kubeasz/roles/deploy/tasks/main.yml

126 lines
4.8 KiB
YAML
Raw Normal View History

2017-11-11 19:14:21 +08:00
- name: prepare some dirs
file: name={{ item }} state=directory
with_items:
- "{{ bin_dir }}"
- "{{ ca_dir }}"
- "{{ base_dir }}"
- "/etc/kubernetes"
2017-11-11 19:14:21 +08:00
- name: 下载证书工具 CFSSL和 kubectl
2017-11-11 19:14:21 +08:00
copy: src={{ base_dir }}/bin/{{ item }} dest={{ bin_dir }}/{{ item }} mode=0755
with_items:
- cfssl
- cfssl-certinfo
- cfssljson
- kubectl
# 注册变量p根据p的stat信息判断是否已经生成过ca证书如果没有下一步生成证书
# 如果已经有ca证书为了保证整个安装的幂等性跳过证书生成的步骤
- name: 读取ca证书stat信息
stat: path="{{ ca_dir }}/ca.pem"
register: p
2017-11-11 19:14:21 +08:00
- name: 准备CA配置文件
template: src=ca-config.json.j2 dest={{ ca_dir }}/ca-config.json
when: p.stat.isreg is not defined
2017-11-11 19:14:21 +08:00
- name: 准备CA签名请求
template: src=ca-csr.json.j2 dest={{ ca_dir }}/ca-csr.json
when: p.stat.isreg is not defined
2017-11-11 19:14:21 +08:00
- name: 生成 CA 证书和私钥
when: p.stat.isreg is not defined
2017-11-11 19:14:21 +08:00
shell: "cd {{ ca_dir }} && {{ bin_dir }}/cfssl gencert -initca ca-csr.json | {{ bin_dir }}/cfssljson -bare ca"
2018-03-18 18:25:38 +08:00
#----------- 创建kubectl kubeconfig文件: /root/.kube/config
- name: 准备kubectl使用的admin 证书签名请求
template: src=admin-csr.json.j2 dest={{ ca_dir }}/admin-csr.json
- name: 创建 admin证书与私钥
shell: "cd {{ ca_dir }} && {{ bin_dir }}/cfssl gencert \
-ca={{ ca_dir }}/ca.pem \
-ca-key={{ ca_dir }}/ca-key.pem \
-config={{ ca_dir }}/ca-config.json \
-profile=kubernetes admin-csr.json | {{ bin_dir }}/cfssljson -bare admin"
2018-03-18 18:25:38 +08:00
# 设置集群参数指定CA证书和apiserver地址
- name: 设置集群参数
shell: "{{ bin_dir }}/kubectl config set-cluster {{ CLUSTER_NAME }} \
--certificate-authority={{ ca_dir }}/ca.pem \
--embed-certs=true \
--server={{ KUBE_APISERVER }}"
2018-03-18 18:25:38 +08:00
# 设置客户端认证参数指定使用admin证书和私钥
- name: 设置客户端认证参数
shell: "{{ bin_dir }}/kubectl config set-credentials {{ USER_NAME }} \
--client-certificate={{ ca_dir }}/admin.pem \
--embed-certs=true \
--client-key={{ ca_dir }}/admin-key.pem"
2018-03-18 18:25:38 +08:00
# 设置上下文参数说明使用cluster集群和用户admin
- name: 设置上下文参数
shell: "{{ bin_dir }}/kubectl config set-context {{ CONTEXT_NAME }} \
--cluster={{ CLUSTER_NAME }} --user={{ USER_NAME }}"
2018-03-18 18:25:38 +08:00
# 选择默认上下文
- name: 选择默认上下文
shell: "{{ bin_dir }}/kubectl config use-context {{ CONTEXT_NAME }}"
2018-03-18 18:25:38 +08:00
#------------创建kube-proxy.kubeconfig配置文件: /root/kube-proxy.kubeconfig
- name: 准备kube-proxy 证书签名请求
template: src=kube-proxy-csr.json.j2 dest={{ ca_dir }}/kube-proxy-csr.json
- name: 创建 kube-proxy证书与私钥
shell: "cd {{ ca_dir }} && {{ bin_dir }}/cfssl gencert \
-ca={{ ca_dir }}/ca.pem \
-ca-key={{ ca_dir }}/ca-key.pem \
-config={{ ca_dir }}/ca-config.json \
-profile=kubernetes kube-proxy-csr.json | {{ bin_dir }}/cfssljson -bare kube-proxy"
- name: 设置集群参数
shell: "{{ bin_dir }}/kubectl config set-cluster kubernetes \
--certificate-authority={{ ca_dir }}/ca.pem \
--embed-certs=true \
--server={{ KUBE_APISERVER }} \
--kubeconfig=kube-proxy.kubeconfig"
- name: 设置客户端认证参数
shell: "{{ bin_dir }}/kubectl config set-credentials kube-proxy \
--client-certificate={{ ca_dir }}/kube-proxy.pem \
--client-key={{ ca_dir }}/kube-proxy-key.pem \
--embed-certs=true \
--kubeconfig=kube-proxy.kubeconfig"
- name: 设置上下文参数
shell: "{{ bin_dir }}/kubectl config set-context default \
--cluster=kubernetes \
--user=kube-proxy \
--kubeconfig=kube-proxy.kubeconfig"
- name: 选择默认上下文
shell: "{{ bin_dir }}/kubectl config use-context default --kubeconfig=kube-proxy.kubeconfig"
- name: 移动 kube-proxy.kubeconfig
shell: "mv /root/kube-proxy.kubeconfig /etc/kubernetes/"
2017-11-11 19:14:21 +08:00
# --- 以下为兼容ansible执行节点与deploy节点分离情况-------
- block:
- name: 在 ansible 执行节点创建 .kube 目录
file: path=/root/.kube state=directory
- name: 获取 kubeconfig 文件
fetch: src=/root/.kube/config dest=/root/.kube/config flat=yes
- name: 创建 kubectl 命令的软连接
file: src={{ base_dir }}/bin/kubectl dest=/usr/bin/kubectl state=link
connection: local
- name: 安装 rsync
package: name=rsync state=present
- name: 复制 manifests至 deploy节点
#copy: src={{ base_dir }}/manifests dest={{ base_dir }}
synchronize: src={{ base_dir }}/manifests dest={{ base_dir }}
- name: 推送 ssh 密钥对至 deploy节点
copy: src=~/.ssh/{{ item }} dest=~/.ssh/{{ item }} mode=0600
with_items:
- id_rsa
2019-03-28 18:44:10 +08:00
- id_rsa.pub
- known_hosts
run_once: true
when: "ansible_env['SSH_CLIENT'].split(' ')[0] != inventory_hostname"