summaryrefslogtreecommitdiffstats
path: root/roles/openshift_hosted/tasks/secure.yml
blob: 378ae32dcfd60bfb12768a763ba314bd6f4d25a1 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
---
- name: Include reencrypt route configuration
  include_tasks: secure/reencrypt.yml
  when: openshift_hosted_registry_routetermination == 'reencrypt'

- name: Include passthrough route configuration
  include_tasks: secure/passthrough.yml
  when: openshift_hosted_registry_routetermination == 'passthrough'

- name: Fetch the docker-registry route
  oc_route:
    name: docker-registry
    namespace: default
    state: list
  register: docker_registry_route

- name: Retrieve registry service for the clusterip
  oc_service:
    namespace: "{{ openshift_hosted_registry_namespace }}"
    name: docker-registry
    state: list
  register: docker_registry_service

- name: Generate self-signed docker-registry certificates
  oc_adm_ca_server_cert:
    signer_cert: "{{ openshift_master_config_dir }}/ca.crt"
    signer_key: "{{ openshift_master_config_dir }}/ca.key"
    signer_serial: "{{ openshift_master_config_dir }}/ca.serial.txt"
    hostnames:
    - "{{ docker_registry_service.results.clusterip }}"
    - "{{ docker_registry_route.results[0].spec.host }}"
    - "{{ openshift_hosted_registry_name }}.default.svc"
    - "{{ openshift_hosted_registry_name }}.default.svc.{{ openshift_cluster_domain }}"
    - "{{ openshift_hosted_registry_routehost | default(omit) }}"
    cert: "{{ docker_registry_cert_path }}"
    key: "{{ docker_registry_key_path }}"
    expire_days: "{{ openshift_hosted_registry_cert_expire_days }}"
  register: registry_self_cert
  when: docker_registry_self_signed

# Setting up REGISTRY_HTTP_TLS_CLIENTCAS as the cacert doesn't seem to work.
# If we need to set up a cacert, bundle it with the cert.
- when: docker_registry_cacert_path is defined
  block:
  - name: Retrieve certificate files to generate certificate bundle
    slurp:
      src: "{{ item }}"
    with_items:
    - "{{ docker_registry_cert_path }}"
    - "{{ docker_registry_cacert_path }}"
    register: certificate_files

  - name: Generate certificate bundle
    copy:
      content: "{{ certificate_files.results | map(attribute='content') | map('b64decode') | join('') }}"
      dest: "{{ openshift_master_config_dir }}/named_certificates/docker-registry.pem"

  - name: Reset the certificate path to use the bundle
    set_fact:
      docker_registry_cert_path: "{{ openshift_master_config_dir }}/named_certificates/docker-registry.pem"

- name: Create the secret for the registry certificates
  oc_secret:
    name: registry-certificates
    namespace: "{{ openshift_hosted_registry_namespace }}"
    files:
    - name: registry.crt
      path: "{{ docker_registry_cert_path }}"
    - name: registry.key
      path: "{{ docker_registry_key_path }}"
  register: create_registry_certificates_secret_out

- name: Add the secret to the registry's pod service accounts
  oc_serviceaccount_secret:
    service_account: "{{ item }}"
    secret: registry-certificates
    namespace: "{{ openshift_hosted_registry_namespace }}"
  with_items:
  - registry
  - default

- name: Set facts for secure registry
  set_fact:
    registry_secure_volume_mounts:
    - name: registry-certificates
      path: /etc/secrets
      type: secret
      secret_name: registry-certificates
    registry_secure_env_vars:
      REGISTRY_HTTP_TLS_CERTIFICATE: /etc/secrets/registry.crt
      REGISTRY_HTTP_TLS_KEY: /etc/secrets/registry.key
    registry_secure_edits:
    - key: spec.template.spec.containers[0].livenessProbe.httpGet.scheme
      value: HTTPS
      action: put
    - key: spec.template.spec.containers[0].readinessProbe.httpGet.scheme
      value: HTTPS
      action: put

- name: Detect if there has been certificate changes
  set_fact:
    registry_cert_changed: true
  when: ( registry_self_cert is defined and registry_self_cert.changed ) or
        create_registry_certificates_secret_out.changed

- name: Update openshift_hosted facts with secure registry variables
  set_fact:
    openshift_hosted_registry_volumes: "{{ openshift_hosted_registry_volumes | union(registry_secure_volume_mounts) }}"
    openshift_hosted_registry_env_vars: "{{ openshift_hosted_registry_env_vars | combine(registry_secure_env_vars) }}"
    openshift_hosted_registry_edits: "{{ openshift_hosted_registry_edits | union(registry_secure_edits) }}"
    openshift_hosted_registry_force: "{{ openshift_hosted_registry_force | union([registry_cert_changed | default(false)]) }}"