'rgws' => (0..NRGWS - 1).map { |j| "rgw#{j}" }
}
- # In a production deployment, these should be secret
- ansible.extra_vars = {
- fsid: '4a158d27-f750-41d5-9e7f-26ce4c9d2d45',
- monitor_secret: 'AQAWqilTCDh7CBAAawXt6kyTgLFCxSvJhTEmuw=='
- }
ansible.limit = 'all'
end
register: socket
- name: Generate cluster UUID
- shell: "uuidgen | tee /etc/ceph/ceph_cluster_uuid.conf" creates=/etc/ceph/ceph_cluster_uuid.conf
+ shell: uuidgen | tee fetch/ceph_cluster_uuid.conf creates=fetch/ceph_cluster_uuid.conf
+ connection: local
+ sudo: false
register: cluster_uuid
- name: Read cluster UUID if it already exists
- command: cat /etc/ceph/ceph_cluster_uuid.conf removes=/etc/ceph/ceph_cluster_uuid.conf
+ command: cat fetch/ceph_cluster_uuid.conf removes=fetch/ceph_cluster_uuid.conf
+ connection: local
+ sudo: false
register: cluster_uuid
- name: Generate Ceph configuration file
---
+- name: Create monitor secret
+ shell: ceph-authtool --gen-print-key | tee /etc/ceph/ceph_monitor_secret.conf creates=/etc/ceph/ceph_monitor_secret.conf
+ register: monitor_secret
+
+- name: Read monitor secret if it already exists
+ command: cat /etc/ceph/ceph_monitor_secret.conf removes=/etc/ceph/ceph_monitor_secret.conf
+ register: monitor_secret
+
- name: Create monitor initial keyring
- command: "ceph-authtool /var/lib/ceph/tmp/keyring.mon.{{ ansible_hostname }} --create-keyring --name=mon. --add-key={{ monitor_secret }} --cap mon 'allow *' creates=/var/lib/ceph/tmp/keyring.mon.{{ ansible_hostname }}"
+ command: "ceph-authtool /var/lib/ceph/tmp/keyring.mon.{{ ansible_hostname }} --create-keyring --name=mon. --add-key={{ monitor_secret.stdout }} --cap mon 'allow *' creates=/var/lib/ceph/tmp/keyring.mon.{{ ansible_hostname }}"
- name: Set initial monitor key permissions
file: >
- path=/var/lib/ceph/tmp/keyring.mon.{{ ansible_hostname }}
- mode=0600
+ path={{ item }}
+ mode=0400
owner=root
group=root
+ with_items:
+ - /etc/ceph/ceph_monitor_secret.conf
+ - /var/lib/ceph/tmp/keyring.mon.{{ ansible_hostname }}
- name: Create monitor directory
file: >