate_certs.yaml 4.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172
  1. ---
  2. # we will ensure our secrets and configmaps are set up here first
  3. - name: Checking for ca.key
  4. stat:
  5. path: "{{generated_certs_dir}}/ca.key"
  6. get_checksum: false
  7. get_attributes: false
  8. get_mime: false
  9. register: ca_key_file
  10. check_mode: no
  11. - name: Checking for ca.crt
  12. stat:
  13. path: "{{generated_certs_dir}}/ca.crt"
  14. get_checksum: false
  15. get_attributes: false
  16. get_mime: false
  17. register: ca_cert_file
  18. check_mode: no
  19. - name: Checking for ca.serial.txt
  20. stat:
  21. path: "{{generated_certs_dir}}/ca.serial.txt"
  22. get_checksum: false
  23. get_attributes: false
  24. get_mime: false
  25. register: ca_serial_file
  26. check_mode: no
  27. - name: Generate certificates
  28. command: >
  29. {{ openshift_client_binary }} adm --config={{ mktemp.stdout }}/admin.kubeconfig ca create-signer-cert
  30. --key={{generated_certs_dir}}/ca.key --cert={{generated_certs_dir}}/ca.crt
  31. --serial={{generated_certs_dir}}/ca.serial.txt --name=logging-signer-test
  32. check_mode: no
  33. when:
  34. - not ca_key_file.stat.exists
  35. - not ca_cert_file.stat.exists
  36. - not ca_serial_file.stat.exists
  37. - name: Checking for signing.conf
  38. stat:
  39. path: "{{generated_certs_dir}}/signing.conf"
  40. get_checksum: false
  41. get_attributes: false
  42. get_mime: false
  43. register: signing_conf_file
  44. check_mode: no
  45. - template: src=signing.conf.j2 dest={{generated_certs_dir}}/signing.conf
  46. vars:
  47. - top_dir: '{{generated_certs_dir}}'
  48. when: not signing_conf_file.stat.exists
  49. - include_tasks: procure_server_certs.yaml
  50. loop_control:
  51. loop_var: cert_info
  52. with_items:
  53. - procure_component: kibana
  54. - procure_component: kibana-ops
  55. - procure_component: kibana-internal
  56. hostnames: "kibana, kibana-ops, {{openshift_logging_kibana_hostname}}, {{openshift_logging_kibana_ops_hostname}}"
  57. - include_tasks: procure_server_certs.yaml
  58. loop_control:
  59. loop_var: cert_info
  60. with_items:
  61. - procure_component: mux
  62. hostnames: "logging-mux, {{openshift_logging_mux_hostname}}"
  63. when: openshift_logging_use_mux | bool
  64. - include_tasks: procure_shared_key.yaml
  65. loop_control:
  66. loop_var: shared_key_info
  67. with_items:
  68. - procure_component: mux
  69. when: openshift_logging_use_mux | bool
  70. - include_tasks: procure_server_certs.yaml
  71. loop_control:
  72. loop_var: cert_info
  73. with_items:
  74. - procure_component: es
  75. hostnames: "es, {{openshift_logging_es_hostname}}"
  76. when: openshift_logging_es_allow_external | bool
  77. - include_tasks: procure_server_certs.yaml
  78. loop_control:
  79. loop_var: cert_info
  80. with_items:
  81. - procure_component: es-ops
  82. hostnames: "es-ops, {{openshift_logging_es_ops_hostname}}"
  83. when:
  84. - openshift_logging_es_allow_external | bool
  85. - openshift_logging_use_ops | bool
  86. - name: Copy proxy TLS configuration file
  87. copy: src=server-tls.json dest={{generated_certs_dir}}/server-tls.json
  88. when: server_tls_json is undefined
  89. check_mode: no
  90. - name: Copy proxy TLS configuration file
  91. copy: content="{{server_tls_json}}" dest={{generated_certs_dir}}/server-tls.json
  92. when: server_tls_json is defined
  93. check_mode: no
  94. - name: Checking for ca.db
  95. stat:
  96. path: "{{generated_certs_dir}}/ca.db"
  97. get_checksum: false
  98. get_attributes: false
  99. get_mime: false
  100. register: ca_db_file
  101. check_mode: no
  102. - copy: content="" dest={{generated_certs_dir}}/ca.db
  103. check_mode: no
  104. when:
  105. - not ca_db_file.stat.exists
  106. - name: Checking for ca.crl.srl
  107. stat:
  108. path: "{{generated_certs_dir}}/ca.crl.srl"
  109. get_checksum: false
  110. get_attributes: false
  111. get_mime: false
  112. register: ca_crl_srl_file
  113. check_mode: no
  114. - copy: content="" dest={{generated_certs_dir}}/ca.crl.srl
  115. check_mode: no
  116. when:
  117. - not ca_crl_srl_file.stat.exists
  118. - name: Generate PEM certs
  119. include_tasks: generate_pems.yaml component={{node_name}}
  120. with_items:
  121. - system.logging.fluentd
  122. - system.logging.kibana
  123. - system.logging.curator
  124. - system.admin
  125. loop_control:
  126. loop_var: node_name
  127. - name: Generate PEM cert for mux
  128. include_tasks: generate_pems.yaml component={{node_name}}
  129. with_items:
  130. - system.logging.mux
  131. loop_control:
  132. loop_var: node_name
  133. when: openshift_logging_use_mux | bool
  134. - name: Generate PEM cert for Elasticsearch external route
  135. include_tasks: generate_pems.yaml component={{node_name}}
  136. with_items:
  137. - system.logging.es
  138. loop_control:
  139. loop_var: node_name
  140. when: openshift_logging_es_allow_external | bool
  141. - name: Creating necessary JKS certs
  142. include_tasks: generate_jks.yaml
  143. # TODO: make idempotent
  144. - name: Generate proxy session
  145. set_fact: session_secret={{ 200 | lib_utils_oo_random_word}}
  146. check_mode: no
  147. # TODO: make idempotent
  148. - name: Generate oauth client secret
  149. set_fact: oauth_secret={{ 64 | lib_utils_oo_random_word}}
  150. check_mode: no