Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
K
Kubespray
Manage
Activity
Members
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Deploy
Model registry
Help
Help
Support
GitLab documentation
Compare GitLab plans
GitLab community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Mirror
Kubespray
Commits
6139ee3a
Commit
6139ee3a
authored
8 years ago
by
Bogdan Dobrelya
Committed by
GitHub
8 years ago
Browse files
Options
Downloads
Plain Diff
Merge pull request #831 from mattymo/fix_separate_etcd
Fix creation and sync of etcd certs
parents
e7a1949d
f0c03906
No related branches found
No related tags found
No related merge requests found
Changes
3
Show whitespace changes
Inline
Side-by-side
Showing
3 changed files
roles/etcd/files/make-ssl-etcd.sh
+10
-16
10 additions, 16 deletions
roles/etcd/files/make-ssl-etcd.sh
roles/etcd/tasks/check_certs.yml
+1
-1
1 addition, 1 deletion
roles/etcd/tasks/check_certs.yml
roles/etcd/tasks/gen_certs.yml
+8
-7
8 additions, 7 deletions
roles/etcd/tasks/gen_certs.yml
with
19 additions
and
24 deletions
roles/etcd/files/make-ssl-etcd.sh
+
10
−
16
View file @
6139ee3a
...
@@ -71,30 +71,24 @@ fi
...
@@ -71,30 +71,24 @@ fi
# ETCD member
# ETCD member
if
[
-n
"
$MASTERS
"
]
;
then
if
[
-n
"
$MASTERS
"
]
;
then
for
host
in
$MASTERS
;
do
for
host
in
$MASTERS
;
do
# Member key
openssl genrsa
-out
member-
${
host
}
-key
.pem 2048
>
/dev/null 2>&1
openssl genrsa
-out
member-
${
host
}
-key
.pem 2048
>
/dev/null 2>&1
openssl req
-new
-key
member-
${
host
}
-key
.pem
-out
member-
${
host
}
.csr
-subj
"/CN=etcd-member-
${
host
}
"
-config
${
CONFIG
}
>
/dev/null 2>&1
openssl req
-new
-key
member-
${
host
}
-key
.pem
-out
member-
${
host
}
.csr
-subj
"/CN=etcd-member-
${
host
}
"
-config
${
CONFIG
}
>
/dev/null 2>&1
openssl x509
-req
-in
member-
${
host
}
.csr
-CA
ca.pem
-CAkey
ca-key.pem
-CAcreateserial
-out
member-
${
host
}
.pem
-days
365
-extensions
ssl_client
-extfile
${
CONFIG
}
>
/dev/null 2>&1
openssl x509
-req
-in
member-
${
host
}
.csr
-CA
ca.pem
-CAkey
ca-key.pem
-CAcreateserial
-out
member-
${
host
}
.pem
-days
365
-extensions
ssl_client
-extfile
${
CONFIG
}
>
/dev/null 2>&1
# Admin key
openssl genrsa
-out
admin-
${
host
}
-key
.pem 2048
>
/dev/null 2>&1
openssl req
-new
-key
admin-
${
host
}
-key
.pem
-out
admin-
${
host
}
.csr
-subj
"/CN=etcd-admin-
${
host
}
"
>
/dev/null 2>&1
openssl x509
-req
-in
admin-
${
host
}
.csr
-CA
ca.pem
-CAkey
ca-key.pem
-CAcreateserial
-out
admin-
${
host
}
.pem
-days
365
-extensions
ssl_client
-extfile
${
CONFIG
}
>
/dev/null 2>&1
done
done
else
openssl genrsa
-out
member-key.pem 2048
>
/dev/null 2>&1
openssl req
-new
-key
member-key.pem
-out
member.csr
-subj
"/CN=etcd-member"
-config
${
CONFIG
}
>
/dev/null 2>&1
openssl x509
-req
-in
member.csr
-CA
ca.pem
-CAkey
ca-key.pem
-CAcreateserial
-out
member.pem
-days
365
-extensions
ssl_client
-extfile
${
CONFIG
}
>
/dev/null 2>&1
fi
fi
# Node
and admin
keys
# Node keys
if
[
-n
"
$HOSTS
"
]
;
then
if
[
-n
"
$HOSTS
"
]
;
then
for
host
in
$HOSTS
;
do
for
host
in
$HOSTS
;
do
for
i
in
node admin
;
do
openssl genrsa
-out
node-
${
host
}
-key
.pem 2048
>
/dev/null 2>&1
openssl genrsa
-out
${
i
}
-
${
host
}
-key
.pem 2048
>
/dev/null 2>&1
openssl req
-new
-key
node-
${
host
}
-key
.pem
-out
node-
${
host
}
.csr
-subj
"/CN=etcd-node-
${
host
}
"
>
/dev/null 2>&1
openssl req
-new
-key
${
i
}
-
${
host
}
-key
.pem
-out
${
i
}
-
${
host
}
.csr
-subj
"/CN=kube-
${
i
}
-
${
host
}
"
>
/dev/null 2>&1
openssl x509
-req
-in
node-
${
host
}
.csr
-CA
ca.pem
-CAkey
ca-key.pem
-CAcreateserial
-out
node-
${
host
}
.pem
-days
365
-extensions
ssl_client
-extfile
${
CONFIG
}
>
/dev/null 2>&1
openssl x509
-req
-in
${
i
}
-
${
host
}
.csr
-CA
ca.pem
-CAkey
ca-key.pem
-CAcreateserial
-out
${
i
}
-
${
host
}
.pem
-days
365
-extensions
ssl_client
-extfile
${
CONFIG
}
>
/dev/null 2>&1
done
done
else
for
i
in
node admin
;
do
openssl genrsa
-out
${
i
}
-key
.pem 2048
>
/dev/null 2>&1
openssl req
-new
-key
${
i
}
-key
.pem
-out
${
i
}
.csr
-subj
"/CN=kube-
${
i
}
"
>
/dev/null 2>&1
openssl x509
-req
-in
${
i
}
.csr
-CA
ca.pem
-CAkey
ca-key.pem
-CAcreateserial
-out
${
i
}
.pem
-days
365
-extensions
ssl_client
-extfile
${
CONFIG
}
>
/dev/null 2>&1
done
done
fi
fi
...
...
This diff is collapsed.
Click to expand it.
roles/etcd/tasks/check_certs.yml
+
1
−
1
View file @
6139ee3a
...
@@ -28,7 +28,7 @@
...
@@ -28,7 +28,7 @@
-
name
:
"
Check
certs
|
check
if
a
cert
already
exists"
-
name
:
"
Check
certs
|
check
if
a
cert
already
exists"
stat
:
stat
:
path
:
"
{{
etcd_cert_dir
}}/
node-{{inventory_hostname}}-key.pem
"
path
:
"
{{
etcd_cert_dir
}}/
{{
item
}}
"
register
:
etcdcert
register
:
etcdcert
with_items
:
with_items
:
-
ca.pem
-
ca.pem
...
...
This diff is collapsed.
Click to expand it.
roles/etcd/tasks/gen_certs.yml
+
8
−
7
View file @
6139ee3a
...
@@ -40,8 +40,7 @@
...
@@ -40,8 +40,7 @@
{{
m
}}
{{
m
}}
{%
endif
%}
{%
endif
%}
{%
endfor
%}"
{%
endfor
%}"
-
HOSTS
:
"
{%
set
all_kube_hosts
=
groups['k8s-cluster']|union(groups['calico-rr']|default([]))|unique
%}
-
HOSTS
:
"
{%
for
h
in
groups['k8s-cluster']
%}
{%
for
h
in
all_kube_hosts
%}
{%
if
hostvars[h].sync_certs|default(false)
%}
{%
if
hostvars[h].sync_certs|default(false)
%}
{{
h
}}
{{
h
}}
{%
endif
%}
{%
endif
%}
...
@@ -66,8 +65,7 @@
...
@@ -66,8 +65,7 @@
'
member-{{
inventory_hostname
}}-key.pem'
'
member-{{
inventory_hostname
}}-key.pem'
]
]
all_node_certs
:
"
['ca.pem',
all_node_certs
:
"
['ca.pem',
{%
set
all_kube_hosts
=
groups['k8s-cluster']|union(groups['calico-rr']|default([]))|unique
%}
{%
for
node
in
groups['k8s-cluster']
%}
{%
for
node
in
all_kube_hosts
%}
'node-{{
node
}}.pem',
'node-{{
node
}}.pem',
'node-{{
node
}}-key.pem',
'node-{{
node
}}-key.pem',
{%
endfor
%}]"
{%
endfor
%}]"
...
@@ -78,14 +76,16 @@
...
@@ -78,14 +76,16 @@
shell
:
"
tar
cfz
-
-C
{{
etcd_cert_dir
}}
{{
my_master_certs|join('
')
}}
{{
all_node_certs|join('
')
}}|
base64
--wrap=0"
shell
:
"
tar
cfz
-
-C
{{
etcd_cert_dir
}}
{{
my_master_certs|join('
')
}}
{{
all_node_certs|join('
')
}}|
base64
--wrap=0"
register
:
etcd_master_cert_data
register
:
etcd_master_cert_data
delegate_to
:
"
{{groups['etcd'][0]}}"
delegate_to
:
"
{{groups['etcd'][0]}}"
when
:
sync_certs|default(false)
when
:
inventory_hostname in groups['etcd'] and sync_certs|default(false) and
inventory_hostname != groups['etcd'][0]
notify
:
set etcd_secret_changed
notify
:
set etcd_secret_changed
-
name
:
Gen_certs | Gather etcd node certs
-
name
:
Gen_certs | Gather etcd node certs
shell
:
"
tar
cfz
-
-C
{{
etcd_cert_dir
}}
{{
my_node_certs|join('
')
}}
|
base64
--wrap=0"
shell
:
"
tar
cfz
-
-C
{{
etcd_cert_dir
}}
{{
my_node_certs|join('
')
}}
|
base64
--wrap=0"
register
:
etcd_node_cert_data
register
:
etcd_node_cert_data
delegate_to
:
"
{{groups['etcd'][0]}}"
delegate_to
:
"
{{groups['etcd'][0]}}"
when
:
sync_certs|default(false)
when
:
inventory_hostname in groups['k8s-cluster'] and sync_certs|default(false) and
inventory_hostname not in groups['etcd']
notify
:
set etcd_secret_changed
notify
:
set etcd_secret_changed
-
name
:
Gen_certs | Copy certs on masters
-
name
:
Gen_certs | Copy certs on masters
...
@@ -97,7 +97,8 @@
...
@@ -97,7 +97,8 @@
-
name
:
Gen_certs | Copy certs on nodes
-
name
:
Gen_certs | Copy certs on nodes
shell
:
"
echo
'{{etcd_node_cert_data.stdout|quote}}'
|
base64
-d
|
tar
xz
-C
{{
etcd_cert_dir
}}"
shell
:
"
echo
'{{etcd_node_cert_data.stdout|quote}}'
|
base64
-d
|
tar
xz
-C
{{
etcd_cert_dir
}}"
changed_when
:
false
changed_when
:
false
when
:
sync_certs|default(false) and inventory_hostname not in groups['etcd']
when
:
sync_certs|default(false) and
inventory_hostname not in groups['etcd']
-
name
:
Gen_certs | check certificate permissions
-
name
:
Gen_certs | check certificate permissions
file
:
file
:
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment