Compare commits
4 Commits
05f085aee7
...
Appliance.
Author | SHA1 | Date | |
---|---|---|---|
8fba1c410e | |||
e2e009aa3c | |||
ef81cbfe6a | |||
43095c5a1e |
66
.drone.yml
66
.drone.yml
@ -10,11 +10,6 @@ volumes:
|
|||||||
claim:
|
claim:
|
||||||
name: flexvolsmb-drone-scratch
|
name: flexvolsmb-drone-scratch
|
||||||
|
|
||||||
trigger:
|
|
||||||
event:
|
|
||||||
exclude:
|
|
||||||
- tag
|
|
||||||
|
|
||||||
steps:
|
steps:
|
||||||
- name: Debugging information
|
- name: Debugging information
|
||||||
image: bv11-cr01.bessems.eu/library/packer-extended
|
image: bv11-cr01.bessems.eu/library/packer-extended
|
||||||
@ -26,6 +21,8 @@ steps:
|
|||||||
- yamllint --version
|
- yamllint --version
|
||||||
|
|
||||||
- name: Linting
|
- name: Linting
|
||||||
|
depends_on:
|
||||||
|
- Debugging information
|
||||||
image: bv11-cr01.bessems.eu/library/packer-extended
|
image: bv11-cr01.bessems.eu/library/packer-extended
|
||||||
pull: always
|
pull: always
|
||||||
commands:
|
commands:
|
||||||
@ -35,48 +32,9 @@ steps:
|
|||||||
packer/preseed/UbuntuServer22.04/user-data \
|
packer/preseed/UbuntuServer22.04/user-data \
|
||||||
scripts
|
scripts
|
||||||
|
|
||||||
- name: Semantic Release (Dry-run)
|
|
||||||
image: bv11-cr01.bessems.eu/proxy/library/node:20-slim
|
|
||||||
pull: always
|
|
||||||
commands:
|
|
||||||
- |
|
|
||||||
apt-get update
|
|
||||||
- |
|
|
||||||
apt-get install -y --no-install-recommends \
|
|
||||||
curl \
|
|
||||||
git-core \
|
|
||||||
jq \
|
|
||||||
ca-certificates
|
|
||||||
- |
|
|
||||||
curl -L https://api.github.com/repos/mikefarah/yq/releases/latest | \
|
|
||||||
jq -r '.assets[] | select(.name | endswith("yq_linux_amd64")) | .browser_download_url' | \
|
|
||||||
xargs -I {} curl -L -o /bin/yq {} && \
|
|
||||||
chmod +x /bin/yq
|
|
||||||
- |
|
|
||||||
npm install \
|
|
||||||
semantic-release \
|
|
||||||
@semantic-release/commit-analyzer \
|
|
||||||
@semantic-release/exec \
|
|
||||||
- |
|
|
||||||
export K8S_VERSION=$(yq '.components.clusterapi.workload.version.k8s' < ./ansible/vars/metacluster.yml)
|
|
||||||
export GIT_CREDENTIALS=$${GIT_USERNAME}:$${GIT_APIKEY}
|
|
||||||
- |
|
|
||||||
npx semantic-release \
|
|
||||||
--package @semantic-release/exec \
|
|
||||||
--package semantic-release \
|
|
||||||
--branches ${DRONE_BRANCH} \
|
|
||||||
--tag-format "K8s_$${K8S_VERSION}-v\$${version}" \
|
|
||||||
--dry-run \
|
|
||||||
--plugins @semantic-release/commit-analyzer,@semantic-release/exec \
|
|
||||||
--analyzeCommits @semantic-release/commit-analyzer \
|
|
||||||
--verifyRelease @semantic-release/exec \
|
|
||||||
--verifyReleaseCmd 'echo "$${nextRelease.version}" > .version'
|
|
||||||
environment:
|
|
||||||
GIT_APIKEY:
|
|
||||||
from_secret: git_apikey
|
|
||||||
GIT_USERNAME: djpbessems
|
|
||||||
|
|
||||||
- name: Install Ansible Galaxy collections
|
- name: Install Ansible Galaxy collections
|
||||||
|
depends_on:
|
||||||
|
- Linting
|
||||||
image: bv11-cr01.bessems.eu/library/packer-extended
|
image: bv11-cr01.bessems.eu/library/packer-extended
|
||||||
pull: always
|
pull: always
|
||||||
commands:
|
commands:
|
||||||
@ -84,8 +42,13 @@ steps:
|
|||||||
ansible-galaxy collection install \
|
ansible-galaxy collection install \
|
||||||
-r ansible/requirements.yml \
|
-r ansible/requirements.yml \
|
||||||
-p ./ansible/collections
|
-p ./ansible/collections
|
||||||
|
volumes:
|
||||||
|
- name: scratch
|
||||||
|
path: /scratch
|
||||||
|
|
||||||
- name: Kubernetes Bootstrap Appliance
|
- name: Kubernetes Bootstrap Appliance
|
||||||
|
depends_on:
|
||||||
|
- Install Ansible Galaxy collections
|
||||||
image: bv11-cr01.bessems.eu/library/packer-extended
|
image: bv11-cr01.bessems.eu/library/packer-extended
|
||||||
pull: always
|
pull: always
|
||||||
commands:
|
commands:
|
||||||
@ -94,7 +57,6 @@ steps:
|
|||||||
packer/preseed/UbuntuServer22.04/user-data
|
packer/preseed/UbuntuServer22.04/user-data
|
||||||
- |
|
- |
|
||||||
export K8S_VERSION=$(yq '.components.clusterapi.workload.version.k8s' < ./ansible/vars/metacluster.yml)
|
export K8S_VERSION=$(yq '.components.clusterapi.workload.version.k8s' < ./ansible/vars/metacluster.yml)
|
||||||
export APPLIANCE_VERSION=$(cat .version)
|
|
||||||
- |
|
- |
|
||||||
packer init -upgrade \
|
packer init -upgrade \
|
||||||
./packer
|
./packer
|
||||||
@ -109,7 +71,6 @@ steps:
|
|||||||
-var ssh_password=$${SSH_PASSWORD} \
|
-var ssh_password=$${SSH_PASSWORD} \
|
||||||
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
||||||
-var k8s_version=$K8S_VERSION \
|
-var k8s_version=$K8S_VERSION \
|
||||||
-var appliance_version=$APPLIANCE_VERSION \
|
|
||||||
./packer
|
./packer
|
||||||
- |
|
- |
|
||||||
packer build \
|
packer build \
|
||||||
@ -123,7 +84,6 @@ steps:
|
|||||||
-var ssh_password=$${SSH_PASSWORD} \
|
-var ssh_password=$${SSH_PASSWORD} \
|
||||||
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
||||||
-var k8s_version=$K8S_VERSION \
|
-var k8s_version=$K8S_VERSION \
|
||||||
-var appliance_version=$APPLIANCE_VERSION \
|
|
||||||
./packer
|
./packer
|
||||||
environment:
|
environment:
|
||||||
DOCKER_USERNAME:
|
DOCKER_USERNAME:
|
||||||
@ -146,6 +106,8 @@ steps:
|
|||||||
path: /scratch
|
path: /scratch
|
||||||
|
|
||||||
- name: Kubernetes Upgrade Appliance
|
- name: Kubernetes Upgrade Appliance
|
||||||
|
depends_on:
|
||||||
|
- Install Ansible Galaxy collections
|
||||||
image: bv11-cr01.bessems.eu/library/packer-extended
|
image: bv11-cr01.bessems.eu/library/packer-extended
|
||||||
pull: alwaysquery(
|
pull: alwaysquery(
|
||||||
commands:
|
commands:
|
||||||
@ -154,7 +116,6 @@ steps:
|
|||||||
packer/preseed/UbuntuServer22.04/user-data
|
packer/preseed/UbuntuServer22.04/user-data
|
||||||
- |
|
- |
|
||||||
export K8S_VERSION=$(yq '.components.clusterapi.workload.version.k8s' < ./ansible/vars/metacluster.yml)
|
export K8S_VERSION=$(yq '.components.clusterapi.workload.version.k8s' < ./ansible/vars/metacluster.yml)
|
||||||
export APPLIANCE_VERSION=$(cat .version)
|
|
||||||
- |
|
- |
|
||||||
packer init -upgrade \
|
packer init -upgrade \
|
||||||
./packer
|
./packer
|
||||||
@ -169,7 +130,6 @@ steps:
|
|||||||
-var ssh_password=$${SSH_PASSWORD} \
|
-var ssh_password=$${SSH_PASSWORD} \
|
||||||
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
||||||
-var k8s_version=$K8S_VERSION \
|
-var k8s_version=$K8S_VERSION \
|
||||||
-var appliance_version=$APPLIANCE_VERSION \
|
|
||||||
./packer
|
./packer
|
||||||
- |
|
- |
|
||||||
packer build \
|
packer build \
|
||||||
@ -183,7 +143,6 @@ steps:
|
|||||||
-var ssh_password=$${SSH_PASSWORD} \
|
-var ssh_password=$${SSH_PASSWORD} \
|
||||||
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
||||||
-var k8s_version=$K8S_VERSION \
|
-var k8s_version=$K8S_VERSION \
|
||||||
-var appliance_version=$APPLIANCE_VERSION \
|
|
||||||
./packer
|
./packer
|
||||||
environment:
|
environment:
|
||||||
DOCKER_USERNAME:
|
DOCKER_USERNAME:
|
||||||
@ -206,6 +165,9 @@ steps:
|
|||||||
path: /scratch
|
path: /scratch
|
||||||
|
|
||||||
- name: Remove temporary resources
|
- name: Remove temporary resources
|
||||||
|
depends_on:
|
||||||
|
- Kubernetes Bootstrap Appliance
|
||||||
|
- Kubernetes Upgrade Appliance
|
||||||
image: bv11-cr01.bessems.eu/library/packer-extended
|
image: bv11-cr01.bessems.eu/library/packer-extended
|
||||||
commands:
|
commands:
|
||||||
- |
|
- |
|
||||||
|
@ -16,16 +16,14 @@
|
|||||||
{ 'components': (
|
{ 'components': (
|
||||||
metacluster_chartvalues |
|
metacluster_chartvalues |
|
||||||
combine({ 'clusterapi': components.clusterapi }) |
|
combine({ 'clusterapi': components.clusterapi }) |
|
||||||
combine({ 'kubevip' : components.kubevip }) ),
|
combine({ 'kubevip' : components.kubevip }) )
|
||||||
'appliance': {
|
|
||||||
'version': (applianceversion)
|
|
||||||
}
|
|
||||||
} | to_nice_yaml(indent=2, width=4096)
|
} | to_nice_yaml(indent=2, width=4096)
|
||||||
}}
|
}}
|
||||||
|
|
||||||
- name: Aggregate chart_values into dict
|
- name: Aggregate chart_values into dict
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
workloadcluster_chartvalues: "{{ workloadcluster_chartvalues | default({}) | combine({ item.key: { 'chart_values': (item.value.chart_values | default('') | from_yaml) } }) }}"
|
workloadcluster_chartvalues: "{{ workloadcluster_chartvalues | default({}) | combine({ item.key: { 'chart_values': (item.value.chart_values | default('') | from_yaml) } }) }}"
|
||||||
|
# when: item.value.chart_values is defined
|
||||||
loop: "{{ query('ansible.builtin.dict', downstream.helm_charts) }}"
|
loop: "{{ query('ansible.builtin.dict', downstream.helm_charts) }}"
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.key }}"
|
label: "{{ item.key }}"
|
||||||
|
@ -0,0 +1,14 @@
|
|||||||
|
import netaddr
|
||||||
|
|
||||||
|
def netaddr_iter_iprange(ip_start, ip_end):
|
||||||
|
return [str(ip) for ip in netaddr.iter_iprange(ip_start, ip_end)]
|
||||||
|
|
||||||
|
class FilterModule(object):
|
||||||
|
''' Ansible filter. Interface to netaddr methods.
|
||||||
|
https://pypi.org/project/netaddr/
|
||||||
|
'''
|
||||||
|
|
||||||
|
def filters(self):
|
||||||
|
return {
|
||||||
|
'netaddr_iter_iprange': netaddr_iter_iprange
|
||||||
|
}
|
@ -1,9 +1,14 @@
|
|||||||
- block:
|
- block:
|
||||||
|
|
||||||
- name: Inject password into values file
|
- name: Initialize tempfile
|
||||||
|
ansible.builtin.tempfile:
|
||||||
|
state: file
|
||||||
|
register: values_file
|
||||||
|
|
||||||
|
- name: Write chart values w/ password to tempfile
|
||||||
ansible.builtin.copy:
|
ansible.builtin.copy:
|
||||||
dest: "{{ stepconfig.path }}"
|
dest: "{{ values_file.path }}"
|
||||||
content: "{{ lookup('ansible.builtin.file', stepconfig.path) | regex_replace('(ca_password|provisioner_password): ', '\\1: ' ~ (vapp['metacluster.password'] | b64encode)) }}"
|
content: "{{ stepca_values.stdout | regex_replace('(ca_password|provisioner_password): ', '\\1: ' ~ (vapp['metacluster.password'] | b64encode)) }}"
|
||||||
no_log: true
|
no_log: true
|
||||||
|
|
||||||
- name: Install step-ca chart
|
- name: Install step-ca chart
|
||||||
@ -16,7 +21,13 @@
|
|||||||
wait: true
|
wait: true
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
values_files:
|
values_files:
|
||||||
- "{{ stepconfig.path }}"
|
- "{{ values_file.path }}"
|
||||||
|
|
||||||
|
- name: Cleanup tempfile
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ values_file.path }}"
|
||||||
|
state: absent
|
||||||
|
when: values_file.path is defined
|
||||||
|
|
||||||
- name: Retrieve configmap w/ root certificate
|
- name: Retrieve configmap w/ root certificate
|
||||||
kubernetes.core.k8s_info:
|
kubernetes.core.k8s_info:
|
||||||
|
@ -55,6 +55,7 @@
|
|||||||
force_basic_auth: yes
|
force_basic_auth: yes
|
||||||
body:
|
body:
|
||||||
name: token_init_{{ lookup('password', '/dev/null length=5 chars=ascii_letters,digits') }}
|
name: token_init_{{ lookup('password', '/dev/null length=5 chars=ascii_letters,digits') }}
|
||||||
|
scopes: ["write:public_key","write:org"]
|
||||||
register: gitea_api_token
|
register: gitea_api_token
|
||||||
|
|
||||||
- name: Retrieve existing gitea configuration
|
- name: Retrieve existing gitea configuration
|
||||||
|
@ -12,15 +12,6 @@
|
|||||||
- registry
|
- registry
|
||||||
- storage
|
- storage
|
||||||
|
|
||||||
- name: Create step-ca config dictionary
|
|
||||||
ansible.builtin.set_fact:
|
|
||||||
stepconfig: "{{ { 'path': ansible_env.HOME ~ '/.step/config/values.yaml' } }}"
|
|
||||||
|
|
||||||
- name: Create step-ca target folder
|
|
||||||
ansible.builtin.file:
|
|
||||||
path: "{{ stepconfig.path | dirname }}"
|
|
||||||
state: directory
|
|
||||||
|
|
||||||
- name: Initialize tempfile
|
- name: Initialize tempfile
|
||||||
ansible.builtin.tempfile:
|
ansible.builtin.tempfile:
|
||||||
state: file
|
state: file
|
||||||
@ -45,8 +36,8 @@
|
|||||||
--address=:9000 \
|
--address=:9000 \
|
||||||
--provisioner=admin \
|
--provisioner=admin \
|
||||||
--acme \
|
--acme \
|
||||||
--password-file={{ stepca_password.path }} | tee {{ stepconfig.path }}
|
--password-file={{ stepca_password.path }}
|
||||||
creates: "{{ stepconfig.path }}"
|
register: stepca_values
|
||||||
|
|
||||||
- name: Cleanup tempfile
|
- name: Cleanup tempfile
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
@ -57,7 +48,7 @@
|
|||||||
- name: Store root CA certificate
|
- name: Store root CA certificate
|
||||||
ansible.builtin.copy:
|
ansible.builtin.copy:
|
||||||
dest: /usr/local/share/ca-certificates/root_ca.crt
|
dest: /usr/local/share/ca-certificates/root_ca.crt
|
||||||
content: "{{ (lookup('ansible.builtin.file', stepconfig.path) | from_yaml).inject.certificates.root_ca }}"
|
content: "{{ (stepca_values.stdout | from_yaml).inject.certificates.root_ca }}"
|
||||||
|
|
||||||
- name: Update certificate truststore
|
- name: Update certificate truststore
|
||||||
ansible.builtin.command:
|
ansible.builtin.command:
|
||||||
|
@ -1,38 +0,0 @@
|
|||||||
- block:
|
|
||||||
- name: Install json-server chart
|
|
||||||
kubernetes.core.helm:
|
|
||||||
name: json-server
|
|
||||||
chart_ref: /opt/metacluster/helm-charts/json-server
|
|
||||||
release_namespace: json-server
|
|
||||||
create_namespace: true
|
|
||||||
wait: false
|
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
|
||||||
values: |
|
|
||||||
{{
|
|
||||||
components['json-server'].chart_values |
|
|
||||||
combine( {
|
|
||||||
'jsonServer': {
|
|
||||||
'seedData': {
|
|
||||||
'configInline': ( components['json-server'].chart_values.jsonServer.seedData.configInline | to_json )
|
|
||||||
}
|
|
||||||
}
|
|
||||||
} )
|
|
||||||
}}
|
|
||||||
|
|
||||||
- name: Ensure json-server API availability
|
|
||||||
ansible.builtin.uri:
|
|
||||||
url: https://version.{{ vapp['metacluster.fqdn'] }}/healthz
|
|
||||||
method: GET
|
|
||||||
# This mock REST API -ironically- does not support json encoded body argument
|
|
||||||
body_format: raw
|
|
||||||
register: api_readycheck
|
|
||||||
until:
|
|
||||||
- api_readycheck.json.status is defined
|
|
||||||
- api_readycheck.json.status == 'running'
|
|
||||||
retries: "{{ playbook.retries }}"
|
|
||||||
delay: "{{ (storage_benchmark | int) * (playbook.delay.long | int) }}"
|
|
||||||
|
|
||||||
module_defaults:
|
|
||||||
ansible.builtin.uri:
|
|
||||||
validate_certs: no
|
|
||||||
status_code: [200, 201]
|
|
@ -42,30 +42,19 @@
|
|||||||
retries: "{{ playbook.retries }}"
|
retries: "{{ playbook.retries }}"
|
||||||
delay: "{{ (storage_benchmark | int) * (playbook.delay.medium | int) }}"
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.medium | int) }}"
|
||||||
|
|
||||||
- name: Install tab-completion
|
- name: Install kubectl tab-completion
|
||||||
ansible.builtin.shell:
|
ansible.builtin.shell:
|
||||||
cmd: |-
|
cmd: kubectl completion bash | tee /etc/bash_completion.d/kubectl
|
||||||
{{ item }} completion bash > /etc/bash_completion.d/{{ item }}
|
|
||||||
creates: /etc/bash_completion.d/{{ item }}
|
|
||||||
loop:
|
|
||||||
- kubectl
|
|
||||||
- helm
|
|
||||||
- step
|
|
||||||
|
|
||||||
- name: Create kubeconfig dictionary
|
- name: Initialize tempfile
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.tempfile:
|
||||||
kubeconfig: "{{ { 'path': ansible_env.HOME ~ '/.kube/config' } }}"
|
state: file
|
||||||
|
register: kubeconfig
|
||||||
- name: Create kubeconfig target folder
|
|
||||||
ansible.builtin.file:
|
|
||||||
path: "{{ kubeconfig.path | dirname }}"
|
|
||||||
state: directory
|
|
||||||
|
|
||||||
- name: Retrieve kubeconfig
|
- name: Retrieve kubeconfig
|
||||||
ansible.builtin.command:
|
ansible.builtin.command:
|
||||||
cmd: kubectl config view --raw
|
cmd: kubectl config view --raw
|
||||||
register: kubectl_config
|
register: kubectl_config
|
||||||
no_log: true
|
|
||||||
|
|
||||||
- name: Store kubeconfig in tempfile
|
- name: Store kubeconfig in tempfile
|
||||||
ansible.builtin.copy:
|
ansible.builtin.copy:
|
||||||
|
@ -2,7 +2,6 @@
|
|||||||
- import_tasks: k3s.yml
|
- import_tasks: k3s.yml
|
||||||
- import_tasks: assets.yml
|
- import_tasks: assets.yml
|
||||||
- import_tasks: kube-vip.yml
|
- import_tasks: kube-vip.yml
|
||||||
- import_tasks: json-server.yml
|
|
||||||
- import_tasks: storage.yml
|
- import_tasks: storage.yml
|
||||||
- import_tasks: ingress.yml
|
- import_tasks: ingress.yml
|
||||||
- import_tasks: certauthority.yml
|
- import_tasks: certauthority.yml
|
||||||
|
@ -42,6 +42,11 @@ patches:
|
|||||||
kubeadmConfigSpec:
|
kubeadmConfigSpec:
|
||||||
clusterConfiguration:
|
clusterConfiguration:
|
||||||
imageRepository: registry.{{ _template.network.fqdn }}/kubeadm
|
imageRepository: registry.{{ _template.network.fqdn }}/kubeadm
|
||||||
|
ntp:
|
||||||
|
enabled: true
|
||||||
|
servers:
|
||||||
|
- 0.nl.pool.ntp.org
|
||||||
|
- 1.nl.pool.ntp.org
|
||||||
- patch: |-
|
- patch: |-
|
||||||
apiVersion: bootstrap.cluster.x-k8s.io/v1beta1
|
apiVersion: bootstrap.cluster.x-k8s.io/v1beta1
|
||||||
kind: KubeadmConfigTemplate
|
kind: KubeadmConfigTemplate
|
||||||
@ -53,6 +58,11 @@ patches:
|
|||||||
spec:
|
spec:
|
||||||
clusterConfiguration:
|
clusterConfiguration:
|
||||||
imageRepository: registry.{{ _template.network.fqdn }}/kubeadm
|
imageRepository: registry.{{ _template.network.fqdn }}/kubeadm
|
||||||
|
ntp:
|
||||||
|
enabled: true
|
||||||
|
servers:
|
||||||
|
- 0.nl.pool.ntp.org
|
||||||
|
- 1.nl.pool.ntp.org
|
||||||
- patch: |-
|
- patch: |-
|
||||||
apiVersion: bootstrap.cluster.x-k8s.io/v1beta1
|
apiVersion: bootstrap.cluster.x-k8s.io/v1beta1
|
||||||
kind: KubeadmConfigTemplate
|
kind: KubeadmConfigTemplate
|
||||||
|
@ -1,6 +1,12 @@
|
|||||||
- import_tasks: service.yml
|
- import_tasks: service.yml
|
||||||
- import_tasks: cron.yml
|
- import_tasks: cron.yml
|
||||||
|
|
||||||
|
- name: Cleanup tempfile
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ kubeconfig.path }}"
|
||||||
|
state: absent
|
||||||
|
when: kubeconfig.path is defined
|
||||||
|
|
||||||
# - name: Reboot host
|
# - name: Reboot host
|
||||||
# ansible.builtin.shell:
|
# ansible.builtin.shell:
|
||||||
# cmd: systemctl reboot
|
# cmd: systemctl reboot
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
platform:
|
platform:
|
||||||
|
|
||||||
k3s:
|
k3s:
|
||||||
version: v1.27.1+k3s1
|
version: v1.26.5+k3s1
|
||||||
|
|
||||||
packaged_components:
|
packaged_components:
|
||||||
- name: traefik
|
- name: traefik
|
||||||
@ -35,6 +35,10 @@ platform:
|
|||||||
url: https://argoproj.github.io/argo-helm
|
url: https://argoproj.github.io/argo-helm
|
||||||
- name: authentik
|
- name: authentik
|
||||||
url: https://charts.goauthentik.io
|
url: https://charts.goauthentik.io
|
||||||
|
# - name: codecentric
|
||||||
|
# url: https://codecentric.github.io/helm-charts
|
||||||
|
# - name: dex
|
||||||
|
# url: https://charts.dexidp.io
|
||||||
- name: gitea-charts
|
- name: gitea-charts
|
||||||
url: https://dl.gitea.io/charts/
|
url: https://dl.gitea.io/charts/
|
||||||
- name: harbor
|
- name: harbor
|
||||||
@ -47,14 +51,12 @@ platform:
|
|||||||
url: https://prometheus-community.github.io/helm-charts
|
url: https://prometheus-community.github.io/helm-charts
|
||||||
- name: smallstep
|
- name: smallstep
|
||||||
url: https://smallstep.github.io/helm-charts/
|
url: https://smallstep.github.io/helm-charts/
|
||||||
- name: spamasaurus
|
|
||||||
url: https://code.spamasaurus.com/api/packages/djpbessems/helm
|
|
||||||
|
|
||||||
components:
|
components:
|
||||||
|
|
||||||
argo-cd:
|
argo-cd:
|
||||||
helm:
|
helm:
|
||||||
version: 5.27.4 # (= ArgoCD v2.6.7)
|
version: 5.34.6 # (= ArgoCD v2.7.3)
|
||||||
chart: argo/argo-cd
|
chart: argo/argo-cd
|
||||||
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
||||||
chart_values: !unsafe |
|
chart_values: !unsafe |
|
||||||
@ -97,7 +99,7 @@ components:
|
|||||||
|
|
||||||
cert-manager:
|
cert-manager:
|
||||||
helm:
|
helm:
|
||||||
version: 1.11.0
|
version: 1.12.1
|
||||||
chart: jetstack/cert-manager
|
chart: jetstack/cert-manager
|
||||||
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
||||||
# chart_values: !unsafe |
|
# chart_values: !unsafe |
|
||||||
@ -107,23 +109,71 @@ components:
|
|||||||
management:
|
management:
|
||||||
version:
|
version:
|
||||||
# Must match the version referenced at `dependencies.static_binaries[.filename==clusterctl].url`
|
# Must match the version referenced at `dependencies.static_binaries[.filename==clusterctl].url`
|
||||||
base: v1.4.0
|
base: v1.4.1
|
||||||
# Must match the version referenced at `components.cert-manager.helm.version`
|
# Must match the version referenced at `components.cert-manager.helm.version`
|
||||||
cert_manager: v1.11.0
|
cert_manager: v1.11.1
|
||||||
infrastructure_vsphere: v1.6.0
|
infrastructure_vsphere: v1.6.1
|
||||||
ipam_incluster: v0.1.0-alpha.2
|
ipam_incluster: v0.1.0-alpha.2
|
||||||
# Refer to `https://console.cloud.google.com/gcr/images/cloud-provider-vsphere/GLOBAL/cpi/release/manager` for available tags
|
# Refer to `https://console.cloud.google.com/gcr/images/cloud-provider-vsphere/GLOBAL/cpi/release/manager` for available tags
|
||||||
cpi_vsphere: v1.26.2
|
cpi_vsphere: v1.26.2
|
||||||
workload:
|
workload:
|
||||||
version:
|
version:
|
||||||
calico: v3.25.0
|
calico: v3.26.0
|
||||||
k8s: v1.27.1
|
k8s: v1.26.5
|
||||||
node_template:
|
node_template:
|
||||||
url: https://{{ repo_username }}:{{ repo_password }}@sn.itch.fyi/Repository/rel/ubuntu-2204-kube-v1.27.1.ova
|
url: https://{{ repo_username }}:{{ repo_password }}@sn.itch.fyi/Repository/rel/ubuntu-2204-kube-v1.26.5.ova
|
||||||
|
|
||||||
|
# dex:
|
||||||
|
# helm:
|
||||||
|
# version: 0.13.0 # (= Dex 2.35.3)
|
||||||
|
# chart: dex/dex
|
||||||
|
# parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
||||||
|
# chart_values: !unsafe |
|
||||||
|
# config:
|
||||||
|
# connectors:
|
||||||
|
# - type: ldap
|
||||||
|
# id: ldap
|
||||||
|
# name: "LDAP"
|
||||||
|
# config:
|
||||||
|
# host: "{{ vapp['ldap.fqdn'] }}:636"
|
||||||
|
# insecureNoSSL: false
|
||||||
|
# insecureSkipVerify: true
|
||||||
|
# bindDN: "{{ vapp['ldap.dn'] }}"
|
||||||
|
# bindPW: "{{ vapp['ldap.password'] }}"
|
||||||
|
|
||||||
|
# usernamePrompt: "Username"
|
||||||
|
# userSearch:
|
||||||
|
# baseDN: OU=Administrators,OU=Useraccounts,DC=bessems,DC=eu
|
||||||
|
# filter: "(objectClass=person)"
|
||||||
|
# username: userPrincipalName
|
||||||
|
# idAttr: DN
|
||||||
|
# emailAttr: userPrincipalName
|
||||||
|
# nameAttr: cn
|
||||||
|
|
||||||
|
# groupSearch:
|
||||||
|
# baseDN: OU=Roles,OU=Groups,DC=bessems,DC=eu
|
||||||
|
# filter: "(objectClass=group)"
|
||||||
|
# userMatchers:
|
||||||
|
# - userAttr: DN
|
||||||
|
# groupAttr: member
|
||||||
|
# nameAttr: cn
|
||||||
|
# enablePasswordDB: true
|
||||||
|
# issuer: https://oidc.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
# storage:
|
||||||
|
# type: kubernetes
|
||||||
|
# config:
|
||||||
|
# inCluster: true
|
||||||
|
# ingress:
|
||||||
|
# enabled: true
|
||||||
|
# hosts:
|
||||||
|
# - host: oidc.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
# paths:
|
||||||
|
# - path: /
|
||||||
|
# pathType: Prefix
|
||||||
|
|
||||||
gitea:
|
gitea:
|
||||||
helm:
|
helm:
|
||||||
version: v7.0.2 # (= Gitea v1.18.3)
|
version: v8.3.0 # (= Gitea v1.19.3)
|
||||||
chart: gitea-charts/gitea
|
chart: gitea-charts/gitea
|
||||||
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | sed '/:/!s/$/:latest/'
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | sed '/:/!s/$/:latest/'
|
||||||
chart_values: !unsafe |
|
chart_values: !unsafe |
|
||||||
@ -154,7 +204,7 @@ components:
|
|||||||
|
|
||||||
harbor:
|
harbor:
|
||||||
helm:
|
helm:
|
||||||
version: 1.11.0 # (= Harbor v2.7.0)
|
version: 1.12.1 # (= Harbor v2.8.1)
|
||||||
chart: harbor/harbor
|
chart: harbor/harbor
|
||||||
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
||||||
chart_values: !unsafe |
|
chart_values: !unsafe |
|
||||||
@ -175,39 +225,41 @@ components:
|
|||||||
registry:
|
registry:
|
||||||
size: 25Gi
|
size: 25Gi
|
||||||
|
|
||||||
json-server:
|
# keycloakx:
|
||||||
helm:
|
# helm:
|
||||||
version: v0.8.1
|
# version: 2.1.1 # (= Keycloak 20.0.3)
|
||||||
chart: spamasaurus/json-server
|
# chart: codecentric/keycloakx
|
||||||
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
# parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
||||||
chart_values: !unsafe |
|
# chart_values: !unsafe |
|
||||||
ingress:
|
# command:
|
||||||
enabled: true
|
# - "/opt/keycloak/bin/kc.sh"
|
||||||
hosts:
|
# - "start"
|
||||||
- host: version.{{ vapp['metacluster.fqdn'] }}
|
# - "--http-enabled=true"
|
||||||
paths:
|
# - "--http-port=8080"
|
||||||
- path: /
|
# - "--hostname-strict=false"
|
||||||
pathType: Prefix
|
# - "--hostname-strict-https=false"
|
||||||
jsonServer:
|
# extraEnv: |
|
||||||
seedData:
|
# - name: KEYCLOAK_ADMIN
|
||||||
configInline: |
|
# value: admin
|
||||||
{
|
# - name: KEYCLOAK_ADMIN_PASSWORD
|
||||||
"appliance": { "version": "{{ appliance.version }}" },
|
# value: {{ vapp['metacluster.password'] }}
|
||||||
"components": [
|
# - name: KC_PROXY
|
||||||
{ "id": 0,
|
# value: "passthrough"
|
||||||
"name": "cluster-api",
|
# - name: JAVA_OPTS_APPEND
|
||||||
"management": { "foo": "bar" },
|
# value: >-
|
||||||
"workload": { "foo": "bar" }
|
# -Djgroups.dns.query={% raw %}{{ include "keycloak.fullname" . }}{% endraw %}-headless
|
||||||
}
|
# ingress:
|
||||||
],
|
# enabled: true
|
||||||
"healthz": { "status": "running" }
|
# rules:
|
||||||
}
|
# - host: keycloak.{{ vapp['metacluster.fqdn'] }}
|
||||||
sidecar:
|
# paths:
|
||||||
targetUrl: version.{{ vapp['metacluster.fqdn'] }}
|
# - path: /
|
||||||
|
# pathType: Prefix
|
||||||
|
# tls: []
|
||||||
|
|
||||||
kube-prometheus-stack:
|
kube-prometheus-stack:
|
||||||
helm:
|
helm:
|
||||||
version: 45.2.0
|
version: 46.5.0 # (= Prometheus version v0.65.1)
|
||||||
chart: prometheus-community/kube-prometheus-stack
|
chart: prometheus-community/kube-prometheus-stack
|
||||||
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
||||||
chart_values: !unsafe |
|
chart_values: !unsafe |
|
||||||
@ -218,11 +270,11 @@ components:
|
|||||||
|
|
||||||
kubevip:
|
kubevip:
|
||||||
# Must match the version referenced at `dependencies.container_images`
|
# Must match the version referenced at `dependencies.container_images`
|
||||||
version: v0.5.8
|
version: v0.6.0
|
||||||
|
|
||||||
longhorn:
|
longhorn:
|
||||||
helm:
|
helm:
|
||||||
version: 1.4.1
|
version: 1.4.2
|
||||||
chart: longhorn/longhorn
|
chart: longhorn/longhorn
|
||||||
parse_logic: cat values.yaml | yq eval '.. | select(has("repository")) | .repository + ":" + .tag'
|
parse_logic: cat values.yaml | yq eval '.. | select(has("repository")) | .repository + ":" + .tag'
|
||||||
chart_values: !unsafe |
|
chart_values: !unsafe |
|
||||||
@ -238,7 +290,7 @@ components:
|
|||||||
|
|
||||||
step-certificates:
|
step-certificates:
|
||||||
helm:
|
helm:
|
||||||
version: 1.23.0
|
version: 1.23.2+5 # (= step-ca v0.23.2)
|
||||||
chart: smallstep/step-certificates
|
chart: smallstep/step-certificates
|
||||||
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sed '/:/!s/$/:latest/' | sort -u
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sed '/:/!s/$/:latest/' | sort -u
|
||||||
chart_values: !unsafe |
|
chart_values: !unsafe |
|
||||||
@ -268,7 +320,7 @@ dependencies:
|
|||||||
container_images:
|
container_images:
|
||||||
# This should match the image tag referenced at `platform.packaged_components[.name==traefik].config`
|
# This should match the image tag referenced at `platform.packaged_components[.name==traefik].config`
|
||||||
- busybox:1
|
- busybox:1
|
||||||
- ghcr.io/kube-vip/kube-vip:v0.5.8
|
- ghcr.io/kube-vip/kube-vip:v0.6.0
|
||||||
# The following list is generated by running the following commands:
|
# The following list is generated by running the following commands:
|
||||||
# $ clusterctl init -i vsphere:<version> [...]
|
# $ clusterctl init -i vsphere:<version> [...]
|
||||||
# $ clusterctl generate cluster <name> [...] | yq eval '.data.data' | yq --no-doc eval '.. | .image? | select(.)' | sort -u
|
# $ clusterctl generate cluster <name> [...] | yq eval '.data.data' | yq --no-doc eval '.. | .image? | select(.)' | sort -u
|
||||||
@ -282,25 +334,25 @@ dependencies:
|
|||||||
|
|
||||||
static_binaries:
|
static_binaries:
|
||||||
- filename: clusterctl
|
- filename: clusterctl
|
||||||
url: https://github.com/kubernetes-sigs/cluster-api/releases/download/v1.4.0/clusterctl-linux-amd64
|
url: https://github.com/kubernetes-sigs/cluster-api/releases/download/v1.4.1/clusterctl-linux-amd64
|
||||||
- filename: govc
|
- filename: govc
|
||||||
url: https://github.com/vmware/govmomi/releases/download/v0.29.0/govc_Linux_x86_64.tar.gz
|
url: https://github.com/vmware/govmomi/releases/download/v0.30.4/govc_Linux_x86_64.tar.gz
|
||||||
archive: compressed
|
archive: compressed
|
||||||
- filename: helm
|
- filename: helm
|
||||||
url: https://get.helm.sh/helm-v3.10.2-linux-amd64.tar.gz
|
url: https://get.helm.sh/helm-v3.12.0-linux-amd64.tar.gz
|
||||||
archive: compressed
|
archive: compressed
|
||||||
extra_opts: --strip-components=1
|
extra_opts: --strip-components=1
|
||||||
- filename: kubectl-slice
|
- filename: kubectl-slice
|
||||||
url: https://github.com/patrickdappollonio/kubectl-slice/releases/download/v1.2.5/kubectl-slice_linux_x86_64.tar.gz
|
url: https://github.com/patrickdappollonio/kubectl-slice/releases/download/v1.2.6/kubectl-slice_linux_x86_64.tar.gz
|
||||||
archive: compressed
|
archive: compressed
|
||||||
- filename: skopeo
|
- filename: skopeo
|
||||||
url: https://code.spamasaurus.com/api/packages/djpbessems/generic/skopeo/v1.12.0/skopeo_linux_amd64
|
url: https://code.spamasaurus.com/api/packages/djpbessems/generic/skopeo/v1.12.0/skopeo_linux_amd64
|
||||||
- filename: step
|
- filename: step
|
||||||
url: https://dl.step.sm/gh-release/cli/gh-release-header/v0.23.0/step_linux_0.23.0_amd64.tar.gz
|
url: https://dl.step.sm/gh-release/cli/gh-release-header/v0.23.2/step_linux_0.23.2_amd64.tar.gz
|
||||||
archive: compressed
|
archive: compressed
|
||||||
extra_opts: --strip-components=2
|
extra_opts: --strip-components=2
|
||||||
- filename: yq
|
- filename: yq
|
||||||
url: http://github.com/mikefarah/yq/releases/download/v4.30.5/yq_linux_amd64
|
url: http://github.com/mikefarah/yq/releases/download/v4.34.1/yq_linux_amd64
|
||||||
|
|
||||||
packages:
|
packages:
|
||||||
apt:
|
apt:
|
||||||
|
@ -9,7 +9,7 @@ downstream:
|
|||||||
helm_charts:
|
helm_charts:
|
||||||
|
|
||||||
longhorn:
|
longhorn:
|
||||||
version: 1.4.1
|
version: 1.4.2
|
||||||
chart: longhorn/longhorn
|
chart: longhorn/longhorn
|
||||||
namespace: longhorn-system
|
namespace: longhorn-system
|
||||||
parse_logic: cat values.yaml | yq eval '.. | select(has("repository")) | .repository + ":" + .tag'
|
parse_logic: cat values.yaml | yq eval '.. | select(has("repository")) | .repository + ":" + .tag'
|
||||||
@ -19,7 +19,7 @@ downstream:
|
|||||||
defaultDataPath: /mnt/blockstorage
|
defaultDataPath: /mnt/blockstorage
|
||||||
|
|
||||||
sealed-secrets:
|
sealed-secrets:
|
||||||
version: 2.8.1 # (= Sealed Secrets v0.20.2)
|
version: 2.9.0 # (= Sealed Secrets v0.21.0)
|
||||||
chart: sealed-secrets/sealed-secrets
|
chart: sealed-secrets/sealed-secrets
|
||||||
namespace: sealed-secrets
|
namespace: sealed-secrets
|
||||||
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
||||||
|
@ -28,7 +28,6 @@ build {
|
|||||||
|
|
||||||
extra_arguments = [
|
extra_arguments = [
|
||||||
"--extra-vars", "appliancetype=${source.name}",
|
"--extra-vars", "appliancetype=${source.name}",
|
||||||
"--extra-vars", "applianceversion=${var.appliance_version}",
|
|
||||||
"--extra-vars", "ansible_ssh_pass=${var.ssh_password}",
|
"--extra-vars", "ansible_ssh_pass=${var.ssh_password}",
|
||||||
"--extra-vars", "docker_username=${var.docker_username}",
|
"--extra-vars", "docker_username=${var.docker_username}",
|
||||||
"--extra-vars", "docker_password=${var.docker_password}",
|
"--extra-vars", "docker_password=${var.docker_password}",
|
||||||
@ -46,7 +45,7 @@ build {
|
|||||||
" -ManifestFileName '/scratch/bld_${var.vm_name}_${source.name}.mf'",
|
" -ManifestFileName '/scratch/bld_${var.vm_name}_${source.name}.mf'",
|
||||||
"ovftool --acceptAllEulas --allowExtraConfig --overwrite \\",
|
"ovftool --acceptAllEulas --allowExtraConfig --overwrite \\",
|
||||||
" '/scratch/bld_${var.vm_name}_${source.name}.ovf' \\",
|
" '/scratch/bld_${var.vm_name}_${source.name}.ovf' \\",
|
||||||
" /output/airgapped-k8s-${var.appliance_version}+${var.k8s_version}-${source.name}.ova"
|
" /output/airgapped-k8s-${var.k8s_version}.${source.name}.ova"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -34,5 +34,4 @@ variable "docker_password" {
|
|||||||
sensitive = true
|
sensitive = true
|
||||||
}
|
}
|
||||||
|
|
||||||
variable "appliance_version" {}
|
|
||||||
variable "k8s_version" {}
|
variable "k8s_version" {}
|
||||||
|
Reference in New Issue
Block a user