blob: f32073f0948cc091b9915ee88ba865698c861351 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
|
---
- name: Master Install Checkpoint Start
hosts: oo_all_hosts
gather_facts: false
tasks:
- name: Set Master install 'In Progress'
set_stats:
data:
installer_phase_master: "In Progress"
aggregate: false
- include: certificates.yml
- name: Disable excluders
hosts: oo_masters_to_config
gather_facts: no
roles:
- role: openshift_excluder
r_openshift_excluder_action: disable
r_openshift_excluder_service_type: "{{ openshift.common.service_type }}"
- name: Gather and set facts for master hosts
hosts: oo_masters_to_config
pre_tasks:
# Per https://bugzilla.redhat.com/show_bug.cgi?id=1469336
#
# When scaling up a cluster upgraded from OCP <= 3.5, ensure that
# OPENSHIFT_DEFAULT_REGISTRY is present as defined on the existing
# masters, or absent if such is the case.
- name: Detect if this host is a new master in a scale up
set_fact:
g_openshift_master_is_scaleup: "{{ openshift.common.hostname in ( groups['new_masters'] | default([]) ) }}"
- name: Scaleup Detection
debug:
var: g_openshift_master_is_scaleup
- name: Check for RPM generated config marker file .config_managed
stat:
path: /etc/origin/.config_managed
register: rpmgenerated_config
- name: Remove RPM generated config files if present
file:
path: "/etc/origin/{{ item }}"
state: absent
when:
- rpmgenerated_config.stat.exists == true
- deployment_type == 'openshift-enterprise'
with_items:
- master
- node
- .config_managed
- set_fact:
openshift_master_etcd_port: "{{ (etcd_client_port | default('2379')) if (groups.oo_etcd_to_config is defined and groups.oo_etcd_to_config) else none }}"
openshift_master_etcd_hosts: "{{ hostvars
| oo_select_keys(groups['oo_etcd_to_config']
| default([]))
| oo_collect('openshift.common.hostname')
| default(none, true) }}"
roles:
- openshift_facts
post_tasks:
- openshift_facts:
role: master
local_facts:
api_port: "{{ openshift_master_api_port | default(None) }}"
api_url: "{{ openshift_master_api_url | default(None) }}"
api_use_ssl: "{{ openshift_master_api_use_ssl | default(None) }}"
controllers_port: "{{ openshift_master_controllers_port | default(None) }}"
public_api_url: "{{ openshift_master_public_api_url | default(None) }}"
cluster_hostname: "{{ openshift_master_cluster_hostname | default(None) }}"
cluster_public_hostname: "{{ openshift_master_cluster_public_hostname | default(None) }}"
console_path: "{{ openshift_master_console_path | default(None) }}"
console_port: "{{ openshift_master_console_port | default(None) }}"
console_url: "{{ openshift_master_console_url | default(None) }}"
console_use_ssl: "{{ openshift_master_console_use_ssl | default(None) }}"
public_console_url: "{{ openshift_master_public_console_url | default(None) }}"
ha: "{{ openshift_master_ha | default(groups.oo_masters | length > 1) }}"
master_count: "{{ openshift_master_count | default(groups.oo_masters | length) }}"
- name: Inspect state of first master config settings
hosts: oo_first_master
roles:
- role: openshift_facts
post_tasks:
- openshift_facts:
role: master
local_facts:
session_auth_secrets: "{{ openshift_master_session_auth_secrets | default(openshift.master.session_auth_secrets | default(None)) }}"
session_encryption_secrets: "{{ openshift_master_session_encryption_secrets | default(openshift.master.session_encryption_secrets | default(None)) }}"
- name: Check for existing configuration
stat:
path: /etc/origin/master/master-config.yaml
register: master_config_stat
- name: Set clean install fact
set_fact:
l_clean_install: "{{ not master_config_stat.stat.exists | bool }}"
- name: Determine if etcd3 storage is in use
command: grep -Pzo "storage-backend:\n.*etcd3" /etc/origin/master/master-config.yaml -q
register: etcd3_grep
failed_when: false
changed_when: false
- name: Set etcd3 fact
set_fact:
l_etcd3_enabled: "{{ etcd3_grep.rc == 0 | bool }}"
- name: Check if atomic-openshift-master sysconfig exists yet
stat:
path: /etc/sysconfig/atomic-openshift-master
register: l_aom_exists
- name: Preserve OPENSHIFT_DEFAULT_REGISTRY master parameter if present
command: awk '/^OPENSHIFT_DEFAULT_REGISTRY/' /etc/sysconfig/atomic-openshift-master
register: l_default_registry_defined
when: l_aom_exists.stat.exists | bool
- name: Check if atomic-openshift-master-api sysconfig exists yet
stat:
path: /etc/sysconfig/atomic-openshift-master-api
register: l_aom_api_exists
- name: Preserve OPENSHIFT_DEFAULT_REGISTRY master-api parameter if present
command: awk '/^OPENSHIFT_DEFAULT_REGISTRY/' /etc/sysconfig/atomic-openshift-master-api
register: l_default_registry_defined_api
when: l_aom_api_exists.stat.exists | bool
- name: Check if atomic-openshift-master-controllers sysconfig exists yet
stat:
path: /etc/sysconfig/atomic-openshift-master-controllers
register: l_aom_controllers_exists
- name: Preserve OPENSHIFT_DEFAULT_REGISTRY master-controllers parameter if present
command: awk '/^OPENSHIFT_DEFAULT_REGISTRY/' /etc/sysconfig/atomic-openshift-master-controllers
register: l_default_registry_defined_controllers
when: l_aom_controllers_exists.stat.exists | bool
- name: Update facts with OPENSHIFT_DEFAULT_REGISTRY value
set_fact:
l_default_registry_value: "{{ l_default_registry_defined.stdout | default('') }}"
l_default_registry_value_api: "{{ l_default_registry_defined_api.stdout | default('') }}"
l_default_registry_value_controllers: "{{ l_default_registry_defined_controllers.stdout | default('') }}"
- name: Generate master session secrets
hosts: oo_first_master
vars:
g_session_secrets_present: "{{ (openshift.master.session_auth_secrets | default([])) | length > 0 and (openshift.master.session_encryption_secrets | default([])) | length > 0 }}"
g_session_auth_secrets: "{{ [ 24 | oo_generate_secret ] }}"
g_session_encryption_secrets: "{{ [ 24 | oo_generate_secret ] }}"
roles:
- role: openshift_facts
tasks:
- openshift_facts:
role: master
local_facts:
session_auth_secrets: "{{ g_session_auth_secrets }}"
session_encryption_secrets: "{{ g_session_encryption_secrets }}"
when: not g_session_secrets_present | bool
- name: Configure masters
hosts: oo_masters_to_config
any_errors_fatal: true
vars:
openshift_master_ha: "{{ openshift.master.ha }}"
openshift_master_count: "{{ openshift.master.master_count }}"
openshift_master_session_auth_secrets: "{{ hostvars[groups.oo_first_master.0].openshift.master.session_auth_secrets }}"
openshift_master_session_encryption_secrets: "{{ hostvars[groups.oo_first_master.0].openshift.master.session_encryption_secrets }}"
openshift_ca_host: "{{ groups.oo_first_master.0 }}"
openshift_master_etcd_hosts: "{{ hostvars
| oo_select_keys(groups['oo_etcd_to_config'] | default([]))
| oo_collect('openshift.common.hostname')
| default(none, true) }}"
openshift_no_proxy_etcd_host_ips: "{{ hostvars | oo_select_keys(groups['oo_etcd_to_config'] | default([]))
| oo_collect('openshift.common.ip') | default([]) | join(',')
}}"
roles:
- role: os_firewall
- role: openshift_master_facts
- role: openshift_hosted_facts
- role: openshift_clock
- role: openshift_cloud_provider
- role: openshift_builddefaults
- role: openshift_buildoverrides
- role: nickhammond.logrotate
- role: contiv
contiv_role: netmaster
when: openshift_use_contiv | default(False) | bool
- role: openshift_master
openshift_master_hosts: "{{ groups.oo_masters_to_config }}"
r_openshift_master_clean_install: "{{ hostvars[groups.oo_first_master.0].l_clean_install }}"
r_openshift_master_etcd3_storage: "{{ hostvars[groups.oo_first_master.0].l_etcd3_enabled }}"
openshift_master_is_scaleup_host: "{{ g_openshift_master_is_scaleup | default(false) }}"
openshift_master_default_registry_value: "{{ hostvars[groups.oo_first_master.0].l_default_registry_value }}"
openshift_master_default_registry_value_api: "{{ hostvars[groups.oo_first_master.0].l_default_registry_value_api }}"
openshift_master_default_registry_value_controllers: "{{ hostvars[groups.oo_first_master.0].l_default_registry_value_controllers }}"
- role: tuned
- role: nuage_ca
when: openshift_use_nuage | default(false) | bool
- role: nuage_common
when: openshift_use_nuage | default(false) | bool
- role: nuage_master
when: openshift_use_nuage | default(false) | bool
- role: calico_master
when: openshift_use_calico | default(false) | bool
tasks:
- include_role:
name: kuryr
tasks_from: master
when: openshift_use_kuryr | default(false) | bool
- name: Setup the compute and infra node config maps
include_role:
name: openshift_node_bootstrap_configmap
tasks_from: standard.yml
when: openshift_master_bootstrap_enabled | default(false) | bool
run_once: True
post_tasks:
- name: Create group for deployment type
group_by: key=oo_masters_deployment_type_{{ openshift.common.deployment_type }}
changed_when: False
- name: Configure API Aggregation on masters
hosts: oo_masters
serial: 1
tasks:
- include: tasks/wire_aggregator.yml
- name: Re-enable excluder if it was previously enabled
hosts: oo_masters_to_config
gather_facts: no
roles:
- role: openshift_excluder
r_openshift_excluder_action: enable
r_openshift_excluder_service_type: "{{ openshift.common.service_type }}"
- name: Master Install Checkpoint End
hosts: oo_all_hosts
gather_facts: false
tasks:
- name: Set Master install 'Complete'
set_stats:
data:
installer_phase_master: "Complete"
aggregate: false
|