You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

152 lines
5.3 KiB

  1. ---
  2. - name: Gen_certs | create etcd script dir
  3. file:
  4. path: "{{ etcd_script_dir }}"
  5. state: directory
  6. owner: root
  7. when: inventory_hostname == groups['etcd'][0]
  8. - name: Gen_certs | create etcd cert dir
  9. file:
  10. path={{ etcd_cert_dir }}
  11. group={{ etcd_cert_group }}
  12. state=directory
  13. owner=root
  14. recurse=yes
  15. - name: Gen_certs | write openssl config
  16. template:
  17. src: "openssl.conf.j2"
  18. dest: "{{ etcd_config_dir }}/openssl.conf"
  19. run_once: yes
  20. delegate_to: "{{groups['etcd'][0]}}"
  21. when: gen_certs|default(false)
  22. - name: Gen_certs | copy certs generation script
  23. copy:
  24. src: "make-ssl-etcd.sh"
  25. dest: "{{ etcd_script_dir }}/make-ssl-etcd.sh"
  26. mode: 0700
  27. run_once: yes
  28. delegate_to: "{{groups['etcd'][0]}}"
  29. when: gen_certs|default(false)
  30. - name: Gen_certs | run cert generation script
  31. command: "{{ etcd_script_dir }}/make-ssl-etcd.sh -f {{ etcd_config_dir }}/openssl.conf -d {{ etcd_cert_dir }}"
  32. environment:
  33. - MASTERS: "{% for m in groups['etcd'] %}
  34. {% if hostvars[m].sync_certs|default(false) %}
  35. {{ m }}
  36. {% endif %}
  37. {% endfor %}"
  38. - HOSTS: "{% for h in (groups['k8s-cluster'] + groups['calico-rr']|default([]))|unique %}
  39. {% if hostvars[h].sync_certs|default(false) %}
  40. {{ h }}
  41. {% endif %}
  42. {% endfor %}"
  43. run_once: yes
  44. delegate_to: "{{groups['etcd'][0]}}"
  45. when: gen_certs|default(false)
  46. notify: set etcd_secret_changed
  47. - set_fact:
  48. all_master_certs: "['ca-key.pem',
  49. {% for node in groups['etcd'] %}
  50. 'admin-{{ node }}.pem',
  51. 'admin-{{ node }}-key.pem',
  52. 'member-{{ node }}.pem',
  53. 'member-{{ node }}-key.pem',
  54. {% endfor %}]"
  55. my_master_certs: ['ca-key.pem',
  56. 'admin-{{ inventory_hostname }}.pem',
  57. 'admin-{{ inventory_hostname }}-key.pem',
  58. 'member-{{ inventory_hostname }}.pem',
  59. 'member-{{ inventory_hostname }}-key.pem'
  60. ]
  61. all_node_certs: "['ca.pem',
  62. {% for node in (groups['k8s-cluster'] + groups['calico-rr']|default([]))|unique %}
  63. 'node-{{ node }}.pem',
  64. 'node-{{ node }}-key.pem',
  65. {% endfor %}]"
  66. my_node_certs: ['ca.pem', 'node-{{ inventory_hostname }}.pem', 'node-{{ inventory_hostname }}-key.pem']
  67. tags: facts
  68. - name: Gen_certs | Gather etcd master certs
  69. shell: "tar cfz - -C {{ etcd_cert_dir }} -T /dev/stdin <<< {{ my_master_certs|join(' ') }} {{ all_node_certs|join(' ') }} | base64 --wrap=0"
  70. args:
  71. executable: /bin/bash
  72. register: etcd_master_cert_data
  73. delegate_to: "{{groups['etcd'][0]}}"
  74. when: inventory_hostname in groups['etcd'] and sync_certs|default(false) and
  75. inventory_hostname != groups['etcd'][0]
  76. notify: set etcd_secret_changed
  77. - name: Gen_certs | Gather etcd node certs
  78. shell: "tar cfz - -C {{ etcd_cert_dir }} -T /dev/stdin <<< {{ my_node_certs|join(' ') }} | base64 --wrap=0"
  79. args:
  80. executable: /bin/bash
  81. register: etcd_node_cert_data
  82. delegate_to: "{{groups['etcd'][0]}}"
  83. when: (('calico-rr' in groups and inventory_hostname in groups['calico-rr']) or
  84. inventory_hostname in groups['k8s-cluster']) and
  85. sync_certs|default(false) and inventory_hostname not in groups['etcd']
  86. notify: set etcd_secret_changed
  87. - name: Gen_certs | Copy certs on masters
  88. shell: "base64 -d <<< '{{etcd_master_cert_data.stdout|quote}}' | tar xz -C {{ etcd_cert_dir }}"
  89. args:
  90. executable: /bin/bash
  91. changed_when: false
  92. when: inventory_hostname in groups['etcd'] and sync_certs|default(false) and
  93. inventory_hostname != groups['etcd'][0]
  94. - name: Gen_certs | Copy certs on nodes
  95. shell: "base64 -d <<< '{{etcd_node_cert_data.stdout|quote}}' | tar xz -C {{ etcd_cert_dir }}"
  96. args:
  97. executable: /bin/bash
  98. changed_when: false
  99. when: sync_certs|default(false) and
  100. inventory_hostname not in groups['etcd']
  101. - name: Gen_certs | check certificate permissions
  102. file:
  103. path={{ etcd_cert_dir }}
  104. group={{ etcd_cert_group }}
  105. state=directory
  106. owner=kube
  107. recurse=yes
  108. tags: facts
  109. - name: Gen_certs | set permissions on keys
  110. shell: chmod 0600 {{ etcd_cert_dir}}/*key.pem
  111. when: inventory_hostname in groups['etcd']
  112. changed_when: false
  113. - name: Gen_certs | target ca-certificate store file
  114. set_fact:
  115. ca_cert_path: |-
  116. {% if ansible_os_family == "Debian" -%}
  117. /usr/local/share/ca-certificates/etcd-ca.crt
  118. {%- elif ansible_os_family == "RedHat" -%}
  119. /etc/pki/ca-trust/source/anchors/etcd-ca.crt
  120. {%- elif ansible_os_family in ["CoreOS", "Container Linux by CoreOS"] -%}
  121. /etc/ssl/certs/etcd-ca.pem
  122. {%- endif %}
  123. tags: facts
  124. - name: Gen_certs | add CA to trusted CA dir
  125. copy:
  126. src: "{{ etcd_cert_dir }}/ca.pem"
  127. dest: "{{ ca_cert_path }}"
  128. remote_src: true
  129. register: etcd_ca_cert
  130. - name: Gen_certs | update ca-certificates (Debian/Ubuntu/Container Linux by CoreOS)
  131. command: update-ca-certificates
  132. when: etcd_ca_cert.changed and ansible_os_family in ["Debian", "Container Linux by CoreOS"]
  133. - name: Gen_certs | update ca-certificates (RedHat)
  134. command: update-ca-trust extract
  135. when: etcd_ca_cert.changed and ansible_os_family == "RedHat"