207 lines
5.4 KiB
YAML
207 lines
5.4 KiB
YAML
---
|
|
- name: cri-o | check if fedora coreos
|
|
stat:
|
|
path: /run/ostree-booted
|
|
get_attributes: no
|
|
get_checksum: no
|
|
get_mime: no
|
|
register: ostree
|
|
|
|
- name: cri-o | set is_ostree
|
|
set_fact:
|
|
is_ostree: "{{ ostree.stat.exists }}"
|
|
|
|
- name: cri-o | get ostree version
|
|
shell: "set -o pipefail && rpm-ostree --version | awk -F\\' '/Version/{print $2}'"
|
|
args:
|
|
executable: /bin/bash
|
|
register: ostree_version
|
|
when: is_ostree
|
|
|
|
- name: cri-o | Download cri-o
|
|
include_tasks: "../../../download/tasks/download_file.yml"
|
|
vars:
|
|
download: "{{ download_defaults | combine(downloads.crio) }}"
|
|
|
|
- name: cri-o | special handling for amazon linux
|
|
import_tasks: "setup-amazon.yaml"
|
|
when: ansible_distribution in ["Amazon"]
|
|
|
|
- name: cri-o | clean up reglacy repos
|
|
import_tasks: "cleanup.yaml"
|
|
|
|
- name: cri-o | build a list of crio runtimes with Katacontainers runtimes
|
|
set_fact:
|
|
crio_runtimes: "{{ crio_runtimes + kata_runtimes }}"
|
|
when:
|
|
- kata_containers_enabled
|
|
|
|
- name: cri-o | build a list of crio runtimes with crun runtime
|
|
set_fact:
|
|
crio_runtimes: "{{ crio_runtimes + [crun_runtime] }}"
|
|
when:
|
|
- crun_enabled
|
|
|
|
- name: cri-o | build a list of crio runtimes with youki runtime
|
|
set_fact:
|
|
crio_runtimes: "{{ crio_runtimes + [youki_runtime] }}"
|
|
when:
|
|
- youki_enabled
|
|
|
|
- name: cri-o | make sure needed folders exist in the system
|
|
with_items:
|
|
- /etc/crio
|
|
- /etc/containers
|
|
- /etc/systemd/system/crio.service.d
|
|
file:
|
|
path: "{{ item }}"
|
|
state: directory
|
|
mode: 0755
|
|
|
|
- name: cri-o | install cri-o config
|
|
template:
|
|
src: crio.conf.j2
|
|
dest: /etc/crio/crio.conf
|
|
mode: 0644
|
|
register: config_install
|
|
|
|
- name: cri-o | install config.json
|
|
template:
|
|
src: config.json.j2
|
|
dest: /etc/crio/config.json
|
|
mode: 0644
|
|
register: reg_auth_install
|
|
|
|
- name: cri-o | copy binaries
|
|
copy:
|
|
src: "{{ local_release_dir }}/cri-o/bin/{{ item }}"
|
|
dest: "{{ bin_dir }}/{{ item }}"
|
|
mode: 0755
|
|
remote_src: true
|
|
with_items:
|
|
- "{{ crio_bin_files }}"
|
|
notify: restart crio
|
|
|
|
- name: cri-o | copy service file
|
|
copy:
|
|
src: "{{ local_release_dir }}/cri-o/contrib/crio.service"
|
|
dest: /etc/systemd/system/crio.service
|
|
mode: 0755
|
|
remote_src: true
|
|
notify: restart crio
|
|
|
|
- name: cri-o | copy default policy
|
|
copy:
|
|
src: "{{ local_release_dir }}/cri-o/contrib/policy.json"
|
|
dest: /etc/containers/policy.json
|
|
mode: 0755
|
|
remote_src: true
|
|
notify: restart crio
|
|
|
|
- name: cri-o | copy mounts.conf
|
|
copy:
|
|
src: mounts.conf
|
|
dest: /etc/containers/mounts.conf
|
|
mode: 0644
|
|
when:
|
|
- ansible_os_family == 'RedHat'
|
|
notify: restart crio
|
|
|
|
- name: cri-o | create directory for oci hooks
|
|
file:
|
|
path: /etc/containers/oci/hooks.d
|
|
state: directory
|
|
owner: root
|
|
mode: 0755
|
|
|
|
- name: cri-o | set overlay driver
|
|
ini_file:
|
|
dest: /etc/containers/storage.conf
|
|
section: storage
|
|
option: "{{ item.option }}"
|
|
value: "{{ item.value }}"
|
|
mode: 0644
|
|
with_items:
|
|
- option: driver
|
|
value: '"overlay"'
|
|
- option: graphroot
|
|
value: '"/var/lib/containers/storage"'
|
|
|
|
# metacopy=on is available since 4.19 and was backported to RHEL 4.18 kernel
|
|
- name: cri-o | set metacopy mount options correctly
|
|
ini_file:
|
|
dest: /etc/containers/storage.conf
|
|
section: storage.options.overlay
|
|
option: mountopt
|
|
value: '{{ ''"nodev"'' if ansible_kernel is version_compare(("4.18" if ansible_os_family == "RedHat" else "4.19"), "<") else ''"nodev,metacopy=on"'' }}'
|
|
mode: 0644
|
|
|
|
- name: cri-o | create directory registries configs
|
|
file:
|
|
path: /etc/containers/registries.conf.d
|
|
state: directory
|
|
owner: root
|
|
mode: 0755
|
|
|
|
- name: cri-o | write registries configs
|
|
template:
|
|
src: registry.conf.j2
|
|
dest: "/etc/containers/registries.conf.d/10-{{ item.prefix | default(item.location) | regex_replace(':', '_') }}.conf"
|
|
mode: 0644
|
|
loop: "{{ crio_registries }}"
|
|
notify: restart crio
|
|
|
|
- name: cri-o | configure unqualified registry settings
|
|
template:
|
|
src: unqualified.conf.j2
|
|
dest: "/etc/containers/registries.conf.d/01-unqualified.conf"
|
|
mode: 0644
|
|
notify: restart crio
|
|
|
|
- name: cri-o | write cri-o proxy drop-in
|
|
template:
|
|
src: http-proxy.conf.j2
|
|
dest: /etc/systemd/system/crio.service.d/http-proxy.conf
|
|
mode: 0644
|
|
notify: restart crio
|
|
when: http_proxy is defined or https_proxy is defined
|
|
|
|
- name: cri-o | configure the uid/gid space for user namespaces
|
|
lineinfile:
|
|
path: '{{ item.path }}'
|
|
line: '{{ item.entry }}'
|
|
regex: '^\s*{{ crio_remap_user }}:'
|
|
state: '{{ "present" if crio_remap_enable | bool else "absent" }}'
|
|
loop:
|
|
- path: /etc/subuid
|
|
entry: '{{ crio_remap_user }}:{{ crio_subuid_start }}:{{ crio_subuid_length }}'
|
|
- path: /etc/subgid
|
|
entry: '{{ crio_remap_user }}:{{ crio_subgid_start }}:{{ crio_subgid_length }}'
|
|
loop_control:
|
|
label: '{{ item.path }}'
|
|
|
|
- name: cri-o | ensure crio service is started and enabled
|
|
service:
|
|
name: crio
|
|
daemon_reload: true
|
|
enabled: true
|
|
state: started
|
|
register: service_start
|
|
|
|
- name: cri-o | trigger service restart only when needed
|
|
service: # noqa 503
|
|
name: crio
|
|
state: restarted
|
|
when:
|
|
- config_install.changed
|
|
- reg_auth_install.changed
|
|
- not service_start.changed
|
|
|
|
- name: cri-o | verify that crio is running
|
|
command: "{{ bin_dir }}/crio-status info"
|
|
register: get_crio_info
|
|
until: get_crio_info is succeeded
|
|
changed_when: false
|
|
retries: 5
|
|
delay: "{{ retry_stagger | random + 3 }}"
|