Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

WIP PvC Prereqs and Control Plane merge #61

Merged
merged 5 commits into from
Aug 10, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -1,4 +1,3 @@
#!/usr/bin/python
# Copyright 2021 Cloudera, Inc.
#
# Licensed under the Apache License, Version 2.0 (the "License");
Expand All @@ -13,17 +12,10 @@
# See the License for the specific language governing permissions and
# limitations under the License.

---

class FilterModule(object):

def filters(self):
return {
'filter_null_configs': self.filter_null_configs
}

def filter_null_configs(self, configs, existing_configs):
filtered_configs = dict(configs)
for item, value in configs.items():
if item not in existing_configs and not value:
del filtered_configs[item]
return filtered_configs
- name: restart cloudera management service
cm_api:
endpoint: /cm/service/commands/restart
method: POST
timeout: "{{ cluster_restart_timeout | default(3000) }}"
11 changes: 11 additions & 0 deletions roles/cloudera_manager/autotls/files/cert.py_patch
Original file line number Diff line number Diff line change
@@ -0,0 +1,11 @@
--- cert.py 2020-12-02 00:54:05.000000000 +0100
+++ cert.py_2 2021-02-18 09:09:38.095192730 +0100
@@ -1949,7 +1949,7 @@
LOG.info("Could not find JKS truststore at location: %s. Converting "
"PEM truststore to JKS." % cluster_ca_jks)
generate_truststore(self.cfg.keytool, cluster_ca_jks, truststore_password,
- cluster_ca_pem)
+ cluster_ca_pem, self.cfg.keystore_type)

global_ca_pem = self.trust_files[GLOBAL_TLS_SET][PEM_TLS_TYPE]
copied_cluster_to_global = False
53 changes: 39 additions & 14 deletions roles/cloudera_manager/autotls/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -23,23 +23,48 @@
msg: This playbook requires Cloudera Manager 7.1+
when: response.json.version is version('7.1', '<')

- name: Patch Cloudera Manager older than 7.3
include_tasks:
file: patch_old_cm
when: response.json.version is version('7.3.0', '<')

- name: Check if password or key is used to connect to machines
set_fact:
use_password: "{{ true if node_password is defined and node_password|length > 0 else false }}"

- name: DEBUG Auto-TLS using password
debug:
msg: "{{ lookup('template', 'auto-tls.json') }}"
when: use_password and debug | default(false)

- name: Enable Auto-TLS
cloudera.cluster.cm_api:
endpoint: /cm/commands/generateCmca
cm_api:
endpoint: "/cm/commands/generateCmca"
method: POST
body: "{{ lookup('template', 'request.j2', convert_data=False) }}"
body: "{{ lookup('template', 'auto-tls.json') }}"
timeout: 360
ignore_errors: true
when: use_password

- name: Restart Cloudera Manager Server
service:
name: cloudera-scm-server
state: restarted
notify:
- wait cloudera-scm-server
- name: Set node_key on one line
set_fact:
node_key_one_line: "{{ lookup('file', '~/node_key' ) | replace('\n', '\\n') | replace('\"', '\\\"' ) }}"
when: not use_password

- name: Wait for Cloudera Manager Server to come back up
meta: flush_handlers
- name: DEBUG Auto-TLS using key
debug:
msg: "{{ lookup('template', 'auto-tls-key.json') }}"
when: not use_password

- name: Restart Cloudera Management Service
cloudera.cluster.cm_api:
endpoint: /cm/service/commands/restart
- name: Enable Auto-TLS
cm_api:
endpoint: "/cm/commands/generateCmca"
method: POST
body: "{{ lookup('template', 'auto-tls-key.json') }}"
ignore_errors: true
when: not use_password
notify:
- restart cloudera-scm-server
- restart cloudera management service
- restart cloudera-scm-agent

16 changes: 16 additions & 0 deletions roles/cloudera_manager/autotls/tasks/patch_old_cm.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
---
- name: Copy patch to machines
copy:
src: "{{ role_path}}/files/cert.py_patch"
dest: /opt/cloudera/cm-agent/lib/python2.7/site-packages/cmf/tools/cert.py_patch
owner: cloudera-scm
group: cloudera-scm
mode: '0644'

- name: Backup cert.py
shell: cp /opt/cloudera/cm-agent/lib/python2.7/site-packages/cmf/tools/cert.py /opt/cloudera/cm-agent/lib/python2.7/site-packages/cmf/tools/cert.py.backup

- name: Fix cert.py
ansible.posix.patch:
src: "{{ role_path}}/patch/cert.py_patch"
dest: /opt/cloudera/cm-agent/lib/python2.7/site-packages/cmf/tools/cert.py
9 changes: 9 additions & 0 deletions roles/cloudera_manager/autotls/templates/auto-tls-key.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
{
"customCA" : false,
"configureAllServices" : "true",
"sshPort" : 22,
{% if freeipa_activated %}"trustedCaCerts" : "/etc/ipa/ca.crt",{% endif %}
"userName" : "root",
"privateKey": "{{ node_key_one_line }}"
}

9 changes: 9 additions & 0 deletions roles/cloudera_manager/autotls/templates/auto-tls.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
{
"customCA" : false,
"configureAllServices" : "true",
"sshPort" : 22,
{% if freeipa_activated %}"trustedCaCerts" : "/etc/ipa/ca.crt",{% endif %}
"userName" : "root",
"password": "{{ node_password }}"
}

18 changes: 0 additions & 18 deletions roles/cloudera_manager/autotls/templates/request.j2

This file was deleted.

16 changes: 16 additions & 0 deletions roles/cloudera_manager/cms_tls/files/cms_keystore_tls.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,16 @@
{
"items": [
{
"name": "ssl_server_keystore_location",
"value": "{{CM_AUTO_TLS}}"
},
{
"name": "ssl_server_keystore_password",
"value": "{{CM_AUTO_TLS}}"
},
{
"name": "ssl_enabled",
"value": "true"
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,28 @@
{
"items": [
{
"name": "navigator_truststore_file",
"value": "{{CM_AUTO_TLS}}"
},
{
"name": "navigator_truststore_password",
"value": "{{CM_AUTO_TLS}}"
},
{
"name": "ssl_server_keystore_location",
"value": "{{CM_AUTO_TLS}}"
},
{
"name": "ssl_server_keystore_password",
"value": "{{CM_AUTO_TLS}}"
},
{
"name": "ssl_server_keystore_keypassword",
"value": "{{CM_AUTO_TLS}}"
},
{
"name": "ssl_enabled",
"value": "true"
}
]
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,20 @@
{
"items": [
{
"name": "ssl_server_keystore_location",
"value": "{{CM_AUTO_TLS}}"
},
{
"name": "ssl_server_keystore_password",
"value": "{{CM_AUTO_TLS}}"
},
{
"name": "ssl_server_keystore_keypassword",
"value": "{{CM_AUTO_TLS}}"
},
{
"name": "ssl_enabled",
"value": "true"
}
]
}
12 changes: 12 additions & 0 deletions roles/cloudera_manager/cms_tls/files/cms_truststore_tls.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,12 @@
{
"items": [
{
"name": "ssl_client_truststore_location",
"value": "{{CM_AUTO_TLS}}"
},
{
"name": "ssl_client_truststore_password",
"value": "{{CM_AUTO_TLS}}"
}
]
}
3 changes: 3 additions & 0 deletions roles/cloudera_manager/cms_tls/meta/main.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
---
dependencies:
- role: cloudera.cluster.cloudera_manager.api_client
40 changes: 40 additions & 0 deletions roles/cloudera_manager/cms_tls/tasks/main.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
---
- name: Setup TLS for Activity Monitor
cm_api:
method: PUT
endpoint: /cm/service/roleConfigGroups/mgmt-ACTIVITYMONITOR-BASE/config
body: "{{ lookup('file', 'cms_keystore_tls.json', convert_data=False) }}"

- name: Setup TLS for Host Monitor
cm_api:
method: PUT
endpoint: /cm/service/roleConfigGroups/mgmt-HOSTMONITOR-BASE/config
body: "{{ lookup('file', 'cms_keystore_tls.json', convert_data=False) }}"

- name: Setup TLS for Service Monitor
cm_api:
method: PUT
endpoint: /cm/service/roleConfigGroups/mgmt-SERVICEMONITOR-BASE/config
body: "{{ lookup('file', 'cms_keystore_tls.json', convert_data=False) }}"

- name: Setup TLS for Navigator
cm_api:
method: PUT
endpoint: /cm/service/roleConfigGroups/mgmt-NAVIGATOR-BASE/config
body: "{{ lookup('file', 'cms_navigator_keystore_tls.json', convert_data=False) }}"
when: cloudera_manager_version is version('7.0.0','<')

- name: Setup TLS for Navigator Meta Server
cm_api:
method: PUT
endpoint: /cm/service/roleConfigGroups/mgmt-NAVIGATORMETASERVER-BASE/config
body: "{{ lookup('file', 'cms_navigator_metaserver_keystore_tls.json', convert_data=False) }}"
when: cloudera_manager_version is version('7.0.0','<')

- name: Setup TLS for CMS
cm_api:
method: PUT
endpoint: /cm/service/config
body: "{{ lookup('file', 'cms_truststore_tls.json', convert_data=False) }}"
notify:
- restart cloudera management service
2 changes: 1 addition & 1 deletion roles/cloudera_manager/config/meta/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,6 @@

---
dependencies:
- role: cloudera_manager/api_client
- role: cloudera.cluster.cloudera_manager.api_client


26 changes: 25 additions & 1 deletion roles/cloudera_manager/external_auth/defaults/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,31 @@
# limitations under the License.

---

cloudera_manager_external_auth:
provider: "{{ 'FreeIPA' if freeipa_activated == true else omit }}"
external_first: no
external_only: no
external_set: "{{ 'yes' if freeipa_activated == true else 'no' }}"
role_mappings: "{{ default_free_ipa_role_mappings if freeipa_activated == true else omit }}"

default_free_ipa_role_mappings:
- group: admins
roles: [ ROLE_ADMIN ]
- group: auditors
roles: [ ROLE_AUDITOR ]
- group: users
roles: [ ROLE_USER ]

auth_providers:
FreeIPA:
type: LDAP
ldap_url: "{{ ipa_ldap_url }}"
ldap_base_dn:
ldap_bind_user_dn: "{{ ipa_ldap_user_bind_dn }}"
ldap_bind_password: "{{ ipa_ldap_user_bind_password }}"
ldap_search_base:
user: "{{ ipa_ldap_user_search_base }}"
group: "{{ ipa_ldap_group_search_base }}"
ldap_search_filter:
user: "{{ ipa_ldap_user_search_filter }}"
group: "{{ ipa_ldap_user_group_filter }}"
1 change: 1 addition & 0 deletions roles/cloudera_manager/external_auth/meta/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -16,3 +16,4 @@

dependencies:
- role: cloudera.cluster.cloudera_manager.api_client
- role: cloudera.cluster.infrastructure.krb5_common
3 changes: 3 additions & 0 deletions roles/cloudera_manager/kerberos/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -26,6 +26,9 @@
endpoint: /cm/commands/importAdminCredentials?username={{ krb5_kdc_admin_user | urlencode }}&password={{ krb5_kdc_admin_password | urlencode }}
method: POST
register: result
failed_when:
- result is failed
- "'already exists' not in result.content"
until: result is not failed
retries: 3
delay: 10
6 changes: 4 additions & 2 deletions roles/cloudera_manager/repo/defaults/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,6 +14,8 @@

---
cloudera_archive_base_url: https://archive.cloudera.com
cloudera_manager_version: 7.4.4
cloudera_manager_version: 7.6.1
cloudera_manager_distro_name: "{{ ansible_os_family | lower }}"
cloudera_manager_distro_version: "{{ ansible_distribution_major_version }}"

install_repo_on_host: yes
install_repo_on_host: yes
5 changes: 2 additions & 3 deletions roles/cloudera_manager/repo/vars/RedHat.yml
Original file line number Diff line number Diff line change
Expand Up @@ -13,12 +13,11 @@
# limitations under the License.

---
__cloudera_manager_distro_name: "{{ ansible_os_family | lower }}{{ ansible_distribution_major_version }}"
__cloudera_manager_major_version: "{{ cloudera_manager_version.split('.')[0] }}"
__cloudera_manager_cm5_path: "{{ ansible_os_family | lower }}/{{ ansible_distribution_major_version }}/x86_64/cm/{{ cloudera_manager_version }}"
__cloudera_manager_cm6_path: "{{ cloudera_manager_version }}/{{ __cloudera_manager_distro_name }}/yum"
__cloudera_manager_cm6_path: "{{ cloudera_manager_version }}/{{ cloudera_manager_distro_name }}{{ cloudera_manager_distro_version }}/yum"

__cloudera_manager_repo_url_trial: "{{ cloudera_archive_base_url | regex_replace('/?$','') }}/cm{{ __cloudera_manager_major_version }}/{{ cloudera_manager_version }}/{{ __cloudera_manager_distro_name }}/yum"
__cloudera_manager_repo_url_trial: "{{ cloudera_archive_base_url | regex_replace('/?$','') }}/cm{{ __cloudera_manager_major_version }}/{{ cloudera_manager_version }}/{{ cloudera_manager_distro_name }}{{ cloudera_manager_distro_version }}/yum"
__cloudera_manager_repo_url_paywall: "{{ cloudera_archive_base_url | regex_replace('/?$','') }}/p/cm{{ __cloudera_manager_major_version }}/{{ (__cloudera_manager_major_version == '5' ) | ternary(__cloudera_manager_cm5_path, __cloudera_manager_cm6_path) }}"

__cloudera_manager_repo_key_filename: "RPM-GPG-KEY-cloudera"
Expand Down
6 changes: 6 additions & 0 deletions roles/cloudera_manager/services_info/defaults/main.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
cluster_name: Default
ranger_user: "{{ ranger_rangeradmin_user | default('admin') }}"
ranger_password: "{{ ranger_rangeradmin_user_password | default(cloudera_manager_admin_password) }}"
solr_admin_password: "{{ solr_solradmin_user_password | default(cloudera_manager_admin_password) }}"

wxm_api_port: 12022
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,6 @@
# limitations under the License.

---
- name: restart cloudera-scm-agent
service:
name: cloudera-scm-agent
state: restarted

dependencies:
- role: cloudera.cluster.cloudera_manager.api_client
Loading