--- - name: generate monitor initial keyring local_action: module: shell python -c "import os ; import struct ; import time; import base64 ; key = os.urandom(16) ; header = struct.pack('= ceph_release_num.luminous set_fact: client_admin_ceph_authtool_cap: mon: allow * osd: allow * mds: allow mgr: allow * when: - ceph_release_num[ceph_release] >= ceph_release_num.luminous - cephx - admin_secret != 'admin_secret' - name: set_fact client_admin_ceph_authtool_cap < ceph_release_num.luminous set_fact: client_admin_ceph_authtool_cap: mon: allow * osd: allow * mds: allow when: - ceph_release_num[ceph_release] < ceph_release_num.luminous - cephx - admin_secret != 'admin_secret' - name: create custom admin keyring ceph_key: name: client.admin state: present secret: "{{ admin_secret }}" auid: 0 caps: "{{ client_admin_ceph_authtool_cap }}" import_key: False cluster: "{{ cluster }}" register: create_custom_admin_secret when: - cephx - admin_secret != 'admin_secret' - name: set ownership of admin keyring file: path: /etc/ceph/{{ cluster }}.client.admin.keyring state: file owner: 'ceph' group: 'ceph' mode: "{{ ceph_keyring_permissions }}" when: - cephx - admin_secret != 'admin_secret' - name: import admin keyring into mon keyring command: ceph-authtool /var/lib/ceph/tmp/{{ cluster }}.mon..keyring --import-keyring /etc/ceph/{{ cluster }}.client.admin.keyring when: - not create_custom_admin_secret.get('skipped') - cephx - admin_secret != 'admin_secret' - name: ceph monitor mkfs with keyring command: ceph-mon --cluster {{ cluster }} --setuser ceph --setgroup ceph --mkfs -i {{ monitor_name }} --fsid {{ fsid }} --keyring /var/lib/ceph/tmp/{{ cluster }}.mon..keyring args: creates: /var/lib/ceph/mon/{{ cluster }}-{{ monitor_name }}/keyring when: - cephx - name: ceph monitor mkfs without keyring command: ceph-mon --cluster {{ cluster }} --setuser ceph --setgroup ceph --mkfs -i {{ monitor_name }} --fsid {{ fsid }} args: creates: /var/lib/ceph/mon/{{ cluster }}-{{ monitor_name }}/store.db when: - not cephx