diff options
39 files changed, 216 insertions, 86 deletions
| diff --git a/.tito/packages/openshift-ansible b/.tito/packages/openshift-ansible index e3b46d6c3..98f63d791 100644 --- a/.tito/packages/openshift-ansible +++ b/.tito/packages/openshift-ansible @@ -1 +1 @@ -3.7.0-0.149.0 ./ +3.7.0-0.158.0 ./ diff --git a/inventory/byo/hosts.example b/inventory/byo/hosts.example index 0b6050891..436135bcf 100644 --- a/inventory/byo/hosts.example +++ b/inventory/byo/hosts.example @@ -811,8 +811,13 @@ openshift_master_identity_providers=[{'name': 'htpasswd_auth', 'login': 'true',  # Or you may optionally define your own build overrides configuration serialized as json  #openshift_buildoverrides_json='{"BuildOverrides":{"configuration":{"apiVersion":"v1","kind":"BuildDefaultsConfig","forcePull":"true"}}}' -# Enable template service broker by specifying one of more namespaces whose -# templates will be served by the broker +# Enable service catalog +#openshift_enable_service_catalog=true + +# Enable template service broker (requires service catalog to be enabled, above) +#template_service_broker_install=true + +# Configure one of more namespaces whose templates will be served by the TSB  #openshift_template_service_broker_namespaces=['openshift']  # masterConfig.volumeConfig.dynamicProvisioningEnabled, configurable as of 1.2/3.2, enabled by default diff --git a/openshift-ansible.spec b/openshift-ansible.spec index aab0633a3..2d3dae4b1 100644 --- a/openshift-ansible.spec +++ b/openshift-ansible.spec @@ -10,7 +10,7 @@  Name:           openshift-ansible  Version:        3.7.0 -Release:        0.149.0%{?dist} +Release:        0.158.0%{?dist}  Summary:        Openshift and Atomic Enterprise Ansible  License:        ASL 2.0  URL:            https://github.com/openshift/openshift-ansible @@ -276,6 +276,42 @@ Atomic OpenShift Utilities includes  %changelog +* Tue Oct 17 2017 Jenkins CD Merge Bot <smunilla@redhat.com> 3.7.0-0.158.0 +- Refactor openshift-management entry point (rteague@redhat.com) +- Add switch to enable/disable container engine's audit log being stored in ES. +  (jkarasek@redhat.com) + +* Mon Oct 16 2017 Jenkins CD Merge Bot <smunilla@redhat.com> 3.7.0-0.157.0 +- data migration of embedded etcd not allowed (jchaloup@redhat.com) +- GlusterFS: remove topology reference from deploy-heketi (jarrpa@redhat.com) + +* Mon Oct 16 2017 Jenkins CD Merge Bot <smunilla@redhat.com> 3.7.0-0.156.0 +- set initial etcd cluster properly during system container scale up +  (jchaloup@redhat.com) + +* Sun Oct 15 2017 Jenkins CD Merge Bot <smunilla@redhat.com> 3.7.0-0.155.0 +-  + +* Sat Oct 14 2017 Jenkins CD Merge Bot <smunilla@redhat.com> 3.7.0-0.154.0 +-  + +* Fri Oct 13 2017 Jenkins CD Merge Bot <smunilla@redhat.com> 3.7.0-0.153.0 +- default groups.oo_new_etcd_to_config to an empty list (jchaloup@redhat.com) + +* Fri Oct 13 2017 Jenkins CD Merge Bot <smunilla@redhat.com> 3.7.0-0.152.0 +-  + +* Fri Oct 13 2017 Jenkins CD Merge Bot <smunilla@redhat.com> 3.7.0-0.151.0 +- updated dynamic provision section for openshift metrics to support storage +  class name (elvirkuric@gmail.com) + +* Fri Oct 13 2017 Jenkins CD Merge Bot <smunilla@redhat.com> 3.7.0-0.150.0 +- Ensure upgrade playbook exits on health check failures (rteague@redhat.com) +- Ensure docker is installed for containerized load balancers +  (mgugino@redhat.com) +- Fix containerized node service unit placement order (mgugino@redhat.com) +- Provisioning Documentation Updates (mgugino@redhat.com) +  * Thu Oct 12 2017 Jenkins CD Merge Bot <smunilla@redhat.com> 3.7.0-0.149.0  - Fix broken debug_level (mgugino@redhat.com)  - Ensure host was reached for proper conditional validation diff --git a/playbooks/byo/openshift-management/config.yml b/playbooks/byo/openshift-management/config.yml index 33a555cc1..e8795ef85 100644 --- a/playbooks/byo/openshift-management/config.yml +++ b/playbooks/byo/openshift-management/config.yml @@ -1,7 +1,5 @@  ---  - include: ../openshift-cluster/initialize_groups.yml -  tags: -    - always  - include: ../../common/openshift-cluster/evaluate_groups.yml diff --git a/playbooks/byo/openshift-management/uninstall.yml b/playbooks/byo/openshift-management/uninstall.yml index ebd6fb261..a1fb1cdc4 100644 --- a/playbooks/byo/openshift-management/uninstall.yml +++ b/playbooks/byo/openshift-management/uninstall.yml @@ -1,6 +1,4 @@  ---  # - include: ../openshift-cluster/initialize_groups.yml -#   tags: -#     - always  - include: ../../common/openshift-management/uninstall.yml diff --git a/playbooks/common/openshift-cluster/config.yml b/playbooks/common/openshift-cluster/config.yml index dbe09dce2..395eb51f1 100644 --- a/playbooks/common/openshift-cluster/config.yml +++ b/playbooks/common/openshift-cluster/config.yml @@ -55,7 +55,7 @@  - include: service_catalog.yml    when: openshift_enable_service_catalog | default(false) | bool -- include: openshift_management.yml +- include: ../openshift-management/config.yml    when: openshift_management_install_management | default(false) | bool  - name: Print deprecated variable warning message if necessary diff --git a/playbooks/common/openshift-cluster/openshift_management.yml b/playbooks/common/openshift-cluster/openshift_management.yml deleted file mode 100644 index 6e582920b..000000000 --- a/playbooks/common/openshift-cluster/openshift_management.yml +++ /dev/null @@ -1,25 +0,0 @@ ---- -- name: Management Install Checkpoint Start -  hosts: localhost -  connection: local -  gather_facts: false -  tasks: -  - name: Set Management install 'In Progress' -    set_stats: -      data: -        installer_phase_Management: "In Progress" -      aggregate: false - -- name: Management -  include: ../openshift-management/config.yml - -- name: Management Install Checkpoint End -  hosts: localhost -  connection: local -  gather_facts: false -  tasks: -  - name: Set Management install 'Complete' -    set_stats: -      data: -        installer_phase_Management: "Complete" -      aggregate: false diff --git a/playbooks/common/openshift-cluster/upgrades/pre/verify_health_checks.yml b/playbooks/common/openshift-cluster/upgrades/pre/verify_health_checks.yml index ad6325ca0..2a8de50a2 100644 --- a/playbooks/common/openshift-cluster/upgrades/pre/verify_health_checks.yml +++ b/playbooks/common/openshift-cluster/upgrades/pre/verify_health_checks.yml @@ -1,12 +1,14 @@  --- -- name: Verify Host Requirements +- name: OpenShift Health Checks    hosts: oo_all_hosts +  any_errors_fatal: true    roles:    - openshift_health_checker    vars:    - r_openshift_health_checker_playbook_context: upgrade    post_tasks: -  - action: openshift_health_check +  - name: Run health checks (upgrade) +    action: openshift_health_check      args:        checks:        - disk_availability diff --git a/playbooks/common/openshift-cluster/upgrades/v3_3/master_config_upgrade.yml b/playbooks/common/openshift-cluster/upgrades/v3_3/master_config_upgrade.yml index d69472fad..5e7a66171 100644 --- a/playbooks/common/openshift-cluster/upgrades/v3_3/master_config_upgrade.yml +++ b/playbooks/common/openshift-cluster/upgrades/v3_3/master_config_upgrade.yml @@ -41,12 +41,12 @@  - modify_yaml:      dest: "{{ openshift.common.config_base}}/master/master-config.yaml" -    yaml_key: 'controllerConfig.servicesServingCert.signer.certFile' +    yaml_key: 'controllerConfig.serviceServingCert.signer.certFile'      yaml_value: service-signer.crt  - modify_yaml:      dest: "{{ openshift.common.config_base}}/master/master-config.yaml" -    yaml_key: 'controllerConfig.servicesServingCert.signer.keyFile' +    yaml_key: 'controllerConfig.serviceServingCert.signer.keyFile'      yaml_value: service-signer.key  - modify_yaml: diff --git a/playbooks/common/openshift-cluster/upgrades/v3_4/master_config_upgrade.yml b/playbooks/common/openshift-cluster/upgrades/v3_4/master_config_upgrade.yml index ed89dbe8d..763922439 100644 --- a/playbooks/common/openshift-cluster/upgrades/v3_4/master_config_upgrade.yml +++ b/playbooks/common/openshift-cluster/upgrades/v3_4/master_config_upgrade.yml @@ -14,3 +14,13 @@      dest: "{{ openshift.common.config_base}}/master/master-config.yaml"      yaml_key: 'kubernetesMasterConfig.admissionConfig'      yaml_value: + +- modify_yaml: +    dest: "{{ openshift.common.config_base}}/master/master-config.yaml" +    yaml_key: 'controllerConfig.serviceServingCert.signer.certFile' +    yaml_value: service-signer.crt + +- modify_yaml: +    dest: "{{ openshift.common.config_base}}/master/master-config.yaml" +    yaml_key: 'controllerConfig.serviceServingCert.signer.keyFile' +    yaml_value: service-signer.key diff --git a/playbooks/common/openshift-cluster/upgrades/v3_5/master_config_upgrade.yml b/playbooks/common/openshift-cluster/upgrades/v3_5/master_config_upgrade.yml index ed89dbe8d..763922439 100644 --- a/playbooks/common/openshift-cluster/upgrades/v3_5/master_config_upgrade.yml +++ b/playbooks/common/openshift-cluster/upgrades/v3_5/master_config_upgrade.yml @@ -14,3 +14,13 @@      dest: "{{ openshift.common.config_base}}/master/master-config.yaml"      yaml_key: 'kubernetesMasterConfig.admissionConfig'      yaml_value: + +- modify_yaml: +    dest: "{{ openshift.common.config_base}}/master/master-config.yaml" +    yaml_key: 'controllerConfig.serviceServingCert.signer.certFile' +    yaml_value: service-signer.crt + +- modify_yaml: +    dest: "{{ openshift.common.config_base}}/master/master-config.yaml" +    yaml_key: 'controllerConfig.serviceServingCert.signer.keyFile' +    yaml_value: service-signer.key diff --git a/playbooks/common/openshift-cluster/upgrades/v3_6/master_config_upgrade.yml b/playbooks/common/openshift-cluster/upgrades/v3_6/master_config_upgrade.yml index ed89dbe8d..763922439 100644 --- a/playbooks/common/openshift-cluster/upgrades/v3_6/master_config_upgrade.yml +++ b/playbooks/common/openshift-cluster/upgrades/v3_6/master_config_upgrade.yml @@ -14,3 +14,13 @@      dest: "{{ openshift.common.config_base}}/master/master-config.yaml"      yaml_key: 'kubernetesMasterConfig.admissionConfig'      yaml_value: + +- modify_yaml: +    dest: "{{ openshift.common.config_base}}/master/master-config.yaml" +    yaml_key: 'controllerConfig.serviceServingCert.signer.certFile' +    yaml_value: service-signer.crt + +- modify_yaml: +    dest: "{{ openshift.common.config_base}}/master/master-config.yaml" +    yaml_key: 'controllerConfig.serviceServingCert.signer.keyFile' +    yaml_value: service-signer.key diff --git a/playbooks/common/openshift-cluster/upgrades/v3_7/master_config_upgrade.yml b/playbooks/common/openshift-cluster/upgrades/v3_7/master_config_upgrade.yml index df59a8782..c21ab97bc 100644 --- a/playbooks/common/openshift-cluster/upgrades/v3_7/master_config_upgrade.yml +++ b/playbooks/common/openshift-cluster/upgrades/v3_7/master_config_upgrade.yml @@ -19,3 +19,13 @@      dest: "{{ openshift.common.config_base}}/master/master-config.yaml"      yaml_key: 'controllerConfig.election.lockName'      yaml_value: 'openshift-master-controllers' + +- modify_yaml: +    dest: "{{ openshift.common.config_base}}/master/master-config.yaml" +    yaml_key: 'controllerConfig.serviceServingCert.signer.certFile' +    yaml_value: service-signer.crt + +- modify_yaml: +    dest: "{{ openshift.common.config_base}}/master/master-config.yaml" +    yaml_key: 'controllerConfig.serviceServingCert.signer.keyFile' +    yaml_value: service-signer.key diff --git a/playbooks/common/openshift-etcd/migrate.yml b/playbooks/common/openshift-etcd/migrate.yml index 2456ad3a8..31362f2f6 100644 --- a/playbooks/common/openshift-etcd/migrate.yml +++ b/playbooks/common/openshift-etcd/migrate.yml @@ -1,4 +1,17 @@  --- +- name: Check if the master has embedded etcd +  hosts: localhost +  connection: local +  become: no +  gather_facts: no +  tags: +  - always +  tasks: +  - fail: +      msg: "Migration of an embedded etcd is not supported. Please, migrate the embedded etcd into an external etcd first." +    when: +    - groups.oo_etcd_to_config | default([]) | length == 0 +  - name: Run pre-checks    hosts: oo_etcd_to_migrate    tasks: @@ -60,12 +73,11 @@    hosts: oo_etcd_to_migrate    gather_facts: no    pre_tasks: -  - set_fact: -      l_etcd_service: "{{ 'etcd_container' if openshift.common.is_containerized else 'etcd' }}" -  - name: Disable etcd members -    service: -      name: "{{ l_etcd_service }}" -      state: stopped +  - include_role: +      name: etcd +      tasks_from: disable_etcd +    vars: +      r_etcd_common_etcd_runtime: "{{ openshift.common.etcd_runtime }}"  - name: Migrate data on first etcd    hosts: oo_etcd_to_migrate[0] diff --git a/playbooks/common/openshift-etcd/scaleup.yml b/playbooks/common/openshift-etcd/scaleup.yml index b5ba2bbba..20061366c 100644 --- a/playbooks/common/openshift-etcd/scaleup.yml +++ b/playbooks/common/openshift-etcd/scaleup.yml @@ -46,7 +46,7 @@      etcd_ca_host: "{{ groups.oo_etcd_to_config.0 }}"      etcd_certificates_etcd_hosts: "{{ groups.oo_etcd_to_config | default([], true) }}"      etcd_initial_cluster_state: "existing" -    initial_etcd_cluster: "{{ etcd_add_check.stdout_lines[3] | regex_replace('ETCD_INITIAL_CLUSTER=','') | regex_replace('\"','') }}" +    etcd_initial_cluster: "{{ etcd_add_check.stdout_lines[3] | regex_replace('ETCD_INITIAL_CLUSTER=','') | regex_replace('\"','') }}"      etcd_ca_setup: False      r_etcd_common_etcd_runtime: "{{ openshift.common.etcd_runtime }}"    - role: nickhammond.logrotate @@ -71,7 +71,7 @@      etcd_ca_host: "{{ groups.oo_etcd_to_config.0 }}"      openshift_ca_host: "{{ groups.oo_first_master.0 }}"      openshift_master_etcd_hosts: "{{ hostvars -                                     | oo_select_keys(groups['oo_etcd_to_config'] | union(groups['oo_new_etcd_to_config'])) +                                     | oo_select_keys(groups['oo_etcd_to_config'] | union(groups['oo_new_etcd_to_config'] | default([]) ))                                       | oo_collect('openshift.common.hostname')                                       | default(none, true) }}"      openshift_master_etcd_port: "{{ (etcd_client_port | default('2379')) if (groups.oo_etcd_to_config is defined and groups.oo_etcd_to_config) else none }}" diff --git a/playbooks/common/openshift-loadbalancer/config.yml b/playbooks/common/openshift-loadbalancer/config.yml index d4addedee..2a703cb61 100644 --- a/playbooks/common/openshift-loadbalancer/config.yml +++ b/playbooks/common/openshift-loadbalancer/config.yml @@ -9,6 +9,15 @@          installer_phase_loadbalancer: "In Progress"        aggregate: false +- name: Configure firewall and docker for load balancers +  hosts: oo_lb_to_config:!oo_masters_to_config:!oo_nodes_to_config +  vars: +    openshift_image_tag: "{{ hostvars[groups.oo_first_master.0].openshift_image_tag }}" +  roles: +  - role: os_firewall +  - role: openshift_docker +    when: openshift.common.is_containerized | default(False) | bool and not skip_docker_role | default(False) | bool +  - name: Configure load balancers    hosts: oo_lb_to_config    vars: @@ -24,7 +33,6 @@                                            + openshift_loadbalancer_additional_backends | default([]) }}"      openshift_image_tag: "{{ hostvars[groups.oo_first_master.0].openshift_image_tag }}"    roles: -  - role: os_firewall    - role: openshift_loadbalancer    - role: tuned diff --git a/playbooks/common/openshift-management/config.yml b/playbooks/common/openshift-management/config.yml index 0aaafe440..908679e81 100644 --- a/playbooks/common/openshift-management/config.yml +++ b/playbooks/common/openshift-management/config.yml @@ -1,4 +1,14 @@  --- +- name: Management Install Checkpoint Start +  hosts: oo_all_hosts +  gather_facts: false +  tasks: +  - name: Set Management install 'In Progress' +    set_stats: +      data: +        installer_phase_management: "In Progress" +      aggregate: false +  - name: Setup CFME    hosts: oo_first_master    pre_tasks: @@ -13,3 +23,13 @@        name: openshift_management      vars:        template_dir: "{{ hostvars[groups.masters.0].r_openshift_management_mktemp.stdout }}" + +- name: Management Install Checkpoint End +  hosts: oo_all_hosts +  gather_facts: false +  tasks: +  - name: Set Management install 'Complete' +    set_stats: +      data: +        installer_phase_management: "Complete" +      aggregate: false diff --git a/roles/docker/tasks/systemcontainer_crio.yml b/roles/docker/tasks/systemcontainer_crio.yml index fdc6cd24a..a79600930 100644 --- a/roles/docker/tasks/systemcontainer_crio.yml +++ b/roles/docker/tasks/systemcontainer_crio.yml @@ -36,6 +36,12 @@      state: present    when: not openshift.common.is_atomic | bool +- name: Check we are not using node as a Docker container with CRI-O +  fail: msg='Cannot use CRI-O with node configured as a Docker container' +  when: +    - openshift.common.is_containerized | bool +    - not openshift.common.is_node_system_container | bool +  # Used to pull and install the system container  - name: Ensure atomic is installed    package: diff --git a/roles/etcd/tasks/system_container.yml b/roles/etcd/tasks/system_container.yml index e735bf50a..024479fb4 100644 --- a/roles/etcd/tasks/system_container.yml +++ b/roles/etcd/tasks/system_container.yml @@ -17,6 +17,7 @@        {{ hostvars[host].etcd_hostname }}={{ etcd_peer_url_scheme }}://{{ hostvars[host].etcd_ip }}:{{ etcd_peer_port }},        {%- endif -%}        {% endfor -%} +  when: etcd_initial_cluster is undefined  - name: Check etcd system container package    command: > diff --git a/roles/etcd/templates/etcd.conf.j2 b/roles/etcd/templates/etcd.conf.j2 index 8462bb4c8..3027a9447 100644 --- a/roles/etcd/templates/etcd.conf.j2 +++ b/roles/etcd/templates/etcd.conf.j2 @@ -29,8 +29,8 @@ ETCD_INITIAL_CLUSTER={{ etcd_hostname}}={{ etcd_initial_advertise_peer_urls }}  ETCD_INITIAL_CLUSTER_STATE={{ etcd_initial_cluster_state }}  ETCD_INITIAL_CLUSTER_TOKEN=thirdparty-etcd-cluster-1  {% else %} -{% if initial_etcd_cluster is defined and initial_etcd_cluster %} -ETCD_INITIAL_CLUSTER={{ initial_etcd_cluster }} +{% if etcd_initial_cluster is defined and etcd_initial_cluster %} +ETCD_INITIAL_CLUSTER={{ etcd_initial_cluster }}  {% else %}  ETCD_INITIAL_CLUSTER={{ initial_cluster() }}  {% endif %} diff --git a/roles/installer_checkpoint/callback_plugins/installer_checkpoint.py b/roles/installer_checkpoint/callback_plugins/installer_checkpoint.py index ac369b882..25f9405af 100644 --- a/roles/installer_checkpoint/callback_plugins/installer_checkpoint.py +++ b/roles/installer_checkpoint/callback_plugins/installer_checkpoint.py @@ -136,7 +136,7 @@ class CallbackModule(CallbackBase):              },              'installer_phase_management': {                  'title': 'Management Install', -                'playbook': 'playbooks/common/openshift-cluster/openshift_management.yml' +                'playbook': 'playbooks/byo/openshift-management/config.yml'              },          } diff --git a/roles/openshift_logging/README.md b/roles/openshift_logging/README.md index 829c78728..69eb9283d 100644 --- a/roles/openshift_logging/README.md +++ b/roles/openshift_logging/README.md @@ -69,6 +69,9 @@ When `openshift_logging_install_logging` is set to `False` the `openshift_loggin  - `openshift_logging_fluentd_buffer_size_limit`: Buffer chunk limit for Fluentd. Defaults to 1m.  - `openshift_logging_fluentd_file_buffer_limit`: Fluentd will set the value to the file buffer limit.  Defaults to '1Gi' per destination. +- `openshift_logging_fluentd_audit_container_engine`: When `openshift_logging_fluentd_audit_container_engine` is set to `True`, the audit log of the container engine will be collected and stored in ES. +- `openshift_logging_fluentd_audit_file`: Location of audit log file. The default is `/var/log/audit/audit.log` +- `openshift_logging_fluentd_audit_pos_file`: Location of fluentd in_tail position file for the audit log file. The default is `/var/log/audit/audit.log.pos`  - `openshift_logging_es_host`: The name of the ES service Fluentd should send logs to. Defaults to 'logging-es'.  - `openshift_logging_es_port`: The port for the ES service Fluentd should sent its logs to. Defaults to '9200'. diff --git a/roles/openshift_logging_eventrouter/templates/eventrouter-template.j2 b/roles/openshift_logging_eventrouter/templates/eventrouter-template.j2 index 9ff4c7e80..ea1fd3efd 100644 --- a/roles/openshift_logging_eventrouter/templates/eventrouter-template.j2 +++ b/roles/openshift_logging_eventrouter/templates/eventrouter-template.j2 @@ -54,9 +54,9 @@ objects:            serviceAccount: aggregated-logging-eventrouter            serviceAccountName: aggregated-logging-eventrouter  {% if node_selector is iterable and node_selector | length > 0 %} -      nodeSelector: +          nodeSelector:  {% for key, value in node_selector.iteritems() %} -        {{ key }}: "{{ value }}" +            {{ key }}: "{{ value }}"  {% endfor %}  {% endif %}            containers: diff --git a/roles/openshift_logging_fluentd/defaults/main.yml b/roles/openshift_logging_fluentd/defaults/main.yml index 82326bdd1..25f7580a4 100644 --- a/roles/openshift_logging_fluentd/defaults/main.yml +++ b/roles/openshift_logging_fluentd/defaults/main.yml @@ -56,3 +56,7 @@ openshift_logging_fluentd_aggregating_passphrase: none  #fluentd_secureforward_contents:  openshift_logging_fluentd_file_buffer_limit: 1Gi + +# Configure fluentd to tail audit log file and filter out container engine's logs from there +# These logs are then stored in ES operation index +openshift_logging_fluentd_audit_container_engine: False diff --git a/roles/openshift_logging_fluentd/tasks/main.yaml b/roles/openshift_logging_fluentd/tasks/main.yaml index 37960afd1..06bb35dbc 100644 --- a/roles/openshift_logging_fluentd/tasks/main.yaml +++ b/roles/openshift_logging_fluentd/tasks/main.yaml @@ -108,7 +108,6 @@      src: secure-forward.conf      dest: "{{ tempdir }}/secure-forward.conf"    when: fluentd_secureforward_contents is undefined -    changed_when: no  - copy: @@ -173,6 +172,9 @@      ops_port: "{{ openshift_logging_fluentd_ops_port }}"      fluentd_nodeselector_key: "{{ openshift_logging_fluentd_nodeselector.keys()[0] }}"      fluentd_nodeselector_value: "{{ openshift_logging_fluentd_nodeselector.values()[0] }}" +    audit_container_engine: "{{ openshift_logging_fluentd_audit_container_engine | default(False) | bool }}" +    audit_log_file: "{{ openshift_logging_fluentd_audit_file | default() }}" +    audit_pos_log_file: "{{ openshift_logging_fluentd_audit_pos_file | default() }}"    check_mode: no    changed_when: no diff --git a/roles/openshift_logging_fluentd/templates/fluentd.j2 b/roles/openshift_logging_fluentd/templates/fluentd.j2 index f286b0656..644b70031 100644 --- a/roles/openshift_logging_fluentd/templates/fluentd.j2 +++ b/roles/openshift_logging_fluentd/templates/fluentd.j2 @@ -172,6 +172,28 @@ spec:            value: "{{ openshift_logging_fluentd_remote_syslog_payload_key }}"  {% endif %} +{% if audit_container_engine %} +        - name: "AUDIT_CONTAINER_ENGINE" +          value: "{{ audit_container_engine | lower }}" +{% endif %} + +{% if audit_container_engine %} +        - name: "NODE_NAME" +          valueFrom: +            fieldRef: +              fieldPath: spec.nodeName +{% endif %} + +{% if audit_log_file != '' %} +        - name: AUDIT_FILE +          value: "{{ audit_log_file }}" +{% endif %} + +{% if audit_pos_log_file != '' %} +        - name: AUDIT_POS_FILE +          value: "{{ audit_pos_log_file }}" +{% endif %} +        volumes:        - name: runlogjournal          hostPath: diff --git a/roles/openshift_master/defaults/main.yml b/roles/openshift_master/defaults/main.yml index 7e62a8c6d..f861a8e4d 100644 --- a/roles/openshift_master/defaults/main.yml +++ b/roles/openshift_master/defaults/main.yml @@ -51,3 +51,6 @@ r_openshift_master_data_dir: "{{ r_openshift_master_data_dir_default }}"  r_openshift_master_sdn_network_plugin_name_default: "{{ os_sdn_network_plugin_name | default('redhat/openshift-ovs-subnet') }}"  r_openshift_master_sdn_network_plugin_name: "{{ r_openshift_master_sdn_network_plugin_name_default }}" + +openshift_master_image_config_latest_default: "{{ openshift_image_config_latest | default(False) }}" +openshift_master_image_config_latest: "{{ openshift_master_image_config_latest_default }}" diff --git a/roles/openshift_master/tasks/systemd_units.yml b/roles/openshift_master/tasks/systemd_units.yml index c6abaeb9b..fcc66044b 100644 --- a/roles/openshift_master/tasks/systemd_units.yml +++ b/roles/openshift_master/tasks/systemd_units.yml @@ -1,4 +1,7 @@  --- +# systemd_units.yml is included both in the openshift_master role and in the upgrade +# playbooks. +  - include: upgrade_facts.yml    when: openshift_master_defaults_in_use is not defined diff --git a/roles/openshift_master/templates/master.yaml.v1.j2 b/roles/openshift_master/templates/master.yaml.v1.j2 index 9b3fbcf49..7159ccc7f 100644 --- a/roles/openshift_master/templates/master.yaml.v1.j2 +++ b/roles/openshift_master/templates/master.yaml.v1.j2 @@ -115,7 +115,7 @@ etcdStorageConfig:    openShiftStorageVersion: v1  imageConfig:    format: {{ openshift.master.registry_url }} -  latest: false +  latest: {{ openshift_master_image_config_latest }}  {% if 'image_policy_config' in openshift.master %}  imagePolicyConfig:{{ openshift.master.image_policy_config | to_padded_yaml(level=1) }}  {% endif %} @@ -275,12 +275,5 @@ servingInfo:    - {{ cipher_suite }}  {% endfor %}  {% endif %} -{% if openshift_template_service_broker_namespaces is defined %} -templateServiceBrokerConfig: -  templateNamespaces: -{% for namespace in openshift_template_service_broker_namespaces %} -  - {{ namespace }} -{% endfor %} -{% endif %}  volumeConfig:    dynamicProvisioningEnabled: {{ openshift.master.dynamic_provisioning_enabled }} diff --git a/roles/openshift_metrics/tasks/install_cassandra.yaml b/roles/openshift_metrics/tasks/install_cassandra.yaml index 7928a0346..48584bd64 100644 --- a/roles/openshift_metrics/tasks/install_cassandra.yaml +++ b/roles/openshift_metrics/tasks/install_cassandra.yaml @@ -54,6 +54,7 @@      access_modes: "{{ openshift_metrics_cassandra_pvc_access | list }}"      size: "{{ openshift_metrics_cassandra_pvc_size }}"      pv_selector: "{{ openshift_metrics_cassandra_pv_selector }}" +    storage_class_name: "{{ openshift_metrics_cassanda_pvc_storage_class_name | default('', true) }}"    with_sequence: count={{ openshift_metrics_cassandra_replicas }}    when: openshift_metrics_cassandra_storage_type == 'dynamic'    changed_when: false diff --git a/roles/openshift_node/defaults/main.yml b/roles/openshift_node/defaults/main.yml index 298d1013f..739b0d968 100644 --- a/roles/openshift_node/defaults/main.yml +++ b/roles/openshift_node/defaults/main.yml @@ -107,3 +107,6 @@ openshift_node_use_contiv: "{{ openshift_node_use_contiv_default }}"  openshift_node_data_dir_default: "{{ openshift_data_dir | default('/var/lib/origin') }}"  openshift_node_data_dir: "{{ openshift_node_data_dir_default }}" + +openshift_node_image_config_latest_default: "{{ openshift_image_config_latest | default(False) }}" +openshift_node_image_config_latest: "{{ openshift_node_image_config_latest_default }}" diff --git a/roles/openshift_node/tasks/bootstrap.yml b/roles/openshift_node/tasks/bootstrap.yml index b83b2c452..6bd2df362 100644 --- a/roles/openshift_node/tasks/bootstrap.yml +++ b/roles/openshift_node/tasks/bootstrap.yml @@ -29,7 +29,7 @@      line: "{% raw %}ExecStart=/usr/bin/openshift start node --bootstrap --kubeconfig=${KUBECONFIG} $OPTIONS{% endraw %}"      regexp: "^ExecStart=.*" -- name: "systemctl enable {{ openshift_service_type }}-node" +- name: "disable {{ openshift_service_type }}-node and {{ openshift_service_type }}-master services"    systemd:      name: "{{ item }}"      enabled: no diff --git a/roles/openshift_node/tasks/config/install-node-docker-service-file.yml b/roles/openshift_node/tasks/config/install-node-docker-service-file.yml deleted file mode 100644 index f92ff79b5..000000000 --- a/roles/openshift_node/tasks/config/install-node-docker-service-file.yml +++ /dev/null @@ -1,8 +0,0 @@ ---- -- name: Install Node docker service file -  template: -    dest: "/etc/systemd/system/{{ openshift.common.service_type }}-node.service" -    src: openshift.docker.node.service -  notify: -  - reload systemd units -  - restart node diff --git a/roles/openshift_node/tasks/install.yml b/roles/openshift_node/tasks/install.yml index 265bf2c46..1539d6e3b 100644 --- a/roles/openshift_node/tasks/install.yml +++ b/roles/openshift_node/tasks/install.yml @@ -27,5 +27,3 @@        docker pull {{ openshift.node.node_image }}:{{ openshift_image_tag }}      register: pull_result      changed_when: "'Downloaded newer image' in pull_result.stdout" - -  - include: config/install-node-docker-service-file.yml diff --git a/roles/openshift_node/tasks/systemd_units.yml b/roles/openshift_node/tasks/systemd_units.yml index 6b4490f61..9c182ade6 100644 --- a/roles/openshift_node/tasks/systemd_units.yml +++ b/roles/openshift_node/tasks/systemd_units.yml @@ -1,11 +1,9 @@  --- -# This file is included both in the openshift_master role and in the upgrade -# playbooks.  - name: Install Node service file    template:      dest: "/etc/systemd/system/{{ openshift.common.service_type }}-node.service" -    src: "node.service.j2" -  when: not openshift.common.is_containerized | bool +    src: "{{ openshift.common.is_containerized | bool | ternary('openshift.docker.node.service', 'node.service.j2') }}" +  when: not openshift.common.is_node_system_container | bool    notify:    - reload systemd units    - restart node diff --git a/roles/openshift_node/templates/node.yaml.v1.j2 b/roles/openshift_node/templates/node.yaml.v1.j2 index 7049f7189..08e1c7f4f 100644 --- a/roles/openshift_node/templates/node.yaml.v1.j2 +++ b/roles/openshift_node/templates/node.yaml.v1.j2 @@ -13,7 +13,7 @@ dockerConfig:  iptablesSyncPeriod: "{{ openshift.node.iptables_sync_period }}"  imageConfig:    format: {{ openshift.node.registry_url }} -  latest: false +  latest: {{ openshift_node_image_config_latest }}  kind: NodeConfig  kubeletArguments: {{ openshift.node.kubelet_args | default(None) | to_padded_yaml(level=1) }}  {% if openshift_use_crio | default(False) %} diff --git a/roles/openshift_storage_glusterfs/files/v3.7/deploy-heketi-template.yml b/roles/openshift_storage_glusterfs/files/v3.7/deploy-heketi-template.yml index 9ebb0d5ec..7b705c2d4 100644 --- a/roles/openshift_storage_glusterfs/files/v3.7/deploy-heketi-template.yml +++ b/roles/openshift_storage_glusterfs/files/v3.7/deploy-heketi-template.yml @@ -85,8 +85,6 @@ objects:            volumeMounts:            - name: db              mountPath: /var/lib/heketi -          - name: topology -            mountPath: ${TOPOLOGY_PATH}            - name: config              mountPath: /etc/heketi            readinessProbe: @@ -103,9 +101,6 @@ objects:                port: 8080          volumes:          - name: db -        - name: topology -          secret: -            secretName: heketi-${CLUSTER_NAME}-topology-secret          - name: config            secret:              secretName: heketi-${CLUSTER_NAME}-config-secret @@ -138,6 +133,3 @@ parameters:    displayName: GlusterFS cluster name    description: A unique name to identify this heketi service, useful for running multiple heketi instances    value: glusterfs -- name: TOPOLOGY_PATH -  displayName: heketi topology file location -  required: True diff --git a/roles/template_service_broker/defaults/main.yml b/roles/template_service_broker/defaults/main.yml index fb407c4a2..a92a138b0 100644 --- a/roles/template_service_broker/defaults/main.yml +++ b/roles/template_service_broker/defaults/main.yml @@ -2,3 +2,4 @@  # placeholder file?  template_service_broker_remove: False  template_service_broker_install: False +openshift_template_service_broker_namespaces: ['openshift'] diff --git a/roles/template_service_broker/tasks/install.yml b/roles/template_service_broker/tasks/install.yml index f5fd6487c..54008bbf1 100644 --- a/roles/template_service_broker/tasks/install.yml +++ b/roles/template_service_broker/tasks/install.yml @@ -28,10 +28,24 @@      - "{{ __tsb_template_file }}"      - "{{ __tsb_rbac_file }}"      - "{{ __tsb_broker_file }}" +    - "{{ __tsb_config_file }}" + +- yedit: +    src: "{{ mktemp.stdout }}/{{ __tsb_config_file }}" +    key: templateNamespaces +    value: "{{ openshift_template_service_broker_namespaces }}" +    value_type: list + +- slurp: +    src: "{{ mktemp.stdout }}/{{ __tsb_config_file }}" +  register: config  - name: Apply template file    shell: > -    oc process -f "{{ mktemp.stdout }}/{{ __tsb_template_file }}" --param API_SERVER_CONFIG="{{ lookup('file', __tsb_files_location ~ '/' ~ __tsb_config_file) }}" --param IMAGE="{{ template_service_broker_prefix }}{{ template_service_broker_image_name }}:{{ template_service_broker_version }}" | kubectl apply -f - +    oc process -f "{{ mktemp.stdout }}/{{ __tsb_template_file }}" +    --param API_SERVER_CONFIG="{{ config['content'] | b64decode }}" +    --param IMAGE="{{ template_service_broker_prefix }}{{ template_service_broker_image_name }}:{{ template_service_broker_version }}" +    | kubectl apply -f -  # reconcile with rbac  - name: Reconcile with RBAC file | 
