main.yml 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224
  1. ---
  2. # TODO: add ability to configure certificates given either a local file to
  3. # point to or certificate contents, set in default cert locations.
  4. # Authentication Variable Validation
  5. # TODO: validate the different identity provider kinds as well
  6. - fail:
  7. msg: >
  8. Invalid OAuth grant method: {{ openshift_master_oauth_grant_method }}
  9. when:
  10. - openshift_master_oauth_grant_method is defined
  11. - openshift_master_oauth_grant_method not in openshift_master_valid_grant_methods
  12. - name: Open up firewall ports
  13. import_tasks: firewall.yml
  14. - name: Create r_openshift_master_data_dir
  15. file:
  16. path: "{{ r_openshift_master_data_dir }}"
  17. state: directory
  18. mode: 0755
  19. owner: root
  20. group: root
  21. - name: Create config parent directory if it does not exist
  22. file:
  23. path: "{{ openshift_master_config_dir }}"
  24. state: directory
  25. - name: Create the policy file if it does not already exist
  26. command: >
  27. {{ openshift_client_binary }} adm create-bootstrap-policy-file
  28. --filename={{ openshift_master_policy }}
  29. args:
  30. creates: "{{ openshift_master_policy }}"
  31. - name: Create the scheduler config
  32. copy:
  33. content: "{{ scheduler_config | to_nice_json }}"
  34. dest: "{{ openshift_master_scheduler_conf }}"
  35. backup: true
  36. - name: Install httpd-tools if needed
  37. package: name=httpd-tools state=present
  38. when:
  39. - item.kind == 'HTPasswdPasswordIdentityProvider'
  40. - not openshift_is_atomic | bool
  41. with_items: "{{ openshift_master_identity_providers }}"
  42. register: result
  43. until: result is succeeded
  44. - name: Ensure htpasswd directory exists
  45. file:
  46. path: "{{ item.filename | dirname }}"
  47. state: directory
  48. when:
  49. - item.kind == 'HTPasswdPasswordIdentityProvider'
  50. with_items: "{{ openshift_master_identity_providers }}"
  51. - name: Create the htpasswd file if needed
  52. template:
  53. dest: "{{ item.filename }}"
  54. src: htpasswd.j2
  55. backup: yes
  56. mode: 0600
  57. when:
  58. - item.kind == 'HTPasswdPasswordIdentityProvider'
  59. - openshift.master.manage_htpasswd | bool
  60. with_items: "{{ openshift_master_identity_providers }}"
  61. - name: Ensure htpasswd file exists
  62. copy:
  63. dest: "{{ item.filename }}"
  64. force: no
  65. content: ""
  66. mode: 0600
  67. when:
  68. - item.kind == 'HTPasswdPasswordIdentityProvider'
  69. with_items: "{{ openshift_master_identity_providers }}"
  70. - name: Create the ldap ca file if needed
  71. copy:
  72. dest: "{{ item.ca if 'ca' in item and '/' in item.ca else openshift_master_config_dir ~ '/' ~ item.ca | default('ldap_ca.crt') }}"
  73. content: "{{ openshift.master.ldap_ca }}"
  74. mode: 0600
  75. backup: yes
  76. when:
  77. - openshift.master.ldap_ca is defined
  78. - item.kind == 'LDAPPasswordIdentityProvider'
  79. with_items: "{{ openshift_master_identity_providers }}"
  80. - name: Create the openid ca file if needed
  81. copy:
  82. dest: "{{ item.ca if 'ca' in item and '/' in item.ca else openshift_master_config_dir ~ '/' ~ item.ca | default('openid_ca.crt') }}"
  83. content: "{{ openshift.master.openid_ca }}"
  84. mode: 0600
  85. backup: yes
  86. when:
  87. - openshift.master.openid_ca is defined
  88. - item.kind == 'OpenIDIdentityProvider'
  89. - item.ca | default('') != ''
  90. with_items: "{{ openshift_master_identity_providers }}"
  91. - name: Create the request header ca file if needed
  92. copy:
  93. dest: "{{ item.clientCA if 'clientCA' in item and '/' in item.clientCA else openshift_master_config_dir ~ '/' ~ item.clientCA | default('request_header_ca.crt') }}"
  94. content: "{{ openshift.master.request_header_ca }}"
  95. mode: 0600
  96. backup: yes
  97. when:
  98. - openshift.master.request_header_ca is defined
  99. - item.kind == 'RequestHeaderIdentityProvider'
  100. - item.clientCA | default('') != ''
  101. with_items: "{{ openshift_master_identity_providers }}"
  102. - name: Set fact of all etcd host IPs
  103. openshift_facts:
  104. role: common
  105. local_facts:
  106. no_proxy_etcd_host_ips: "{{ openshift_no_proxy_etcd_host_ips }}"
  107. - name: Update journald config
  108. include_tasks: journald.yml
  109. - name: Create session secrets file
  110. template:
  111. dest: "{{ openshift.master.session_secrets_file }}"
  112. src: sessionSecretsFile.yaml.v1.j2
  113. owner: root
  114. group: root
  115. mode: 0600
  116. when:
  117. - openshift.master.session_auth_secrets is defined
  118. - openshift.master.session_encryption_secrets is defined
  119. - set_fact:
  120. # translate_idps is a custom filter in role lib_utils
  121. translated_identity_providers: "{{ openshift_master_identity_providers | translate_idps('v1') }}"
  122. # TODO: add the validate parameter when there is a validation command to run
  123. - name: Create master config
  124. template:
  125. dest: "{{ openshift_master_config_file }}"
  126. src: master.yaml.v1.j2
  127. backup: true
  128. owner: root
  129. group: root
  130. mode: 0600
  131. - include_tasks: set_loopback_context.yml
  132. - name: Create the master service env file
  133. template:
  134. src: "master.env.j2"
  135. dest: /etc/origin/master/master.env
  136. backup: true
  137. - include_tasks: static.yml
  138. - name: Start and enable self-hosting node
  139. systemd:
  140. name: "{{ openshift_service_type }}-node"
  141. state: restarted
  142. enabled: yes
  143. - name: Verify that the control plane is running
  144. command: >
  145. curl -k {{ openshift.master.api_url }}/healthz
  146. args:
  147. # Disables the following warning:
  148. # Consider using get_url or uri module rather than running curl
  149. warn: no
  150. register: control_plane_health
  151. until: control_plane_health.stdout == 'ok'
  152. retries: 60
  153. delay: 5
  154. changed_when: false
  155. # Ignore errors so we can log troubleshooting info on failures.
  156. ignore_errors: yes
  157. # Capture debug output here to simplify triage
  158. - when: control_plane_health.stdout != 'ok'
  159. block:
  160. - name: Check status in the kube-system namespace
  161. command: >
  162. {{ openshift_client_binary }} status --config=/etc/origin/master/admin.kubeconfig -n kube-system
  163. register: control_plane_status
  164. ignore_errors: true
  165. - debug:
  166. msg: "{{ control_plane_status.stdout_lines }}"
  167. - name: Get pods in the kube-system namespace
  168. command: >
  169. {{ openshift_client_binary }} get pods --config=/etc/origin/master/admin.kubeconfig -n kube-system -o wide
  170. register: control_plane_pods
  171. ignore_errors: true
  172. - debug:
  173. msg: "{{ control_plane_pods.stdout_lines }}"
  174. - name: Get events in the kube-system namespace
  175. command: >
  176. {{ openshift_client_binary }} get events --config=/etc/origin/master/admin.kubeconfig -n kube-system
  177. register: control_plane_events
  178. ignore_errors: true
  179. - debug:
  180. msg: "{{ control_plane_events.stdout_lines }}"
  181. - name: Get API logs
  182. command: >
  183. /usr/local/bin/master-logs api api
  184. register: control_plane_logs_api
  185. ignore_errors: true
  186. - debug:
  187. msg: "{{ control_plane_logs_api.stdout_lines }}"
  188. - name: Get node logs
  189. command: journalctl --no-pager -n 300 -u {{ openshift_service_type }}-node
  190. register: control_plane_logs_node
  191. ignore_errors: true
  192. - debug:
  193. msg: "{{ control_plane_logs_node.stdout_lines }}"
  194. - name: Report control plane errors
  195. fail:
  196. msg: Control plane install failed.
  197. when: control_plane_health.stdout != 'ok'
  198. - include_tasks: bootstrap.yml