blob: ed5403d3363578f4fcbf3c3019852633a15d51c1 (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
|
---
- name: fail if kubernetes_network_plugin_variant is set to with-kube-router
run_once: yes
assert:
msg: Unfortunately using kube-router together with kubeguard does not work at the moment!
that: "kubernetes_network_plugin_variant != 'with-kube-router'"
- name: make sure kubernetes_network_plugin_replaces_kube_proxy is not set
when:
- "kubernetes_network_plugin_variant != 'with-kube-router'"
run_once: yes
assert:
msg: "kubeguard variant '{{ kubernetes_network_plugin_variant }}' can not replace kube-proxy, please set kubernetes_network_plugin_replaces_kube_proxy to false or configure a differnt kubernetes_network_plugin_variant."
that: not kubernetes_network_plugin_replaces_kube_proxy
- name: install wireguard
import_role:
name: wireguard/base
- name: create network config directory
file:
name: /var/lib/kubeguard/
state: directory
- name: install ifupdown script
template:
src: net_kubeguard/ifupdown.sh.j2
dest: /var/lib/kubeguard/ifupdown.sh
mode: 0755
# TODO: notify reload... this is unfortunately already to late because
# it must probably be brought down by the old version of the script
- name: generate wireguard private key
shell: "umask 077; wg genkey > /var/lib/kubeguard/kubeguard-wg0.privatekey"
args:
creates: /var/lib/kubeguard/kubeguard-wg0.privatekey
- name: fetch wireguard public key
shell: "wg pubkey < /var/lib/kubeguard/kubeguard-wg0.privatekey"
register: kubeguard_wireguard_pubkey
changed_when: false
check_mode: no
- name: install systemd service unit for network interface
template:
src: net_kubeguard/interface.service.j2
dest: /etc/systemd/system/kubeguard-interface.service
# TODO: notify: reload???
- name: make sure kubeguard interface service is started and enabled
systemd:
daemon_reload: yes
name: kubeguard-interface.service
state: started
enabled: yes
- name: install systemd units for every kubeguard peer
loop: "{{ groups['_kubernetes_nodes_'] | difference(inventory_hostname) }}"
loop_control:
loop_var: peer
template:
src: net_kubeguard/peer.service.j2
dest: "/etc/systemd/system/kubeguard-peer-{{ peer }}.service"
# TODO: notify restart for peers that change...
- name: make sure kubeguard peer services are started and enabled
loop: "{{ groups['_kubernetes_nodes_'] | difference(inventory_hostname) }}"
systemd:
daemon_reload: yes
name: "kubeguard-peer-{{ item }}.service"
state: started
enabled: yes
- name: enable IPv4 forwarding
sysctl:
name: net.ipv4.ip_forward
value: '1'
sysctl_set: yes
state: present
reload: yes
- name: create cni config directory
file:
name: /etc/cni/net.d
state: directory
- name: install cni config
template:
src: net_kubeguard/cni.json.j2
dest: /etc/cni/net.d/kubeguard.json
- name: install packages needed for debugging kube-router
when: kubernetes_network_plugin_variant == 'with-kube-router'
apt:
name:
- iptables
- ipvsadm
- ipset
state: present
|