main.yml 11 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270
  1. ---
  2. - fail:
  3. msg: "openshift_ca_host variable must be defined for this role"
  4. when: openshift_ca_host is not defined
  5. - fail:
  6. msg: "Both 'certfile' and 'keyfile' keys must be supplied when configuring openshift_master_ca_certificate"
  7. when: openshift_master_ca_certificate is defined and ('certfile' not in openshift_master_ca_certificate or 'keyfile' not in openshift_master_ca_certificate)
  8. - name: Install the base package for admin tooling
  9. package:
  10. name: "{{ openshift_service_type }}{{ openshift_pkg_version | default('') | lib_utils_oo_image_tag_to_rpm_version(include_dash=True) }}"
  11. state: present
  12. when: not openshift_is_containerized | bool
  13. register: install_result
  14. until: install_result is succeeded
  15. delegate_to: "{{ openshift_ca_host }}"
  16. run_once: true
  17. - name: Reload generated facts
  18. openshift_facts:
  19. when:
  20. - hostvars[openshift_ca_host].install_result | default({'changed':false}) is changed
  21. - name: Create openshift_ca_config_dir if it does not exist
  22. file:
  23. path: "{{ openshift_ca_config_dir }}"
  24. state: directory
  25. delegate_to: "{{ openshift_ca_host }}"
  26. run_once: true
  27. - name: Determine if CA must be created
  28. stat:
  29. path: "{{ openshift_ca_config_dir }}/{{ item }}"
  30. register: g_master_ca_stat_result
  31. with_items:
  32. - ca-bundle.crt
  33. - ca.crt
  34. - ca.key
  35. delegate_to: "{{ openshift_ca_host }}"
  36. run_once: true
  37. - name: Determine if front-proxy CA must be created
  38. stat:
  39. path: "{{ openshift_ca_config_dir }}/{{ item }}"
  40. register: g_master_front_proxy_ca_stat_result
  41. with_items:
  42. - front-proxy-ca.crt
  43. - front-proxy-ca.key
  44. delegate_to: "{{ openshift_ca_host }}"
  45. run_once: true
  46. - set_fact:
  47. master_ca_missing: "{{ False in (g_master_ca_stat_result.results
  48. | lib_utils_oo_collect(attribute='stat.exists')
  49. | list) }}"
  50. master_front_proxy_ca_missing: "{{ False in (g_master_front_proxy_ca_stat_result.results
  51. | lib_utils_oo_collect(attribute='stat.exists')
  52. | list) }}"
  53. run_once: true
  54. - name: Retain original serviceaccount keys
  55. copy:
  56. src: "{{ item }}"
  57. dest: "{{ item }}.keep"
  58. remote_src: true
  59. with_items:
  60. - "{{ openshift_ca_config_dir }}/serviceaccounts.private.key"
  61. - "{{ openshift_ca_config_dir }}/serviceaccounts.public.key"
  62. when: openshift_certificates_redeploy | default(false) | bool
  63. - name: Deploy master ca certificate
  64. copy:
  65. src: "{{ item.src }}"
  66. dest: "{{ openshift_ca_config_dir }}/{{ item.dest }}"
  67. force: no
  68. with_items:
  69. - src: "{{ (openshift_master_ca_certificate | default({'certfile':none})).certfile }}"
  70. dest: ca.crt
  71. - src: "{{ (openshift_master_ca_certificate | default({'keyfile':none})).keyfile }}"
  72. dest: ca.key
  73. when: openshift_master_ca_certificate is defined
  74. delegate_to: "{{ openshift_ca_host }}"
  75. run_once: true
  76. - name: Create ca serial
  77. copy:
  78. content: "00"
  79. dest: "{{ openshift_ca_config_dir }}/ca.serial.txt"
  80. force: "{{ openshift_certificates_redeploy | default(false) | bool }}"
  81. when: openshift_master_ca_certificate is defined
  82. delegate_to: "{{ openshift_ca_host }}"
  83. run_once: true
  84. - find:
  85. paths: "{{ openshift.common.config_base }}/master/legacy-ca/"
  86. patterns: ".*-ca.crt"
  87. use_regex: true
  88. register: g_master_legacy_ca_result
  89. # This should NOT replace the CA due to --overwrite=false when a CA already exists.
  90. - name: Create the front-proxy CA if it does not already exist
  91. command: >
  92. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm ca create-signer-cert
  93. --cert="{{ openshift_ca_config_dir }}/front-proxy-ca.crt"
  94. --key="{{ openshift_ca_config_dir }}/front-proxy-ca.key"
  95. --serial="{{ openshift_ca_config_dir }}/ca.serial.txt"
  96. --expire-days={{ openshift_ca_cert_expire_days }}
  97. --overwrite=false
  98. when: master_front_proxy_ca_missing | bool or openshift_certificates_redeploy | default(false) | bool
  99. delegate_to: "{{ openshift_ca_host }}"
  100. run_once: true
  101. # This should NOT replace the CA due to --overwrite=false when a CA already exists.
  102. - name: Create the master certificates if they do not already exist
  103. command: >
  104. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm ca create-master-certs
  105. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | lib_utils_oo_collect('cafile') %}
  106. --certificate-authority {{ named_ca_certificate }}
  107. {% endfor %}
  108. {% for legacy_ca_certificate in g_master_legacy_ca_result.files | default([]) | lib_utils_oo_collect('path') %}
  109. --certificate-authority {{ legacy_ca_certificate }}
  110. {% endfor %}
  111. --hostnames={{ hostvars[openshift_ca_host].openshift.common.all_hostnames | join(',') }}
  112. --master={{ openshift.master.api_url }}
  113. --public-master={{ openshift.master.public_api_url }}
  114. --cert-dir={{ openshift_ca_config_dir }}
  115. --expire-days={{ openshift_master_cert_expire_days }}
  116. --signer-expire-days={{ openshift_ca_cert_expire_days }}
  117. --overwrite=false
  118. when: master_ca_missing | bool or openshift_certificates_redeploy | default(false) | bool
  119. delegate_to: "{{ openshift_ca_host }}"
  120. run_once: true
  121. # Create client-ca-bundle.crt containing old and new OpenShift CA
  122. # certificates. This bundle will be used when rolling the OpenShift CA
  123. # certificate.
  124. - name: Create client-ca-bundle.crt
  125. block:
  126. - command: mktemp -d /tmp/openshift-ansible-XXXXXX
  127. register: openshift_ca_clientconfig_tmpdir
  128. delegate_to: "{{ openshift_ca_host }}"
  129. - copy:
  130. src: "{{ item }}"
  131. dest: "{{ openshift_ca_clientconfig_tmpdir.stdout }}/"
  132. remote_src: true
  133. with_items: "{{ g_master_legacy_ca_result.files | default([]) | lib_utils_oo_collect('path') }}"
  134. delegate_to: "{{ openshift_ca_host }}"
  135. run_once: true
  136. - copy:
  137. src: "{{ openshift_ca_config_dir }}/ca.crt"
  138. dest: "{{ openshift_ca_clientconfig_tmpdir.stdout }}/"
  139. remote_src: true
  140. delegate_to: "{{ openshift_ca_host }}"
  141. run_once: true
  142. - assemble:
  143. src: "{{ openshift_ca_clientconfig_tmpdir.stdout }}"
  144. dest: "{{ openshift_ca_config_dir }}/client-ca-bundle.crt"
  145. mode: 0644
  146. owner: root
  147. group: root
  148. delegate_to: "{{ openshift_ca_host }}"
  149. run_once: true
  150. - name: Test local loopback context
  151. command: >
  152. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} config view
  153. --config={{ openshift_master_loopback_config }}
  154. changed_when: false
  155. register: loopback_config
  156. delegate_to: "{{ openshift_ca_host }}"
  157. run_once: true
  158. # create-api-client-config generates a ca.crt file which will
  159. # overwrite the OpenShift CA certificate. Generate the loopback
  160. # kubeconfig in a temporary directory and then copy files into the
  161. # master config dir to avoid overwriting ca.crt.
  162. - block:
  163. - name: Create temp directory for loopback master client config
  164. command: mktemp -d /tmp/openshift-ansible-XXXXXX
  165. register: openshift_ca_loopback_tmpdir
  166. - name: Generate the loopback master client config
  167. command: >
  168. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm create-api-client-config
  169. --certificate-authority={{ openshift_ca_cert }}
  170. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | lib_utils_oo_collect('cafile') %}
  171. --certificate-authority {{ named_ca_certificate }}
  172. {% endfor %}
  173. --client-dir={{ openshift_ca_loopback_tmpdir.stdout }}
  174. --groups=system:masters,system:openshift-master
  175. --master={{ hostvars[openshift_ca_host].openshift.master.loopback_api_url }}
  176. --public-master={{ hostvars[openshift_ca_host].openshift.master.loopback_api_url }}
  177. --signer-cert={{ openshift_ca_cert }}
  178. --signer-key={{ openshift_ca_key }}
  179. --signer-serial={{ openshift_ca_serial }}
  180. --user=system:openshift-master
  181. --basename=openshift-master
  182. --expire-days={{ openshift_master_cert_expire_days }}
  183. - name: Copy generated loopback master client config to master config dir
  184. copy:
  185. src: "{{ openshift_ca_loopback_tmpdir.stdout }}/{{ item }}"
  186. dest: "{{ openshift_ca_config_dir }}"
  187. remote_src: true
  188. with_items:
  189. - openshift-master.crt
  190. - openshift-master.key
  191. - openshift-master.kubeconfig
  192. - name: Delete temp directory
  193. file:
  194. name: "{{ openshift_ca_loopback_tmpdir.stdout }}"
  195. state: absent
  196. when: loopback_context_string not in loopback_config.stdout
  197. delegate_to: "{{ openshift_ca_host }}"
  198. run_once: true
  199. # create-api-client-config generates a ca.crt file which will
  200. # overwrite the OpenShift CA certificate. Generate the loopback
  201. # kubeconfig in a temporary directory and then copy files into the
  202. # master config dir to avoid overwriting ca.crt.
  203. - block:
  204. - name: Create temp directory for loopback master client config
  205. command: mktemp -d /tmp/openshift-ansible-XXXXXX
  206. register: openshift_ca_loopback_tmpdir
  207. - name: Generate the aggregator api-client config
  208. command: >
  209. {{ hostvars[openshift_ca_host]['first_master_client_binary'] }} adm create-api-client-config
  210. --certificate-authority={{ openshift_ca_cert }}
  211. {% for named_ca_certificate in openshift.master.named_certificates | default([]) | lib_utils_oo_collect('cafile') %}
  212. --certificate-authority {{ named_ca_certificate }}
  213. {% endfor %}
  214. --client-dir={{ openshift_ca_loopback_tmpdir.stdout }}
  215. --user=aggregator-front-proxy
  216. --signer-cert="{{ openshift_ca_config_dir }}/front-proxy-ca.crt"
  217. --signer-key="{{ openshift_ca_config_dir }}/front-proxy-ca.key"
  218. --signer-serial={{ openshift_ca_serial }}
  219. --expire-days={{ openshift_master_cert_expire_days }}
  220. - name: Copy generated loopback master client config to master config dir
  221. copy:
  222. src: "{{ openshift_ca_loopback_tmpdir.stdout }}/{{ item }}"
  223. dest: "{{ openshift_ca_config_dir }}"
  224. remote_src: true
  225. with_items:
  226. - aggregator-front-proxy.crt
  227. - aggregator-front-proxy.key
  228. - aggregator-front-proxy.kubeconfig
  229. - name: Delete temp directory
  230. file:
  231. name: "{{ openshift_ca_loopback_tmpdir.stdout }}"
  232. state: absent
  233. delegate_to: "{{ openshift_ca_host }}"
  234. run_once: true
  235. - name: Restore original serviceaccount keys
  236. copy:
  237. src: "{{ item }}.keep"
  238. dest: "{{ item }}"
  239. remote_src: true
  240. with_items:
  241. - "{{ openshift_ca_config_dir }}/serviceaccounts.private.key"
  242. - "{{ openshift_ca_config_dir }}/serviceaccounts.public.key"
  243. when: openshift_certificates_redeploy | default(false) | bool
  244. - name: Remove backup serviceaccount keys
  245. file:
  246. path: "{{ item }}.keep"
  247. state: absent
  248. with_items:
  249. - "{{ openshift_ca_config_dir }}/serviceaccounts.private.key"
  250. - "{{ openshift_ca_config_dir }}/serviceaccounts.public.key"
  251. when: openshift_certificates_redeploy | default(false) | bool