Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enabled TLS encrypted communication for etcd #857

Merged
merged 36 commits into from
Dec 30, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
36 commits
Select commit Hold shift + click to select a range
73bbab9
Enabled TLS communication encryption
klention Dec 21, 2024
1e74ad8
Brake the long lines into shorter ones
klention Dec 21, 2024
3a34ac1
Removed extra space from pg_hba/conf
klention Dec 21, 2024
e4b34d3
Updated etcd molecule test to check on different protocols
klention Dec 21, 2024
444cf71
Fetch machine IPs differently
klention Dec 21, 2024
da78fd7
Fetch machine's IP from variable inventory_hostname
klention Dec 21, 2024
c515238
Set inventory file content to default
klention Dec 21, 2024
d99b1ea
Updated etcd certificate path on molecule tests
klention Dec 22, 2024
f60b26b
Update inventory
vitabaks Dec 23, 2024
2901a02
Use patroni_etcd_protocol variable
vitabaks Dec 23, 2024
f13c39a
Use 'default(omit)' to skip the parameter if it is not defined
vitabaks Dec 23, 2024
decadb7
Update etcd.yml
vitabaks Dec 23, 2024
f143688
Update main.yml
vitabaks Dec 23, 2024
7368911
add 'default' variable value
vitabaks Dec 23, 2024
d30cd4f
Added subject to the TLS certificate signing request
klention Dec 24, 2024
adf6dbe
Update automation/vars/main.yml
vitabaks Dec 26, 2024
9c554f6
hba_host_type
vitabaks Dec 26, 2024
ddfea61
host_type
vitabaks Dec 26, 2024
d7ad3f7
Minor updates
klention Dec 27, 2024
38b384d
Add default for tls_cert_generate variable
vitabaks Dec 27, 2024
71e33f1
Update vip-manager.yml.j2
vitabaks Dec 27, 2024
c166664
Update automation/roles/tls_certificate/generate/tasks/main.yml
klention Dec 27, 2024
4d521f5
Remove the source of TLS cert/key/ca
klention Dec 27, 2024
52536a3
Update deploy_pgcluster.yml
vitabaks Dec 28, 2024
eae83bb
Create tls directory for etcd
vitabaks Dec 28, 2024
0187bd1
update patroni.yml template for etcd
vitabaks Dec 28, 2024
d779a59
update path to tls dir for etcd
vitabaks Dec 28, 2024
aa6bb8c
update defaults for postgres tls path
vitabaks Dec 28, 2024
d8c6067
fix typo in tls path
vitabaks Dec 28, 2024
7d354d3
Update patroni.yml.j2
vitabaks Dec 28, 2024
e191f9c
patroni.yml: use postgres tls path
vitabaks Dec 28, 2024
7b0077a
tls for confd
vitabaks Dec 28, 2024
da7c6e6
update tls dir path for vip-manager
vitabaks Dec 28, 2024
9ac4068
Generate subjectAltName entries for all hosts
vitabaks Dec 30, 2024
c12effb
remove "copy_for" variable and extra tasks
vitabaks Dec 30, 2024
ec00506
Add tls tags
vitabaks Dec 30, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
31 changes: 17 additions & 14 deletions automation/deploy_pgcluster.yml
Original file line number Diff line number Diff line change
Expand Up @@ -83,18 +83,6 @@
- pgbackrest_auto_conf | default(true) | bool # to be able to disable auto backup settings
tags: always

roles:
# (optional) if 'ssh_public_keys' is defined
- role: authorized-keys
tags: ssh_public_keys

- role: pre-checks
vars:
minimal_ansible_version: 2.16.0
timescale_minimal_pg_version: 12 # if enable_timescale is defined
tags: always

tasks:
- name: Clean dnf cache
ansible.builtin.command: dnf clean all
when:
Expand Down Expand Up @@ -202,6 +190,22 @@
when: pre_deploy_command | default('') | length > 0
tags: pre_deploy, pre_deploy_command

roles:
# (optional) if 'ssh_public_keys' is defined
- role: authorized-keys
tags: ssh_public_keys

- role: pre-checks
vars:
minimal_ansible_version: 2.16.0
timescale_minimal_pg_version: 12 # if enable_timescale is defined
tags: always

- role: hostname

- role: tls_certificate/generate
when: tls_cert_generate|bool

- name: deploy_pgcluster.yml | Deploy etcd cluster
ansible.builtin.import_playbook: etcd_cluster.yml
when: not dcs_exists|bool and dcs_type == "etcd"
Expand Down Expand Up @@ -261,7 +265,6 @@
when: firewall_enabled_at_boot|bool
tags: firewall

- role: hostname
- role: resolv_conf
- role: etc_hosts
- role: add-repository
Expand Down Expand Up @@ -356,7 +359,7 @@

- role: cron

- role: tls_certificate
- role: tls_certificate/copy
when: tls_cert_generate|bool

- role: pgbouncer
Expand Down
7 changes: 6 additions & 1 deletion automation/molecule/tests/etcd/etcd.yml
Original file line number Diff line number Diff line change
@@ -1,8 +1,13 @@
---
- name: Check etcd health
ansible.builtin.uri:
url: "http://{{ inventory_hostname }}:2379/health"
url: "{{ patroni_etcd_protocol | default('http', true) }}://{{ inventory_hostname }}:2379/health"
method: GET
return_content: true
validate_certs: "{{ tls_cert_generate | default(false) | bool }}"
ca_path: "{{ tls_etcd_ca_cert_path if tls_cert_generate | default(false) | bool else omit }}"
client_cert: "{{ tls_etcd_cert_path if tls_cert_generate | default(false) | bool else omit }}"
client_key: "{{ tls_etcd_privatekey_path if tls_cert_generate | default(false) | bool else omit }}"
register: etcd_health_status
failed_when: "(etcd_health_status.content | from_json).health != 'true'"
when: dcs_type == "etcd"
18 changes: 11 additions & 7 deletions automation/roles/confd/templates/confd.toml.j2
Original file line number Diff line number Diff line change
@@ -1,22 +1,26 @@
backend = "etcdv3"
interval = 10
watch = true
nodes = [
{% if not dcs_exists|bool and dcs_type == 'etcd' %}
{% if not dcs_exists|bool %}
{% for host in groups['etcd_cluster'] %}
"http://{{ hostvars[host]['inventory_hostname'] }}:2379",
"{{ patroni_etcd_protocol | default('http', true) }}://{{ hostvars[host]['inventory_hostname'] }}:2379",
{% endfor %}
{% endif %}
{% if dcs_exists|bool and dcs_type == 'etcd' %}
{% if dcs_exists|bool %}
{% for etcd_hosts in patroni_etcd_hosts %}
"{{ patroni_etcd_protocol | default('http', true) }}://{{etcd_hosts.host}}:{{etcd_hosts.port}}",
{% endfor %}
{% endif %}
]
{% if dcs_exists|bool and dcs_type == 'etcd' %}
{% if tls_cert_generate | default(false) | bool %}
scheme = "https"
client_cakeys = "{{ tls_ca_cert_path | default('/etc/tls/ca.crt') }}"
client_cert = "{{ tls_cert_path | default('/etc/tls/server.crt') }}"
client_key = "{{ tls_privatekey_path | default('/etc/tls/server.key') }}"
{% endif %}
{% if patroni_etcd_username | default('') | length > 0 %}
basic_auth = true
username = "{{ patroni_etcd_username | default('') }}"
password = "{{ patroni_etcd_password | default('') }}"
{% endif %}
{% endif %}
watch = true
interval = 10
18 changes: 17 additions & 1 deletion automation/roles/etcd/tasks/main.yml
Original file line number Diff line number Diff line change
Expand Up @@ -86,6 +86,17 @@
state: directory
tags: etcd, etcd_conf

- name: Fetch etcd TLS certificate, key and CA from the master node
ansible.builtin.include_role:
name: ../roles/tls_certificate/copy
vars:
copy_tls_cert_path: "{{ tls_etcd_cert_path | default('/etc/etcd/tls/server.crt') }}"
copy_tls_ca_cert_path: "{{ tls_etcd_ca_cert_path | default('/etc/etcd/tls/ca.crt') }}"
copy_tls_privatekey_path: "{{ tls_etcd_privatekey_path | default('/etc/etcd/tls/server.key') }}"
copy_tls_owner: "etcd"
when: tls_cert_generate|bool
tags: etcd, etcd_conf

- name: Create etcd data directory
ansible.builtin.file:
path: "{{ etcd_data_dir }}"
Expand Down Expand Up @@ -128,7 +139,12 @@
- name: Wait until the etcd cluster is healthy
ansible.builtin.command: >
/usr/local/bin/etcdctl endpoint health
--endpoints=http://{{ inventory_hostname }}:2379
--endpoints={{ patroni_etcd_protocol | default('http', true) }}://{{ inventory_hostname }}:2379
{% if tls_cert_generate | default(false) | bool %}
--cacert={{ tls_etcd_ca_cert_path | default('/etc/etcd/tls/ca.crt') }}
--cert={{ tls_etcd_cert_path | default('/etc/etcd/tls/server.crt') }}
--key={{ tls_etcd_privatekey_path | default('/etc/etcd/tls/server.key') }}
{% endif %}
environment:
ETCDCTL_API: "3"
register: etcd_health_result
Expand Down
21 changes: 16 additions & 5 deletions automation/roles/etcd/templates/etcd.conf.j2
Original file line number Diff line number Diff line change
@@ -1,13 +1,24 @@
ETCD_NAME="{{ ansible_hostname }}"
ETCD_LISTEN_CLIENT_URLS="http://{{ inventory_hostname }}:2379,http://127.0.0.1:2379"
ETCD_ADVERTISE_CLIENT_URLS="http://{{ inventory_hostname }}:2379"
ETCD_LISTEN_PEER_URLS="http://{{ inventory_hostname }}:2380"
ETCD_INITIAL_ADVERTISE_PEER_URLS="http://{{ inventory_hostname }}:2380"
ETCD_LISTEN_CLIENT_URLS="{{ patroni_etcd_protocol | default('http', true) }}://{{ inventory_hostname }}:2379,{{ patroni_etcd_protocol | default('http', true) }}://127.0.0.1:2379"
ETCD_ADVERTISE_CLIENT_URLS="{{ patroni_etcd_protocol | default('http', true) }}://{{ inventory_hostname }}:2379"
ETCD_LISTEN_PEER_URLS="{{ patroni_etcd_protocol | default('http', true) }}://{{ inventory_hostname }}:2380"
ETCD_INITIAL_ADVERTISE_PEER_URLS="{{ patroni_etcd_protocol | default('http', true) }}://{{ inventory_hostname }}:2380"
ETCD_INITIAL_CLUSTER_TOKEN="{{ etcd_cluster_name }}"
ETCD_INITIAL_CLUSTER="{% for host in groups['etcd_cluster'] %}{{ hostvars[host]['ansible_hostname'] }}=http://{{ hostvars[host]['inventory_hostname'] }}:2380{% if not loop.last %},{% endif %}{% endfor %}"
ETCD_INITIAL_CLUSTER="{% for host in groups['etcd_cluster'] %}{{ hostvars[host]['ansible_hostname'] }}={{ patroni_etcd_protocol | default('http', true) }}://{{ hostvars[host]['inventory_hostname'] }}:2380{% if not loop.last %},{% endif %}{% endfor %}"
ETCD_INITIAL_CLUSTER_STATE="new"
ETCD_DATA_DIR="{{ etcd_data_dir }}"
ETCD_ELECTION_TIMEOUT="5000"
ETCD_HEARTBEAT_INTERVAL="1000"
ETCD_INITIAL_ELECTION_TICK_ADVANCE="false"
ETCD_AUTO_COMPACTION_RETENTION="1"
{% if tls_cert_generate | default(false) | bool %}
ETCD_CERT_FILE="{{ tls_etcd_cert_path | default('/etc/etcd/tls/server.crt') }}"
ETCD_KEY_FILE="{{ tls_etcd_privatekey_path | default('/etc/etcd/tls/server.key') }}"
ETCD_TRUSTED_CA_FILE="{{ tls_etcd_ca_cert_path | default('/etc/etcd/tls/ca.crt') }}"
ETCD_PEER_CERT_FILE="{{ tls_etcd_cert_path | default('/etc/etcd/tls/server.crt') }}"
ETCD_PEER_KEY_FILE="{{ tls_etcd_privatekey_path | default('/etc/etcd/tls/server.key') }}"
ETCD_PEER_TRUSTED_CA_FILE="{{ tls_etcd_ca_cert_path | default('/etc/etcd/tls/ca.crt') }}"
ETCD_PEER_CLIENT_CERT_AUTH="true"
ETCD_CLIENT_CERT_AUTH="true"
ETCD_TLS_MIN_VERSION="TLS1.2"
{% endif %}
18 changes: 11 additions & 7 deletions automation/roles/patroni/templates/patroni.yml.j2
Original file line number Diff line number Diff line change
Expand Up @@ -35,23 +35,27 @@ restapi:
# password: password
{% endif %}

{% if not dcs_exists|bool and dcs_type == 'etcd' %}
{% if dcs_type == 'etcd' %}
etcd3:
{% if not dcs_exists|bool %}
hosts: {% for host in groups['etcd_cluster'] %}{{ hostvars[host]['inventory_hostname'] }}:2379{% if not loop.last %},{% endif %}{% endfor %}
{% endif %}
{% if dcs_exists|bool and dcs_type == 'etcd' %}
etcd3:
{% endif %}
{% if dcs_exists|bool %}
hosts: {% for etcd_hosts in patroni_etcd_hosts %}{{etcd_hosts.host}}:{{etcd_hosts.port}}{% if not loop.last %},{% endif %}{% endfor %}
{% endif %}

{% if tls_cert_generate | default(false) | bool %}
protocol: https
cacert: {{ tls_ca_cert_path | default('/etc/tls/ca.crt') }}
cert: {{ tls_cert_path | default('/etc/tls/server.crt') }}
key: {{ tls_privatekey_path | default('/etc/tls/server.key') }}
{% endif %}
{% if patroni_etcd_username | default('') | length > 0 %}
username: {{ patroni_etcd_username | default('') }}
{% endif %}
{% if patroni_etcd_password | default('') | length > 0 %}
password: {{ patroni_etcd_password }}
{% endif %}
{% if patroni_etcd_protocol | default('') | length > 0 %}
protocol: {{ patroni_etcd_protocol }}
{% endif %}
{% endif %}

{% if dcs_type == 'consul' %}
Expand Down
8 changes: 4 additions & 4 deletions automation/roles/patroni/templates/pg_hba.conf.j2
Original file line number Diff line number Diff line change
Expand Up @@ -85,14 +85,14 @@

# TYPE DATABASE USER ADDRESS METHOD
{% for client in postgresql_pg_hba %}
{{ client.type.ljust(10) |default('host') }}{{ client.database.ljust(25) |default('all') }}{{ client.user.ljust(25) |default('all') }}{{ client.address.ljust(25) |default('') }}{{ client.method |default('md5') }} {{ client.options |default(None) }}
{{ client.type.ljust(10) |default('{% if tls_cert_generate | default(false) | bool %}hostssl{% else %}host{% endif %}') }}{{ client.database.ljust(25) |default('all') }}{{ client.user.ljust(25) |default('all') }}{{ client.address.ljust(25) |default('') }}{{ client.method |default('md5') }} {{ client.options |default(None) }}
{% endfor %}
{% for patroni in groups['postgres_cluster'] %}
host all all {{ hostvars[patroni]['inventory_hostname'] }}/32 {{ postgresql_password_encryption_algorithm }}
{% if tls_cert_generate | default(false) | bool %}hostssl{% else %}host{% endif %} all all {{ hostvars[patroni]['inventory_hostname'] }}/32 {{ postgresql_password_encryption_algorithm }}
{% endfor %}
# Allow replication connections from localhost, by a user with the
# replication privilege.
host replication {{ patroni_replication_username }} localhost trust
{% if tls_cert_generate | default(false) | bool %}hostssl{% else %}host{% endif %} replication {{ patroni_replication_username }} localhost trust
{% for host in groups['postgres_cluster'] %}
host replication {{ patroni_replication_username }} {{ hostvars[host]['inventory_hostname'] }}/32 {{ postgresql_password_encryption_algorithm }}
{% if tls_cert_generate | default(false) | bool %}hostssl{% else %}host{% endif %} replication {{ patroni_replication_username }} {{ hostvars[host]['inventory_hostname'] }}/32 {{ postgresql_password_encryption_algorithm }}
{% endfor %}
52 changes: 22 additions & 30 deletions automation/roles/tls_certificate/copy/tasks/main.yml
Original file line number Diff line number Diff line change
@@ -1,42 +1,34 @@
---
# for add_pgnode.yml

- name: Ensure TLS directories exist
ansible.builtin.file:
path: "{{ item | dirname }}"
state: directory
owner: "{{ tls_owner | default('postgres') }}"
group: "{{ tls_owner | default('postgres') }}"
mode: "0750"
loop:
- "{{ tls_privatekey_path | default('/etc/tls/server.key') }}"
- "{{ tls_cert_path | default('/etc/tls/server.crt') }}"

- name: Fetch TLS certificate and key from master
- name: Fetch TLS certificate, key and CA from the master node into memory
run_once: true
ansible.builtin.fetch:
ansible.builtin.slurp:
src: "{{ item }}"
dest: "files/tls/"
validate_checksum: true
flat: true
delegate_to: "{{ groups.master[0] }}"
register: tls_files
loop:
- "{{ tls_privatekey_path | default('/etc/tls/server.key') }}"
- "{{ tls_cert_path | default('/etc/tls/server.crt') }}"
- "{{ tls_ca_cert_path | default('/etc/tls/ca.crt') }}"
tags: tls, tls_cert_copy

- name: Create directory {{ copy_tls_privatekey_path | default(tls_privatekey_path | default('/etc/tls/server.key')) | dirname }}
ansible.builtin.file:
path: "{{ copy_tls_privatekey_path | default(tls_privatekey_path | default('/etc/tls/server.key')) | dirname }}"
state: directory
owner: "{{ copy_tls_owner | default(tls_owner | default('postgres')) }}"
group: "{{ copy_tls_owner | default(tls_owner | default('postgres')) }}"
mode: "0755"
tags: tls, tls_cert_copy

- name: Copy TLS certificate and key to replica
- name: Copy PostgreSQL TLS certificate, key and CA to all nodes
ansible.builtin.copy:
src: "files/tls/{{ item.path | basename }}"
content: "{{ tls_files.results[item.index].content | b64decode }}"
dest: "{{ item.path }}"
owner: "{{ tls_owner | default('postgres') }}"
group: "{{ tls_owner | default('postgres') }}"
owner: "{{ copy_tls_owner | default(tls_owner | default('postgres')) }}"
group: "{{ copy_tls_owner | default(tls_owner | default('postgres')) }}"
mode: "{{ item.mode }}"
loop:
- { path: "{{ tls_privatekey_path | default('/etc/tls/server.key') }}", mode: "{{ tls_privatekey_mode | default('0400') }}" }
- { path: "{{ tls_cert_path | default('/etc/tls/server.crt') }}", mode: "{{ tls_cert_mode | default('0644') }}" }

- name: Delete TLS certificate and key from the ansible controller
ansible.builtin.file:
path: "files/tls/"
state: absent
delegate_to: localhost
- { index: 1, path: "{{ copy_tls_cert_path | default(tls_cert_path | default('/etc/tls/server.crt')) }}", mode: "0644" }
- { index: 2, path: "{{ copy_tls_ca_cert_path | default(tls_ca_cert_path | default('/etc/tls/ca.crt')) }}", mode: "0644" }
- { index: 0, path: "{{ copy_tls_privatekey_path | default(tls_privatekey_path | default('/etc/tls/server.key')) }}", mode: "0400" }
tags: tls, tls_cert_copy
Loading
Loading