main.yml 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748
  1. ---
  2. - name: Calico Master | Assure the calico certs have been generated
  3. stat:
  4. path: "{{ item }}"
  5. with_items:
  6. - "{{ calico_etcd_ca_cert_file }}"
  7. - "{{ calico_etcd_cert_file }}"
  8. - "{{ calico_etcd_key_file }}"
  9. - name: Calico Master | Create temp directory for policy controller definition
  10. command: mktemp -d /tmp/openshift-ansible-XXXXXXX
  11. register: mktemp
  12. changed_when: False
  13. - name: Calico Master | Write Calico Policy Controller definition
  14. template:
  15. dest: "{{ mktemp.stdout }}/calico-policy-controller.yml"
  16. src: calico-policy-controller.yml.j2
  17. - name: Calico Master | Launch Calico Policy Controller
  18. command: >
  19. {{ openshift_client_binary }} create
  20. -f {{ mktemp.stdout }}/calico-policy-controller.yml
  21. --config={{ openshift.common.config_base }}/master/admin.kubeconfig
  22. register: calico_create_output
  23. failed_when: ('already exists' not in calico_create_output.stderr) and ('created' not in calico_create_output.stdout)
  24. changed_when: ('created' in calico_create_output.stdout)
  25. - name: Calico Master | Delete temp directory
  26. file:
  27. name: "{{ mktemp.stdout }}"
  28. state: absent
  29. changed_when: False
  30. - name: Calico Master | oc adm policy add-scc-to-user privileged system:serviceaccount:kube-system:calico
  31. oc_adm_policy_user:
  32. user: system:serviceaccount:kube-system:calico
  33. resource_kind: scc
  34. resource_name: privileged
  35. state: present
  36. - name: Download Calicoctl
  37. become: yes
  38. get_url:
  39. url: "{{ calico_url_calicoctl }}"
  40. dest: "{{ calicoctl_bin_dir }}"
  41. mode: a+x