Skip to content
Snippets Groups Projects
Commit 4f5eed5a authored by jupiter's avatar jupiter
Browse files

add mountFileSystems

parent 3a2a2650
No related branches found
No related tags found
No related merge requests found
...@@ -53,18 +53,17 @@ ...@@ -53,18 +53,17 @@
- name: "Create node tmp directory" - name: "Create node tmp directory"
delegate_to: 127.0.0.1 delegate_to: 127.0.0.1
shell: "mkdir -p /tmp/{{ inventory_hostname }} ; chmod 755 /tmp/{{ inventory_hostname }}" shell: "mkdir -p /tmp/{{ inventory_hostname }} ; chmod 755 /tmp/{{ inventory_hostname }}"
when: x509_ca_server != inventory_hostname
- name: "Copy CSR to ansible host" - name: "Copy CSR to ansible host"
fetch: "src=/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.csr dest=/tmp/{{ inventory_hostname }}/{{ inventory_hostname }}.csr fail_on_missing=yes validate_md5=yes flat=yes" fetch: "src=/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.csr dest=/tmp/{{ inventory_hostname }}/{{ inventory_hostname }}.csr fail_on_missing=yes validate_md5=yes flat=yes"
sudo: true sudo: true
when: needcert and x509_ca_server != inventory_hostname when: needcert
- name: "Copy CSR to CA" - name: "Copy CSR to CA"
remote_user: "{{ hostvars[x509_ca_server]['ansible_ssh_user'] }}" remote_user: "{{ hostvars[x509_ca_server]['ansible_ssh_user'] }}"
delegate_to: "{{ x509_ca_server }}" delegate_to: "{{ x509_ca_server }}"
copy: "src=/tmp/{{ inventory_hostname }}/{{ inventory_hostname }}.csr dest=/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.csr force=yes" copy: "src=/tmp/{{ inventory_hostname }}/{{ inventory_hostname }}.csr dest=/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.csr force=yes"
when: needcert and x509_ca_server != inventory_hostname when: needcert
sudo: true sudo: true
- name: "Sign Certificate" - name: "Sign Certificate"
...@@ -79,35 +78,35 @@ ...@@ -79,35 +78,35 @@
delegate_to: "{{ x509_ca_server }}" delegate_to: "{{ x509_ca_server }}"
fetch: "src=/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.crt dest=/tmp/{{ inventory_hostname }}/{{ x509_common_name }}.crt fail_on_missing=yes validate_md5=yes flat=yes" fetch: "src=/etc/easy-rsa/2.0/keys/{{ x509_common_name }}.crt dest=/tmp/{{ inventory_hostname }}/{{ x509_common_name }}.crt fail_on_missing=yes validate_md5=yes flat=yes"
sudo: true sudo: true
when: needcert and x509_ca_server != inventory_hostname when: needcert
- name: "Copy the CA Certificate to the ansible host" - name: "Copy the CA Certificate to the ansible host"
remote_user: "{{ hostvars[x509_ca_server]['ansible_ssh_user'] }}" remote_user: "{{ hostvars[x509_ca_server]['ansible_ssh_user'] }}"
delegate_to: "{{ x509_ca_server }}" delegate_to: "{{ x509_ca_server }}"
fetch: "src=/etc/easy-rsa/2.0/keys/ca.crt dest=/tmp/{{ inventory_hostname }}/ca.crt fail_on_missing=yes validate_md5=yes flat=yes" fetch: "src=/etc/easy-rsa/2.0/keys/ca.crt dest=/tmp/{{ inventory_hostname }}/ca.crt fail_on_missing=yes validate_md5=yes flat=yes"
sudo: true sudo: true
when: ca_cert.stat.exists == false and x509_ca_server != inventory_hostname when: "ca_cert.stat.exists == false"
- name: "Make sure the path to the certificate exists" - name: "Make sure the path to the certificate exists"
shell: "mkdir -p `dirname {{ x509_cert_file }}` ; chmod 755 `dirname {{ x509_cert_file }}`" shell: "mkdir -p `dirname {{ x509_cert_file }}` ; chmod 755 `dirname {{ x509_cert_file }}`"
sudo: true sudo: true
- name: "Copy the certificate to the node" - name: "Copy the certificate to the node"
copy: "src=/tmp/{{ inventory_hostname }}/{{ x509_common_name }}.crt dest=/tmp/{{ x509_common_name }}.crt force=yes" copy: "src=/tmp/{{ inventory_hostname }}/{{ x509_common_name }}.crt dest=/tmp/{{ x509_common_name }}.crt force=yes"
sudo: true sudo: true
when: needcert and x509_ca_server != inventory_hostname when: needcert
- name: "Copy the certificate to the right location" - name: "Copy the certificate to the right location"
shell: "cp -f /tmp/{{ x509_common_name }}.crt {{ x509_cert_file }}" shell: "cp -f /tmp/{{ x509_common_name }}.crt {{ x509_cert_file }}"
sudo: true sudo: true
when: needcert and x509_ca_server != inventory_hostname when: needcert
- name: "Copy the CA certificate to the node" - name: "Copy the CA certificate to the node"
copy: "src=/tmp/{{ inventory_hostname }}/ca.crt dest={{ x509_cacert_file }}" copy: "src=/tmp/{{ inventory_hostname }}/ca.crt dest={{ x509_cacert_file }}"
sudo: true sudo: true
when: ca_cert.stat.exists == false and x509_ca_server != inventory_hostname when: "ca_cert.stat.exists == false"
- name: "Copy the key to the correct location" - name: "Copy the key to the correct location"
shell: "mkdir -p `dirname {{ x509_key_file }}` ; chmod 700 `dirname {{ x509_key_file }}` ; cp /etc/easy-rsa/2.0/keys/{{ x509_common_name }}.key {{ x509_key_file }}" shell: "mkdir -p `dirname {{ x509_key_file }}` ; chmod 700 `dirname {{ x509_key_file }}` ; cp /etc/easy-rsa/2.0/keys/{{ x509_common_name }}.key {{ x509_key_file }}"
sudo: true sudo: true
when: needcert and x509_ca_server != inventory_hostname when: needcert
...@@ -3,11 +3,11 @@ ...@@ -3,11 +3,11 @@
filesystem: fstype={{ item.fstype }} dev={{ item.dev }} opts={{ item.opts }} filesystem: fstype={{ item.fstype }} dev={{ item.dev }} opts={{ item.opts }}
with_items: mkFileSystems with_items: mkFileSystems
sudo: true sudo: true
when: configDiskDevice when: configDiskDevice or mkFileSystems is defined
- name: Mount device - name: Mount device
mount: name={{ item.name }} src={{ item.dev }} fstype={{ item.fstype }} opts={{ item.mntopts }} state=mounted mount: name={{ item.name }} src={{ item.dev }} fstype={{ item.fstype }} opts={{ item.opts }} state=mounted
with_items: mkFileSystems with_items: mountFileSystems
sudo: true sudo: true
when: configDiskDevice when: configDiskDevice or mountFileSystems is defined
---
mkFileSystems:
- {fstype : 'ext4', dev: '/dev/vdc', opts: '', name: '/mnt'}
mountFileSystems:
- {name: '/mnt', fstype : 'ext4', dev: '/dev/vdc', opts: 'defaults,nofail'}
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment