main.yml 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328
  1. ---
  2. # TODO: add ability to configure certificates given either a local file to
  3. # point to or certificate contents, set in default cert locations.
  4. # Authentication Variable Validation
  5. # TODO: validate the different identity provider kinds as well
  6. - fail:
  7. msg: >
  8. Invalid OAuth grant method: {{ openshift_master_oauth_grant_method }}
  9. when:
  10. - openshift_master_oauth_grant_method not in openshift_master_valid_grant_methods
  11. - name: Check that origin image is present
  12. command: 'docker images -q "{{ osm_image }}"'
  13. register: control_plane_image
  14. # This task runs async to save time while the master is being configured
  15. - name: Pre-pull Origin image
  16. docker_image:
  17. name: "{{ osm_image }}"
  18. environment:
  19. NO_PROXY: "{{ openshift.common.no_proxy | default('') }}"
  20. when: control_plane_image.stdout_lines == []
  21. # 10 minutes to pull the image
  22. async: 600
  23. poll: 0
  24. register: image_prepull
  25. - name: Open up firewall ports
  26. import_tasks: firewall.yml
  27. - name: Prepare static pod scripts
  28. import_tasks: static_shim.yml
  29. - name: Create r_openshift_master_data_dir
  30. file:
  31. path: "{{ r_openshift_master_data_dir }}"
  32. state: directory
  33. mode: 0755
  34. owner: root
  35. group: root
  36. - name: Create config parent directory if it does not exist
  37. file:
  38. path: "/etc/origin/master"
  39. state: directory
  40. - name: Create flexvolume directory when on atomic hosts
  41. file:
  42. state: directory
  43. path: "{{ openshift_flexvolume_container_directory_default }}/volume/exec"
  44. mode: '0750'
  45. when: openshift_is_atomic | bool
  46. - name: Flex volume directory on non-atomic host
  47. file:
  48. state: directory
  49. path: "/usr/libexec/kubernetes/kubelet-plugins/volume/exec/"
  50. mode: '0750'
  51. when: not openshift_is_atomic | bool
  52. - name: Create the policy file if it does not already exist
  53. command: >
  54. {{ openshift_client_binary }} adm create-bootstrap-policy-file
  55. --filename={{ openshift_master_policy }}
  56. args:
  57. creates: "{{ openshift_master_policy }}"
  58. - name: Create the scheduler config
  59. copy:
  60. content: "{{ scheduler_config | to_nice_json }}"
  61. dest: "{{ openshift_master_scheduler_conf }}"
  62. backup: true
  63. - import_tasks: htpass_provider.yml
  64. - name: Create the ldap ca file if needed
  65. copy:
  66. dest: "{{ item.ca if 'ca' in item and '/' in item.ca else '/etc/origin/master/' ~ item.ca | default('ldap_ca.crt') }}"
  67. content: "{{ openshift.master.ldap_ca }}"
  68. mode: 0600
  69. backup: yes
  70. when:
  71. - openshift.master.ldap_ca is defined
  72. - item.kind == 'LDAPPasswordIdentityProvider'
  73. with_items: "{{ openshift_master_identity_providers }}"
  74. - name: Create the openid ca file if needed
  75. copy:
  76. dest: "{{ item.ca if 'ca' in item and '/' in item.ca else '/etc/origin/master/' ~ item.ca | default('openid_ca.crt') }}"
  77. content: "{{ openshift.master.openid_ca }}"
  78. mode: 0600
  79. backup: yes
  80. when:
  81. - openshift.master.openid_ca is defined
  82. - item.kind == 'OpenIDIdentityProvider'
  83. - item.ca | default('') != ''
  84. with_items: "{{ openshift_master_identity_providers }}"
  85. - name: Create the request header ca file if needed
  86. copy:
  87. dest: "{{ item.clientCA if 'clientCA' in item and '/' in item.clientCA else '/etc/origin/master/' ~ item.clientCA | default('request_header_ca.crt') }}"
  88. content: "{{ openshift_master_request_header_ca }}"
  89. mode: 0600
  90. backup: yes
  91. when:
  92. - openshift_master_request_header_ca != l_osm_request_header_none
  93. - item.kind == 'RequestHeaderIdentityProvider'
  94. - item.clientCA | default('') != ''
  95. with_items: "{{ openshift_master_identity_providers }}"
  96. - name: Set fact of all etcd host IPs
  97. openshift_facts:
  98. role: common
  99. local_facts:
  100. no_proxy_etcd_host_ips: "{{ openshift_no_proxy_etcd_host_ips }}"
  101. - name: Create session secrets file
  102. template:
  103. dest: "{{ openshift_master_session_secrets_file }}"
  104. src: sessionSecretsFile.yaml.v1.j2
  105. owner: root
  106. group: root
  107. mode: 0600
  108. - set_fact:
  109. # translate_idps is a custom filter in role lib_utils
  110. translated_identity_providers: "{{ openshift_master_identity_providers | translate_idps('v1') }}"
  111. # TODO: add the validate parameter when there is a validation command to run
  112. - name: Create master config
  113. template:
  114. dest: "{{ openshift_master_config_file }}"
  115. src: master.yaml.v1.j2
  116. backup: true
  117. owner: root
  118. group: root
  119. mode: 0600
  120. - import_tasks: set_loopback_context.yml
  121. - name: Create the master service env file
  122. template:
  123. src: "master.env.j2"
  124. dest: /etc/origin/master/master.env
  125. backup: true
  126. - import_tasks: static.yml
  127. - name: Establish the default bootstrap kubeconfig for masters
  128. copy:
  129. remote_src: true
  130. src: "/etc/origin/master/admin.kubeconfig"
  131. dest: "{{ item }}"
  132. mode: 0600
  133. with_items:
  134. # bootstrap as an admin
  135. - /etc/origin/node/bootstrap.kubeconfig
  136. # copy to this location to bypass initial bootstrap request
  137. - /etc/origin/node/node.kubeconfig
  138. - name: Check status of control plane image pre-pull
  139. async_status:
  140. jid: "{{ image_prepull.ansible_job_id }}"
  141. register: job_result
  142. until: job_result.finished
  143. when: control_plane_image.stdout_lines == []
  144. retries: 20
  145. delay: 30
  146. failed_when: false
  147. - name: Check status of etcd image pre-pull
  148. async_status:
  149. jid: "{{ etcd_prepull.ansible_job_id }}"
  150. register: job_result
  151. until: job_result.finished
  152. when:
  153. - etcd_image_exists is defined
  154. - "'stdout_lines' in etcd_image_exists"
  155. - etcd_image_exists.stdout_lines == []
  156. retries: 20
  157. delay: 30
  158. failed_when: false
  159. - name: Start and enable self-hosting node
  160. systemd:
  161. name: "{{ openshift_service_type }}-node"
  162. state: restarted
  163. enabled: yes
  164. register: node_start
  165. ignore_errors: yes
  166. - when: node_start is failed
  167. block:
  168. - name: Get node logs
  169. command: journalctl --no-pager -n 300 -u {{ openshift_service_type }}-node
  170. register: logs_node
  171. ignore_errors: true
  172. - debug:
  173. msg: "{{ logs_node.stdout_lines }}"
  174. - fail:
  175. msg: Node start failed.
  176. - name: Wait for control plane pods to appear
  177. oc_obj:
  178. state: list
  179. kind: pod
  180. name: "master-{{ item }}-{{ openshift.node.nodename | lower }}"
  181. namespace: kube-system
  182. register: control_plane_pods
  183. until:
  184. - "'results' in control_plane_pods"
  185. - "'results' in control_plane_pods.results"
  186. - control_plane_pods.results.results | length > 0
  187. retries: 60
  188. delay: 5
  189. with_items:
  190. - "{{ 'etcd' if inventory_hostname in groups['oo_etcd_to_config'] else omit }}"
  191. - api
  192. - controllers
  193. ignore_errors: true
  194. - when: control_plane_pods is failed
  195. block:
  196. - name: Check status in the kube-system namespace
  197. command: >
  198. {{ openshift_client_binary }} status --config={{ openshift.common.config_base }}/master/admin.kubeconfig -n kube-system
  199. register: control_plane_status
  200. ignore_errors: true
  201. - debug:
  202. msg: "{{ control_plane_status.stdout_lines }}"
  203. - name: Get pods in the kube-system namespace
  204. command: >
  205. {{ openshift_client_binary }} get pods --config={{ openshift.common.config_base }}/master/admin.kubeconfig -n kube-system -o wide
  206. register: control_plane_pods_list
  207. ignore_errors: true
  208. - debug:
  209. msg: "{{ control_plane_pods_list.stdout_lines }}"
  210. - name: Get events in the kube-system namespace
  211. command: >
  212. {{ openshift_client_binary }} get events --config={{ openshift.common.config_base }}/master/admin.kubeconfig -n kube-system
  213. register: control_plane_events
  214. ignore_errors: true
  215. - debug:
  216. msg: "{{ control_plane_events.stdout_lines }}"
  217. - name: Get node logs
  218. command: journalctl --no-pager -n 300 -u {{ openshift_service_type }}-node
  219. register: logs_node
  220. ignore_errors: true
  221. - debug:
  222. msg: "{{ logs_node.stdout_lines }}"
  223. - name: Report control plane errors
  224. fail:
  225. msg: Control plane pods didn't come up
  226. - name: Wait for all control plane pods to become ready
  227. oc_obj:
  228. state: list
  229. kind: pod
  230. name: "master-{{ item }}-{{ openshift.node.nodename | lower }}"
  231. namespace: kube-system
  232. register: control_plane_health
  233. until:
  234. - "'results' in control_plane_health"
  235. - "'results' in control_plane_health.results"
  236. - control_plane_health.results.results | length > 0
  237. - "'status' in control_plane_health.results.results[0]"
  238. - "'conditions' in control_plane_health.results.results[0].status"
  239. - control_plane_health.results.results[0].status.conditions | selectattr('type', 'match', '^Ready$') | map(attribute='status') | join | bool == True
  240. retries: 60
  241. delay: 5
  242. with_items:
  243. - "{{ 'etcd' if inventory_hostname in groups['oo_etcd_to_config'] else '' }}"
  244. - api
  245. - controllers
  246. when:
  247. - item != ''
  248. - when: control_plane_health is failed
  249. block:
  250. - debug:
  251. msg: "{{ control_plane_pods_list.stdout_lines }}"
  252. - name: Get events in the kube-system namespace
  253. command: >
  254. {{ openshift_client_binary }} get events --config={{ openshift.common.config_base }}/master/admin.kubeconfig -n kube-system
  255. register: control_plane_events
  256. ignore_errors: true
  257. - debug:
  258. msg: "{{ control_plane_events.stdout_lines }}"
  259. - name: Get node logs
  260. command: journalctl --no-pager -n 300 -u {{ openshift_service_type }}-node
  261. register: logs_node
  262. ignore_errors: true
  263. - debug:
  264. msg: "{{ logs_node.stdout_lines }}"
  265. - name: Get API logs
  266. command: >
  267. /usr/local/bin/master-logs api api
  268. register: control_plane_logs_api
  269. ignore_errors: true
  270. - debug:
  271. msg: "{{ control_plane_logs_api.stdout_lines }}"
  272. - name: Get controllers logs
  273. command: >
  274. /usr/local/bin/master-logs controllers controllers
  275. register: control_plane_logs_controllers
  276. ignore_errors: true
  277. - debug:
  278. msg: "{{ control_plane_logs_controllers.stdout_lines }}"
  279. - name: Get etcd logs
  280. command: >
  281. /usr/local/bin/master-logs etcd etcd
  282. register: control_plane_logs_etcd
  283. when: inventory_hostname in groups['oo_etcd_to_config']
  284. ignore_errors: true
  285. - debug:
  286. msg: "{{ control_plane_logs_controllers.stdout_lines }}"
  287. when: inventory_hostname in groups['oo_etcd_to_config']
  288. - name: Report control plane errors
  289. fail:
  290. msg: Control plane pods didn't pass health check
  291. - import_tasks: check_master_api_is_ready.yml
  292. - name: Remove oc cache to refresh a list of APIs
  293. file:
  294. path: "~/.kube/cache"
  295. state: absent