33-clair-deploy.yml 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218
  1. ---
  2. # Tasks required by 15-clair-deploy.adoc.
  3. - name: Prepare registry VM to run Clair services.
  4. hosts: registry.ocp4.example.com
  5. gather_subset: min
  6. remote_user: quay
  7. tasks:
  8. - name: Ensure the podman network is there.
  9. containers.podman.podman_network_info:
  10. name: quay
  11. register: quay_net
  12. ignore_errors: yes
  13. - ansible.builtin.assert:
  14. that:
  15. - not quay_net.failed
  16. - quay_net.networks is defined
  17. - quay_net.networks is iterable
  18. - quay_net.networks | length == 1
  19. fail_msg: "FATAL: Podman network 'quay' does not exist for 'quay' user. Ensure you deployed Quay before running this playbook."
  20. success_msg: "OK, network 'quay' found."
  21. - name: Ensure the quay service is defined.
  22. ansible.builtin.stat:
  23. path: "{{ ansible_facts['user_dir'] }}/.config/systemd/user/quay.service"
  24. get_attributes: no
  25. get_checksum: no
  26. get_mime: no
  27. register: quay_svc_unit
  28. - ansible.builtin.assert:
  29. that:
  30. - not quay_svc_unit.failed
  31. - quay_svc_unit.stat.exists
  32. fail_msg: "FATAL: User service 'quay.service' not found for 'quay' user. Ensure you deployed Quay before running this playbook."
  33. success_msg: "OK, service 'quay.service' found."
  34. - name: Ensure the quay-pg service is defined.
  35. ansible.builtin.stat:
  36. path: "{{ ansible_facts['user_dir'] }}/.config/systemd/user/quay-pg.service"
  37. get_attributes: no
  38. get_checksum: no
  39. get_mime: no
  40. register: quay_pg_svc_unit
  41. - ansible.builtin.assert:
  42. that:
  43. - not quay_pg_svc_unit.failed
  44. - quay_pg_svc_unit.stat.exists
  45. fail_msg: "FATAL: User service 'quay-pg.service' not found for 'quay' user. Ensure you deployed Quay before running this playbook."
  46. success_msg: "OK, service 'quay-pg.service' found."
  47. - name: Ensure Quay PostgreSQL is running.
  48. ansible.builtin.systemd_service:
  49. name: quay-pg
  50. scope: user
  51. state: started
  52. - name: Check whether the clair database exists.
  53. containers.podman.podman_container_exec:
  54. name: postgresql
  55. command: psql -d postgres -U postgres -t -A -c "SELECT datname FROM pg_database WHERE datname = 'clair'"
  56. register: pg_clair
  57. changed_when: no
  58. - name: Create the clair database if necessary.
  59. containers.podman.podman_container_exec:
  60. name: postgresql
  61. command: 'psql -d postgres -U postgres -c "CREATE DATABASE clair OWNER quay"'
  62. when:
  63. - pg_clair is defined
  64. - pg_clair.stdout_lines | length == 0
  65. - name: Create the uuid-ossp extension if necessary.
  66. containers.podman.podman_container_exec:
  67. name: postgresql
  68. command: psql -d clair -U postgres -c 'CREATE EXTENSION IF NOT EXISTS "uuid-ossp"'
  69. register: pg_ext
  70. changed_when:
  71. - not "already exists" in pg_ext.stderr
  72. - name: Pull all the images if necessary.
  73. containers.podman.podman_image:
  74. name: "{{ registry_host }}/quay/clair-rhel8:v{{ quay_version }}"
  75. pull: yes
  76. state: present
  77. # TODO: Make loop labels nicer.
  78. - name: Patch Quay config if necessary.
  79. ansible.builtin.lineinfile:
  80. path: "{{ ansible_facts['user_dir'] }}/config/config.yaml"
  81. insertafter: "{{ item.after }}"
  82. regexp: "{{ item.fixre }}"
  83. line: "{{ item.value }}"
  84. loop:
  85. - after: "^FEATURE_MAILING: false$"
  86. fixre: "^FEATURE_SECURITY_SCANNER: .*$"
  87. value: "FEATURE_SECURITY_SCANNER: true"
  88. - after: "^SECRET_KEY: .*$"
  89. fixre: "^SECURITY_SCANNER_INDEXING_INTERVAL: .*$"
  90. value: "SECURITY_SCANNER_INDEXING_INTERVAL: 30"
  91. - after: "^SECURITY_SCANNER_INDEXING_INTERVAL: .*$"
  92. fixre: "^SECURITY_SCANNER_V4_PSK: .*$"
  93. value: "SECURITY_SCANNER_V4_PSK: NjA1aWhnNWk4MWhqNw=="
  94. - after: "^SECURITY_SCANNER_V4_PSK: .*$"
  95. fixre: "^SECURITY_SCANNER_V4_ENDPOINT: .*$"
  96. value: "SECURITY_SCANNER_V4_ENDPOINT: http://clair:8081"
  97. notify:
  98. - restart quay and wait for ready
  99. - name: Create Clair config directory if necessary.
  100. ansible.builtin.file:
  101. path: "{{ ansible_facts['user_dir'] }}/clair"
  102. state: directory
  103. mode: 0775
  104. - name: Publish Clair config if necessary.
  105. ansible.builtin.copy:
  106. dest: "{{ ansible_facts['user_dir'] }}/clair/config.yaml"
  107. content: |
  108. http_listen_addr: :8081
  109. introspection_addr: :8088
  110. #log_level: debug # too noisy
  111. log_level: info
  112. indexer:
  113. connstring: host=postgresql port=5432 dbname=clair user=quay password=secret sslmode=disable
  114. scanlock_retry: 10
  115. layer_scan_concurrency: 5
  116. migrations: true
  117. scanner:
  118. repo:
  119. rhel-repository-scanner:
  120. repo2cpe_mapping_file: /data/repository-to-cpe.json
  121. package:
  122. rhel_containerscanner:
  123. name2repos_mapping_file: /data/container-name-repos-map.json
  124. matcher:
  125. connstring: host=postgresql port=5432 dbname=clair user=quay password=secret sslmode=disable
  126. max_conn_pool: 100
  127. migrations: true
  128. indexer_addr: clair-indexer
  129. notifier:
  130. connstring: host=postgresql port=5432 dbname=clair user=quay password=secret sslmode=disable
  131. delivery_interval: 1m
  132. poll_interval: 5m
  133. migrations: true
  134. updaters:
  135. config:
  136. rhel:
  137. ignore_unpatched: false
  138. auth:
  139. psk:
  140. key: "NjA1aWhnNWk4MWhqNw=="
  141. iss: ["quay"]
  142. metrics:
  143. name: "prometheus"
  144. mode: 0664
  145. notify:
  146. - restart quay and wait for ready
  147. - restart clair
  148. - name: Ensure same TLS trust will be used for Clair as for workstation.
  149. ansible.builtin.copy:
  150. src: /etc/pki/ca-trust/extracted/pem/tls-ca-bundle.pem
  151. dest: "{{ ansible_facts['user_dir'] }}/tls-ca-bundle.pem"
  152. mode: 0664
  153. notify:
  154. - restart clair
  155. - name: Ensure Clair service unit is there.
  156. ansible.builtin.template:
  157. dest: "{{ ansible_facts['user_dir'] }}/.config/systemd/user/clair.service"
  158. src: "templates/clair.service.j2"
  159. - name: Reload systemd.
  160. ansible.builtin.systemd_service:
  161. daemon_reload: yes
  162. scope: user
  163. - name: Enable services and start them.
  164. ansible.builtin.systemd_service:
  165. name: clair
  166. scope: user
  167. state: started
  168. enabled: yes
  169. handlers:
  170. - name: restart quay
  171. listen: restart quay and wait for ready
  172. ansible.builtin.systemd_service:
  173. name: quay
  174. scope: user
  175. state: restarted
  176. - name: wait for quay to become ready again
  177. listen: restart quay and wait for ready
  178. ansible.builtin.uri:
  179. method: GET
  180. url: https://registry.ocp4.example.com/
  181. headers:
  182. Accept: application/json
  183. Content-Type: application/json
  184. validate_certs: no
  185. status_code:
  186. - 200
  187. - 404
  188. - 502
  189. register: startup_wait
  190. until: startup_wait.status == 200
  191. retries: 30
  192. delay: 5
  193. - name: restart clair
  194. ansible.builtin.systemd_service:
  195. name: clair
  196. scope: user
  197. state: restarted
  198. ...