'rgws' => (0..NRGWS - 1).map { |j| "rgw#{j}" }
}
+ # In a production deployment, these should be secret
+ ansible.extra_vars = {
+ fsid: '4a158d27-f750-41d5-9e7f-26ce4c9d2d45',
+ monitor_secret: 'AQAWqilTCDh7CBAAawXt6kyTgLFCxSvJhTEmuw=='
+ }
ansible.limit = 'all'
end
register: socket
- name: Generate cluster UUID
- shell: uuidgen | tee fetch/ceph_cluster_uuid.conf creates=fetch/ceph_cluster_uuid.conf
- connection: local
- sudo: false
+ shell: "uuidgen | tee /etc/ceph/ceph_cluster_uuid.conf" creates=/etc/ceph/ceph_cluster_uuid.conf
register: cluster_uuid
- name: Read cluster UUID if it already exists
- command: cat fetch/ceph_cluster_uuid.conf removes=fetch/ceph_cluster_uuid.conf
- connection: local
- sudo: false
+ command: cat /etc/ceph/ceph_cluster_uuid.conf removes=/etc/ceph/ceph_cluster_uuid.conf
register: cluster_uuid
- name: Generate Ceph configuration file
---
-- name: Create monitor secret
- shell: ceph-authtool --gen-print-key | tee /etc/ceph/ceph_monitor_secret.conf creates=/etc/ceph/ceph_monitor_secret.conf
- register: monitor_secret
-
-- name: Read monitor secret if it already exists
- command: cat /etc/ceph/ceph_monitor_secret.conf removes=/etc/ceph/ceph_monitor_secret.conf
- register: monitor_secret
-
- name: Create monitor initial keyring
- command: "ceph-authtool /var/lib/ceph/tmp/keyring.mon.{{ ansible_hostname }} --create-keyring --name=mon. --add-key={{ monitor_secret.stdout }} --cap mon 'allow *' creates=/var/lib/ceph/tmp/keyring.mon.{{ ansible_hostname }}"
+ command: "ceph-authtool /var/lib/ceph/tmp/keyring.mon.{{ ansible_hostname }} --create-keyring --name=mon. --add-key={{ monitor_secret }} --cap mon 'allow *' creates=/var/lib/ceph/tmp/keyring.mon.{{ ansible_hostname }}"
- name: Set initial monitor key permissions
file: >
- path={{ item }}
- mode=0400
+ path=/var/lib/ceph/tmp/keyring.mon.{{ ansible_hostname }}
+ mode=0600
owner=root
group=root
- with_items:
- - /etc/ceph/ceph_monitor_secret.conf
- - /var/lib/ceph/tmp/keyring.mon.{{ ansible_hostname }}
- name: Create monitor directory
file: >