config.yml 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374
  1. ---
  2. - name: Set master facts and determine if external etcd certs need to be generated
  3. hosts: oo_masters_to_config
  4. pre_tasks:
  5. - name: Check for RPM generated config marker file .config_managed
  6. stat:
  7. path: /etc/origin/.config_managed
  8. register: rpmgenerated_config
  9. - name: Remove RPM generated config files if present
  10. file:
  11. path: "/etc/origin/{{ item }}"
  12. state: absent
  13. when: rpmgenerated_config.stat.exists == true and deployment_type in ['openshift-enterprise', 'atomic-enterprise']
  14. with_items:
  15. - master
  16. - node
  17. - .config_managed
  18. - set_fact:
  19. openshift_master_pod_eviction_timeout: "{{ lookup('oo_option', 'openshift_master_pod_eviction_timeout') | default(none, true) }}"
  20. when: openshift_master_pod_eviction_timeout is not defined
  21. - set_fact:
  22. openshift_master_etcd_port: "{{ (etcd_client_port | default('2379')) if (groups.oo_etcd_to_config is defined and groups.oo_etcd_to_config) else none }}"
  23. openshift_master_etcd_hosts: "{{ hostvars
  24. | oo_select_keys(groups['oo_etcd_to_config']
  25. | default([]))
  26. | oo_collect('openshift.common.hostname')
  27. | default(none, true) }}"
  28. - set_fact:
  29. openshift_master_debug_level: "{{ lookup('oo_option', 'openshift_master_debug_level') | default(openshift.common.debug_level, true) }}"
  30. when: openshift_master_debug_level is not defined
  31. roles:
  32. - openshift_facts
  33. post_tasks:
  34. - openshift_facts:
  35. role: "{{ item.role }}"
  36. local_facts: "{{ item.local_facts }}"
  37. with_items:
  38. - role: common
  39. local_facts:
  40. hostname: "{{ openshift_hostname | default(None) }}"
  41. ip: "{{ openshift_ip | default(None) }}"
  42. public_hostname: "{{ openshift_public_hostname | default(None) }}"
  43. public_ip: "{{ openshift_public_ip | default(None) }}"
  44. deployment_type: "{{ openshift_deployment_type }}"
  45. - role: master
  46. local_facts:
  47. api_port: "{{ openshift_master_api_port | default(None) }}"
  48. api_url: "{{ openshift_master_api_url | default(None) }}"
  49. api_use_ssl: "{{ openshift_master_api_use_ssl | default(None) }}"
  50. controllers_port: "{{ openshift_master_controllers_port | default(None) }}"
  51. public_api_url: "{{ openshift_master_public_api_url | default(None) }}"
  52. cluster_hostname: "{{ openshift_master_cluster_hostname | default(None) }}"
  53. cluster_public_hostname: "{{ openshift_master_cluster_public_hostname | default(None) }}"
  54. console_path: "{{ openshift_master_console_path | default(None) }}"
  55. console_port: "{{ openshift_master_console_port | default(None) }}"
  56. console_url: "{{ openshift_master_console_url | default(None) }}"
  57. console_use_ssl: "{{ openshift_master_console_use_ssl | default(None) }}"
  58. public_console_url: "{{ openshift_master_public_console_url | default(None) }}"
  59. portal_net: "{{ openshift_master_portal_net | default(None) }}"
  60. ha: "{{ openshift_master_ha | default(groups.oo_masters | length > 1) }}"
  61. master_count: "{{ openshift_master_count | default(groups.oo_masters | length) }}"
  62. - openshift_facts:
  63. role: hosted
  64. openshift_env:
  65. openshift_hosted_registry_storage_kind: 'nfs'
  66. when: openshift_hosted_registry_storage_kind is not defined and groups.oo_nfs_to_config is defined and groups.oo_nfs_to_config | length > 0
  67. - name: Check status of external etcd certificatees
  68. stat:
  69. path: "{{ openshift.common.config_base }}/master/{{ item }}"
  70. with_items:
  71. - master.etcd-client.crt
  72. - master.etcd-ca.crt
  73. register: g_external_etcd_cert_stat_result
  74. - set_fact:
  75. etcd_client_certs_missing: "{{ g_external_etcd_cert_stat_result.results
  76. | oo_collect(attribute='stat.exists')
  77. | list | intersect([false])}}"
  78. etcd_cert_subdir: openshift-master-{{ openshift.common.hostname }}
  79. etcd_cert_config_dir: "{{ openshift.common.config_base }}/master"
  80. etcd_cert_prefix: master.etcd-
  81. when: groups.oo_etcd_to_config is defined and groups.oo_etcd_to_config
  82. - name: Create temp directory for syncing certs
  83. hosts: localhost
  84. connection: local
  85. become: no
  86. gather_facts: no
  87. tasks:
  88. - name: Create local temp directory for syncing certs
  89. local_action: command mktemp -d /tmp/openshift-ansible-XXXXXXX
  90. register: g_master_mktemp
  91. changed_when: False
  92. - name: Configure etcd certificates
  93. hosts: oo_first_etcd
  94. vars:
  95. etcd_generated_certs_dir: /etc/etcd/generated_certs
  96. etcd_needing_client_certs: "{{ hostvars
  97. | oo_select_keys(groups['oo_masters_to_config'])
  98. | default([])
  99. | oo_filter_list(filter_attr='etcd_client_certs_missing') }}"
  100. sync_tmpdir: "{{ hostvars.localhost.g_master_mktemp.stdout }}"
  101. roles:
  102. - etcd_certificates
  103. post_tasks:
  104. - name: Create a tarball of the etcd certs
  105. command: >
  106. tar -czvf {{ etcd_generated_certs_dir }}/{{ item.etcd_cert_subdir }}.tgz
  107. -C {{ etcd_generated_certs_dir }}/{{ item.etcd_cert_subdir }} .
  108. args:
  109. creates: "{{ etcd_generated_certs_dir }}/{{ item.etcd_cert_subdir }}.tgz"
  110. with_items: etcd_needing_client_certs
  111. - name: Retrieve the etcd cert tarballs
  112. fetch:
  113. src: "{{ etcd_generated_certs_dir }}/{{ item.etcd_cert_subdir }}.tgz"
  114. dest: "{{ sync_tmpdir }}/"
  115. flat: yes
  116. fail_on_missing: yes
  117. validate_checksum: yes
  118. with_items: etcd_needing_client_certs
  119. - name: Copy the external etcd certs to the masters
  120. hosts: oo_masters_to_config
  121. vars:
  122. sync_tmpdir: "{{ hostvars.localhost.g_master_mktemp.stdout }}"
  123. tasks:
  124. - name: Ensure certificate directory exists
  125. file:
  126. path: "{{ openshift.common.config_base }}/master"
  127. state: directory
  128. when: etcd_client_certs_missing is defined and etcd_client_certs_missing
  129. - name: Unarchive the tarball on the master
  130. unarchive:
  131. src: "{{ sync_tmpdir }}/{{ etcd_cert_subdir }}.tgz"
  132. dest: "{{ etcd_cert_config_dir }}"
  133. when: etcd_client_certs_missing is defined and etcd_client_certs_missing
  134. - file:
  135. path: "{{ etcd_cert_config_dir }}/{{ item }}"
  136. owner: root
  137. group: root
  138. mode: 0600
  139. with_items:
  140. - master.etcd-client.crt
  141. - master.etcd-client.key
  142. - master.etcd-ca.crt
  143. when: etcd_client_certs_missing is defined and etcd_client_certs_missing
  144. - name: Determine if master certificates need to be generated
  145. hosts: oo_first_master:oo_masters_to_config
  146. tasks:
  147. - set_fact:
  148. openshift_master_certs_no_etcd:
  149. - admin.crt
  150. - master.kubelet-client.crt
  151. - "{{ 'master.proxy-client.crt' if openshift.common.version_gte_3_1_or_1_1 else omit }}"
  152. - master.server.crt
  153. - openshift-master.crt
  154. - openshift-registry.crt
  155. - openshift-router.crt
  156. - etcd.server.crt
  157. openshift_master_certs_etcd:
  158. - master.etcd-client.crt
  159. - set_fact:
  160. openshift_master_certs: "{{ (openshift_master_certs_no_etcd | union(openshift_master_certs_etcd)) if (groups.oo_etcd_to_config is defined and groups.oo_etcd_to_config) else openshift_master_certs_no_etcd }}"
  161. - name: Check status of master certificates
  162. stat:
  163. path: "{{ openshift.common.config_base }}/master/{{ item }}"
  164. with_items: openshift_master_certs
  165. register: g_master_cert_stat_result
  166. - set_fact:
  167. master_certs_missing: "{{ False in (g_master_cert_stat_result.results
  168. | oo_collect(attribute='stat.exists')
  169. | list ) }}"
  170. master_cert_subdir: master-{{ openshift.common.hostname }}
  171. master_cert_config_dir: "{{ openshift.common.config_base }}/master"
  172. - set_fact:
  173. openshift_infra_nodes: "{{ hostvars | oo_select_keys(groups['oo_nodes_to_config'])
  174. | oo_nodes_with_label('region', 'infra')
  175. | oo_collect('inventory_hostname') }}"
  176. when: openshift_infra_nodes is not defined and groups.oo_nodes_to_config | default([]) | length > 0
  177. - name: Configure master certificates
  178. hosts: oo_first_master
  179. vars:
  180. master_generated_certs_dir: "{{ openshift.common.config_base }}/generated-configs"
  181. masters_needing_certs: "{{ hostvars
  182. | oo_select_keys(groups['oo_masters_to_config'] | difference(groups['oo_first_master']))
  183. | oo_filter_list(filter_attr='master_certs_missing') }}"
  184. master_hostnames: "{{ hostvars
  185. | oo_select_keys(groups['oo_masters_to_config'])
  186. | oo_collect('openshift.common.all_hostnames')
  187. | oo_flatten | unique }}"
  188. sync_tmpdir: "{{ hostvars.localhost.g_master_mktemp.stdout }}"
  189. roles:
  190. - openshift_master_certificates
  191. post_tasks:
  192. - name: Remove generated etcd client certs when using external etcd
  193. file:
  194. path: "{{ master_generated_certs_dir }}/{{ item.0.master_cert_subdir }}/{{ item.1 }}"
  195. state: absent
  196. when: groups.oo_etcd_to_config is defined and groups.oo_etcd_to_config
  197. with_nested:
  198. - masters_needing_certs
  199. - - master.etcd-client.crt
  200. - master.etcd-client.key
  201. - name: Create a tarball of the master certs
  202. command: >
  203. tar -czvf {{ master_generated_certs_dir }}/{{ item.master_cert_subdir }}.tgz
  204. -C {{ master_generated_certs_dir }}/{{ item.master_cert_subdir }} .
  205. args:
  206. creates: "{{ master_generated_certs_dir }}/{{ item.master_cert_subdir }}.tgz"
  207. with_items: masters_needing_certs
  208. - name: Retrieve the master cert tarball from the master
  209. fetch:
  210. src: "{{ master_generated_certs_dir }}/{{ item.master_cert_subdir }}.tgz"
  211. dest: "{{ sync_tmpdir }}/"
  212. flat: yes
  213. fail_on_missing: yes
  214. validate_checksum: yes
  215. with_items: masters_needing_certs
  216. - name: Configure load balancers
  217. hosts: oo_lb_to_config
  218. vars:
  219. sync_tmpdir: "{{ hostvars.localhost.g_master_mktemp.stdout }}"
  220. haproxy_frontend_port: "{{ hostvars[groups.oo_first_master.0].openshift.master.api_port }}"
  221. haproxy_frontends:
  222. - name: atomic-openshift-api
  223. mode: tcp
  224. options:
  225. - tcplog
  226. binds:
  227. - "*:{{ hostvars[groups.oo_first_master.0].openshift.master.api_port }}"
  228. default_backend: atomic-openshift-api
  229. haproxy_backends:
  230. - name: atomic-openshift-api
  231. mode: tcp
  232. option: tcplog
  233. balance: source
  234. servers: "{{ hostvars | oo_select_keys(groups['oo_masters']) | oo_haproxy_backend_masters }}"
  235. roles:
  236. - role: openshift_facts
  237. - role: haproxy
  238. when: hostvars[groups.oo_first_master.0].openshift.master.ha | bool
  239. - name: Check for cached session secrets
  240. hosts: oo_first_master
  241. roles:
  242. - role: openshift_facts
  243. post_tasks:
  244. - openshift_facts:
  245. role: master
  246. local_facts:
  247. session_auth_secrets: "{{ openshift_master_session_auth_secrets | default(openshift.master.session_auth_secrets | default(None)) }}"
  248. session_encryption_secrets: "{{ openshift_master_session_encryption_secrets | default(openshift.master.session_encryption_secrets | default(None)) }}"
  249. - name: Generate master session secrets
  250. hosts: oo_first_master
  251. vars:
  252. g_session_secrets_present: "{{ (openshift.master.session_auth_secrets | default([]) and openshift.master.session_encryption_secrets | default([])) | length > 0 }}"
  253. g_session_auth_secrets: "{{ [ 24 | oo_generate_secret ] }}"
  254. g_session_encryption_secrets: "{{ [ 24 | oo_generate_secret ] }}"
  255. roles:
  256. - role: openshift_facts
  257. tasks:
  258. - openshift_facts:
  259. role: master
  260. local_facts:
  261. session_auth_secrets: "{{ g_session_auth_secrets }}"
  262. session_encryption_secrets: "{{ g_session_encryption_secrets }}"
  263. when: not g_session_secrets_present | bool
  264. - name: Parse named certificates
  265. hosts: localhost
  266. connection: local
  267. become: no
  268. vars:
  269. internal_hostnames: "{{ hostvars[groups.oo_first_master.0].openshift.common.internal_hostnames }}"
  270. named_certificates: "{{ hostvars[groups.oo_first_master.0].openshift_master_named_certificates | default([]) }}"
  271. named_certificates_dir: "{{ hostvars[groups.oo_first_master.0].master_cert_config_dir }}/named_certificates/"
  272. tasks:
  273. - set_fact:
  274. parsed_named_certificates: "{{ named_certificates | oo_parse_named_certificates(named_certificates_dir, internal_hostnames) }}"
  275. when: named_certificates | length > 0
  276. - name: Deploy named certificates
  277. hosts: oo_masters_to_config
  278. vars:
  279. named_certs_dir: "{{ master_cert_config_dir }}/named_certificates/"
  280. named_certs_specified: "{{ openshift_master_named_certificates is defined }}"
  281. overwrite_named_certs: "{{ openshift_master_overwrite_named_certificates | default(false) }}"
  282. roles:
  283. - role: openshift_facts
  284. post_tasks:
  285. - openshift_facts:
  286. role: master
  287. local_facts:
  288. named_certificates: "{{ hostvars.localhost.parsed_named_certificates | default([]) }}"
  289. additive_facts_to_overwrite:
  290. - "{{ 'master.named_certificates' if overwrite_named_certs | bool else omit }}"
  291. - name: Clear named certificates
  292. file:
  293. path: "{{ named_certs_dir }}"
  294. state: absent
  295. when: overwrite_named_certs | bool
  296. - name: Ensure named certificate directory exists
  297. file:
  298. path: "{{ named_certs_dir }}"
  299. state: directory
  300. when: named_certs_specified | bool
  301. - name: Land named certificates
  302. copy: src="{{ item.certfile }}" dest="{{ named_certs_dir }}"
  303. with_items: openshift_master_named_certificates
  304. when: named_certs_specified | bool
  305. - name: Land named certificate keys
  306. copy: src="{{ item.keyfile }}" dest="{{ named_certs_dir }}"
  307. with_items: openshift_master_named_certificates
  308. when: named_certs_specified | bool
  309. - name: Configure master instances
  310. hosts: oo_masters_to_config
  311. any_errors_fatal: true
  312. serial: 1
  313. vars:
  314. sync_tmpdir: "{{ hostvars.localhost.g_master_mktemp.stdout }}"
  315. openshift_master_ha: "{{ openshift.master.ha }}"
  316. openshift_master_count: "{{ openshift.master.master_count }}"
  317. openshift_master_session_auth_secrets: "{{ hostvars[groups.oo_first_master.0].openshift.master.session_auth_secrets }}"
  318. openshift_master_session_encryption_secrets: "{{ hostvars[groups.oo_first_master.0].openshift.master.session_encryption_secrets }}"
  319. pre_tasks:
  320. - name: Ensure certificate directory exists
  321. file:
  322. path: "{{ openshift.common.config_base }}/master"
  323. state: directory
  324. when: master_certs_missing | bool and 'oo_first_master' not in group_names
  325. - name: Unarchive the tarball on the master
  326. unarchive:
  327. src: "{{ sync_tmpdir }}/{{ master_cert_subdir }}.tgz"
  328. dest: "{{ master_cert_config_dir }}"
  329. when: master_certs_missing | bool and 'oo_first_master' not in group_names
  330. roles:
  331. - openshift_master
  332. - role: nickhammond.logrotate
  333. - role: nuage_master
  334. when: openshift.common.use_nuage | bool
  335. post_tasks:
  336. - name: Create group for deployment type
  337. group_by: key=oo_masters_deployment_type_{{ openshift.common.deployment_type }}
  338. changed_when: False
  339. # Additional instance config for online deployments
  340. - name: Additional instance config
  341. hosts: oo_masters_deployment_type_online
  342. roles:
  343. - pods
  344. - os_env_extras
  345. - name: Delete temporary directory on localhost
  346. hosts: localhost
  347. connection: local
  348. become: no
  349. gather_facts: no
  350. tasks:
  351. - file: name={{ g_master_mktemp.stdout }} state=absent
  352. changed_when: False