You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

151 lines
5.1 KiB

  1. ---
  2. - name: Gen_certs | create etcd script dir
  3. file:
  4. path: "{{ etcd_script_dir }}"
  5. state: directory
  6. owner: root
  7. when: inventory_hostname == groups['etcd'][0]
  8. - name: Gen_certs | create etcd cert dir
  9. file:
  10. path={{ etcd_cert_dir }}
  11. group={{ etcd_cert_group }}
  12. state=directory
  13. owner=root
  14. recurse=yes
  15. - name: Gen_certs | write openssl config
  16. template:
  17. src: "openssl.conf.j2"
  18. dest: "{{ etcd_config_dir }}/openssl.conf"
  19. run_once: yes
  20. delegate_to: "{{groups['etcd'][0]}}"
  21. when: gen_certs|default(false)
  22. - name: Gen_certs | copy certs generation script
  23. copy:
  24. src: "make-ssl-etcd.sh"
  25. dest: "{{ etcd_script_dir }}/make-ssl-etcd.sh"
  26. mode: 0700
  27. run_once: yes
  28. delegate_to: "{{groups['etcd'][0]}}"
  29. when: gen_certs|default(false)
  30. - name: Gen_certs | run cert generation script
  31. command: "{{ etcd_script_dir }}/make-ssl-etcd.sh -f {{ etcd_config_dir }}/openssl.conf -d {{ etcd_cert_dir }}"
  32. environment:
  33. - MASTERS: "{% for m in groups['etcd'] %}
  34. {% if hostvars[m].sync_certs|default(false) %}
  35. {{ m }}
  36. {% endif %}
  37. {% endfor %}"
  38. - HOSTS: "{% for h in groups['k8s-cluster'] %}
  39. {% if hostvars[h].sync_certs|default(false) %}
  40. {{ h }}
  41. {% endif %}
  42. {% endfor %}"
  43. run_once: yes
  44. delegate_to: "{{groups['etcd'][0]}}"
  45. when: gen_certs|default(false)
  46. notify: set etcd_secret_changed
  47. - set_fact:
  48. all_master_certs: "['ca-key.pem',
  49. {% for node in groups['etcd'] %}
  50. 'admin-{{ node }}.pem',
  51. 'admin-{{ node }}-key.pem',
  52. 'member-{{ node }}.pem',
  53. 'member-{{ node }}-key.pem',
  54. {% endfor %}]"
  55. my_master_certs: ['ca-key.pem',
  56. 'admin-{{ inventory_hostname }}.pem',
  57. 'admin-{{ inventory_hostname }}-key.pem',
  58. 'member-{{ inventory_hostname }}.pem',
  59. 'member-{{ inventory_hostname }}-key.pem'
  60. ]
  61. all_node_certs: "['ca.pem',
  62. {% for node in groups['k8s-cluster'] %}
  63. 'node-{{ node }}.pem',
  64. 'node-{{ node }}-key.pem',
  65. {% endfor %}]"
  66. my_node_certs: ['ca.pem', 'node-{{ inventory_hostname }}.pem', 'node-{{ inventory_hostname }}-key.pem']
  67. tags: facts
  68. - name: Gen_certs | Gather etcd master certs
  69. shell: "tar cfz - -C {{ etcd_cert_dir }} -T /dev/stdin <<< {{ my_master_certs|join(' ') }} {{ all_node_certs|join(' ') }} | base64 --wrap=0"
  70. args:
  71. executable: /bin/bash
  72. register: etcd_master_cert_data
  73. delegate_to: "{{groups['etcd'][0]}}"
  74. when: inventory_hostname in groups['etcd'] and sync_certs|default(false) and
  75. inventory_hostname != groups['etcd'][0]
  76. notify: set etcd_secret_changed
  77. - name: Gen_certs | Gather etcd node certs
  78. shell: "tar cfz - -C {{ etcd_cert_dir }} -T /dev/stdin <<< {{ my_node_certs|join(' ') }} | base64 --wrap=0"
  79. args:
  80. executable: /bin/bash
  81. register: etcd_node_cert_data
  82. delegate_to: "{{groups['etcd'][0]}}"
  83. when: inventory_hostname in groups['k8s-cluster'] and sync_certs|default(false) and
  84. inventory_hostname not in groups['etcd']
  85. notify: set etcd_secret_changed
  86. - name: Gen_certs | Copy certs on masters
  87. shell: "base64 -d <<< '{{etcd_master_cert_data.stdout|quote}}' | tar xz -C {{ etcd_cert_dir }}"
  88. args:
  89. executable: /bin/bash
  90. changed_when: false
  91. when: inventory_hostname in groups['etcd'] and sync_certs|default(false) and
  92. inventory_hostname != groups['etcd'][0]
  93. - name: Gen_certs | Copy certs on nodes
  94. shell: "base64 -d <<< '{{etcd_node_cert_data.stdout|quote}}' | tar xz -C {{ etcd_cert_dir }}"
  95. args:
  96. executable: /bin/bash
  97. changed_when: false
  98. when: sync_certs|default(false) and
  99. inventory_hostname not in groups['etcd']
  100. - name: Gen_certs | check certificate permissions
  101. file:
  102. path={{ etcd_cert_dir }}
  103. group={{ etcd_cert_group }}
  104. state=directory
  105. owner=kube
  106. recurse=yes
  107. tags: facts
  108. - name: Gen_certs | set permissions on keys
  109. shell: chmod 0600 {{ etcd_cert_dir}}/*key.pem
  110. when: inventory_hostname in groups['etcd']
  111. changed_when: false
  112. - name: Gen_certs | target ca-certificate store file
  113. set_fact:
  114. ca_cert_path: |-
  115. {% if ansible_os_family == "Debian" -%}
  116. /usr/local/share/ca-certificates/etcd-ca.crt
  117. {%- elif ansible_os_family == "RedHat" -%}
  118. /etc/pki/ca-trust/source/anchors/etcd-ca.crt
  119. {%- elif ansible_os_family == "CoreOS" -%}
  120. /etc/ssl/certs/etcd-ca.pem
  121. {%- endif %}
  122. tags: facts
  123. - name: Gen_certs | add CA to trusted CA dir
  124. copy:
  125. src: "{{ etcd_cert_dir }}/ca.pem"
  126. dest: "{{ ca_cert_path }}"
  127. remote_src: true
  128. register: etcd_ca_cert
  129. - name: Gen_certs | update ca-certificates (Debian/Ubuntu/CoreOS)
  130. command: update-ca-certificates
  131. when: etcd_ca_cert.changed and ansible_os_family in ["Debian", "CoreOS"]
  132. - name: Gen_certs | update ca-certificates (RedHat)
  133. command: update-ca-trust extract
  134. when: etcd_ca_cert.changed and ansible_os_family == "RedHat"