Compare commits
275 Commits
UbuntuServ
...
b9575d2de4
| Author | SHA1 | Date | |
|---|---|---|---|
| b9575d2de4 | |||
| e249498109 | |||
| 01a1c0bf0a | |||
| c27712bc20 | |||
| 2d99511360 | |||
| 46a927b777 | |||
| c9a8598a35 | |||
| 0d7b1ab269 | |||
| 4786507366 | |||
| ed4c1145b6 | |||
| 3aa44e0f83 | |||
| 3a48676ca7 | |||
| 44daf9191a | |||
| 83ee632ff9 | |||
| be562f0124 | |||
| f711908ddb | |||
| 6f7b8e99f2 | |||
| 6261bfdda7 | |||
| 5751e7200c | |||
| 6ce1a66d3e | |||
| 85fb68b2e0 | |||
| b47dda7a50 | |||
| 838c7b6361 | |||
| 2ca91b5dea | |||
| 42d79a95ca | |||
| 1f4bbca7ec | |||
| fe8700f300 | |||
| ac4b011e83 | |||
| 7ca9d20b65 | |||
| 0f79832d96 | |||
| 8926b72344 | |||
| 5985615868 | |||
| 4655fe7465 | |||
| 15622d8a21 | |||
| 5c75452315 | |||
| f27dea92e3 | |||
| 67ec47b2b3 | |||
| c6170436f4 | |||
| 5b4eb2e443 | |||
| 68a1534d9c | |||
| e656780f56 | |||
| 464ed497fe | |||
| eb46c384a8 | |||
| 78526527bb | |||
| 22c06e2388 | |||
| 09c4a17050 | |||
| 35ced380a4 | |||
| 9199809da5 | |||
| 806bf24fc0 | |||
| 4733d8e5f8 | |||
| 65346db100 | |||
| 8eb85e4b11 | |||
| 716818c23c | |||
| f4d32d7828 | |||
| c44b40568d | |||
| 67676ff03b | |||
| 204faa7415 | |||
| 35a5656c59 | |||
| 3fe83457ea | |||
| 3c11ce5dde | |||
| 7a1b563851 | |||
| 0bddae0440 | |||
| 8181ae4017 | |||
| ac3f162dd4 | |||
| aa5c45e6e6 | |||
| a67ef0e1bd | |||
| 1794b24998 | |||
| 7c7333690d | |||
| 7b17b8ad63 | |||
| 1141225907 | |||
| 6c4fe7a0e6 | |||
| 8d13b527be | |||
| d8299ee90c | |||
| b34ac733f4 | |||
| 9f2e6ee160 | |||
| 042b9eb36f | |||
| 2097dec958 | |||
| 0c1fca9643 | |||
| b0dad1caf7 | |||
| 2cd2c4c6d0 | |||
| bd0b74ba19 | |||
| 521b323de2 | |||
| 35b3d5d3b9 | |||
| 675dce4160 | |||
| bd7c1f92e8 | |||
| 7d837a1711 | |||
| e1b57cfdea | |||
| 84d644db67 | |||
| 5cffb61544 | |||
| 1083937d5d | |||
| e52c63f80c | |||
| c7579ea4a6 | |||
| fba2e3e4b1 | |||
| 1c43bb19d2 | |||
| 9a3898e0b8 | |||
| a3da5b8f93 | |||
| 5f02ddab49 | |||
| 585e39cb97 | |||
| 1cd7e1510f | |||
| 0534b031fa | |||
| c8509aa3d5 | |||
| 158af986c3 | |||
| 5e537966f6 | |||
| 3849b79493 | |||
| 5f1d1bfa8a | |||
| fe306bd845 | |||
| ccbd4ed984 | |||
| fdc5c44e6a | |||
| c57291af6d | |||
| d652cf0346 | |||
| a1b8837cc5 | |||
| 5b7b93dd30 | |||
| d89ccd57da | |||
| 53da641926 | |||
| a3e9bc659a | |||
| fc51bf3f94 | |||
| 3d96f8c13b | |||
| 488fe10e1e | |||
| 01e168a7f9 | |||
| c48f27c42e | |||
| 185b332764 | |||
| e89505bef6 | |||
| b763d2b562 | |||
| d607f615e9 | |||
| ed7a474dbb | |||
| 14c6720196 | |||
| 277c91eeba | |||
| c9f3c648b7 | |||
| 8e680c45be | |||
| 7440d5824c | |||
| 8e75925b52 | |||
| d6234321d9 | |||
| ea20b1290c | |||
| d986d5ab25 | |||
| c29728594c | |||
| 10d5d6f389 | |||
| 96dccef450 | |||
| 05e0c50217 | |||
| 261e91ee2e | |||
| 1746af9b9d | |||
| 7c2ff54019 | |||
| 193ce9a534 | |||
| 9e91bef7b7 | |||
| 05b30287bd | |||
| 54caff8fb6 | |||
| 2f976898eb | |||
| 44befeda4b | |||
| 81847d3b93 | |||
| 39cc83ac57 | |||
| 0263b2dfc4 | |||
| e7e3b69d95 | |||
| b6ac086a31 | |||
| 20ce62fb6d | |||
| 0918eb36fe | |||
| 93e7d4dc9b | |||
| 9a0a33816c | |||
| eeb1364f1b | |||
| f04095db8c | |||
| 2847542976 | |||
| 929186d123 | |||
| d6c885240a | |||
| 0b97ae2fc5 | |||
| abacbf90ce | |||
| 243cf426d7 | |||
| 64b7ea45c0 | |||
| 3a2dbe572e | |||
| 2be42989e5 | |||
| cb97703406 | |||
| 16df0b65fc | |||
| 847b255e3b | |||
| d005697438 | |||
| ab010643df | |||
| e17cd1b633 | |||
| 504764af10 | |||
| 405fb5938f | |||
| 77e0f7b7cb | |||
| 7fb0e80537 | |||
| fb8b9b735f | |||
| 86e99b1515 | |||
| 952e92082f | |||
| 33e0220e34 | |||
| a51d922f00 | |||
| b441717ee1 | |||
| b7da591571 | |||
| fa0fa30062 | |||
| dd4e79901e | |||
| 1fcaa4b212 | |||
| 164fd15c60 | |||
| 241551169a | |||
| a2b20f49cc | |||
| fe8765ded7 | |||
| caf45b5270 | |||
| 9ba2df08cd | |||
| 9458f49744 | |||
| 369aaaa0b5 | |||
| 6220e2a9aa | |||
| e3e46bae7d | |||
| 6e6e7900da | |||
| 6c329a36e9 | |||
| f33f2912f1 | |||
| 9541942c23 | |||
| 2f937aded7 | |||
| 95dea97382 | |||
| a840306245 | |||
| bbd103d527 | |||
| b2ceee8720 | |||
| d5c886f02b | |||
| 1d59cd4b3c | |||
| f2d9147291 | |||
| bc9f1c260f | |||
| 368f84769b | |||
| 51366476cc | |||
| dcbaf6b807 | |||
| 5dfc3a7813 | |||
| 0989d0c586 | |||
| 8a83f47572 | |||
| a3bbf88ce3 | |||
| 5e0cebf733 | |||
| 00e3266360 | |||
| c6a8f9f7bd | |||
| 4f1231f973 | |||
| 049bedbd8f | |||
| 0e7cfa0934 | |||
| 5435f73402 | |||
| 6917e0799a | |||
| 4616b9b070 | |||
| 8c741dc120 | |||
| 8cbfcb016b | |||
| 4ba7b590ba | |||
| 52660e1414 | |||
| 0ab6aaeaa5 | |||
| 02c26b2465 | |||
| 1842a08a39 | |||
| 0c01f024e9 | |||
| 40489ff373 | |||
| c491066384 | |||
| 4c054cc434 | |||
| dcbe6c397f | |||
| cb84a02b6f | |||
| 8f432d3353 | |||
| 1cdbcaccaf | |||
| f1c6161bcb | |||
| 123518a787 | |||
| 2ec6a756b7 | |||
| a1779be079 | |||
| 8ed9b2f754 | |||
| 72202d9f21 | |||
| 9eb5fbd0a3 | |||
| c58ede04c4 | |||
| 662e8984c3 | |||
| b7abf25907 | |||
| 18fa7742fa | |||
| f6993c2052 | |||
| 59d1730ca5 | |||
| b087203cfb | |||
| d39d594bf0 | |||
| 487239365e | |||
| 6ea03d152c | |||
| 01991435ae | |||
| a64b5b2325 | |||
| 38d7442025 | |||
| cf91519076 | |||
| bae044e145 | |||
| f39b4bbb62 | |||
| 9739c51100 | |||
| 0df98d4341 | |||
| fc23dc068d | |||
| 4d78d65ad8 | |||
| c1440d9dcd | |||
| 4a5f390ae1 | |||
| e0a5b5a5da | |||
| 081aaaaa19 | |||
| 2bd0f8df0a | |||
| 2c57dbcddc | |||
| 0f01e803f2 |
17
.drone.yml
17
.drone.yml
@@ -14,29 +14,32 @@ steps:
|
|||||||
- name: Debugging information
|
- name: Debugging information
|
||||||
image: bv11-cr01.bessems.eu/library/packer-extended
|
image: bv11-cr01.bessems.eu/library/packer-extended
|
||||||
commands:
|
commands:
|
||||||
- yamllint --version
|
|
||||||
- packer --version
|
|
||||||
- ansible --version
|
- ansible --version
|
||||||
- ovftool --version
|
- ovftool --version
|
||||||
- name: Ubuntu Server 20.04
|
- packer --version
|
||||||
|
- yamllint --version
|
||||||
|
- name: Kubernetes Bootstrap Appliance
|
||||||
image: bv11-cr01.bessems.eu/library/packer-extended
|
image: bv11-cr01.bessems.eu/library/packer-extended
|
||||||
pull: always
|
pull: always
|
||||||
commands:
|
commands:
|
||||||
- |
|
- |
|
||||||
sed -i -e "s/<<img-password>>/$${SSH_PASSWORD}/g" \
|
sed -i -e "s/<<img-password>>/$${SSH_PASSWORD}/g" \
|
||||||
packer/preseed/UbuntuServer20.04/user-data
|
packer/preseed/UbuntuServer22.04/user-data
|
||||||
- |
|
- |
|
||||||
yamllint -d "{extends: relaxed, rules: {line-length: disable}}" \
|
yamllint -d "{extends: relaxed, rules: {line-length: disable}}" \
|
||||||
ansible \
|
ansible \
|
||||||
packer/preseed/UbuntuServer20.04/user-data \
|
packer/preseed/UbuntuServer22.04/user-data \
|
||||||
scripts
|
scripts
|
||||||
|
- |
|
||||||
|
ansible-galaxy install \
|
||||||
|
-r ansible/requirements.yml
|
||||||
- |
|
- |
|
||||||
packer init -upgrade \
|
packer init -upgrade \
|
||||||
./packer
|
./packer
|
||||||
- |
|
- |
|
||||||
packer validate \
|
packer validate \
|
||||||
-var vm_name=$DRONE_BUILD_NUMBER-${DRONE_COMMIT_SHA:0:10} \
|
-var vm_name=$DRONE_BUILD_NUMBER-${DRONE_COMMIT_SHA:0:10} \
|
||||||
-var vm_guestos=ubuntuserver20.04 \
|
-var vm_guestos=k8sbootstrap \
|
||||||
-var repo_username=$${REPO_USERNAME} \
|
-var repo_username=$${REPO_USERNAME} \
|
||||||
-var repo_password=$${REPO_PASSWORD} \
|
-var repo_password=$${REPO_PASSWORD} \
|
||||||
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
||||||
@@ -46,7 +49,7 @@ steps:
|
|||||||
packer build \
|
packer build \
|
||||||
-on-error=cleanup -timestamp-ui \
|
-on-error=cleanup -timestamp-ui \
|
||||||
-var vm_name=$DRONE_BUILD_NUMBER-${DRONE_COMMIT_SHA:0:10} \
|
-var vm_name=$DRONE_BUILD_NUMBER-${DRONE_COMMIT_SHA:0:10} \
|
||||||
-var vm_guestos=ubuntuserver20.04 \
|
-var vm_guestos=k8sbootstrap \
|
||||||
-var repo_username=$${REPO_USERNAME} \
|
-var repo_username=$${REPO_USERNAME} \
|
||||||
-var repo_password=$${REPO_PASSWORD} \
|
-var repo_password=$${REPO_PASSWORD} \
|
||||||
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
||||||
|
|||||||
@@ -1 +1 @@
|
|||||||
# Packer.Images [](https://ci.spamasaurus.com/djpbessems/Packer.Images)
|
# Packer.Images [](https://ci.spamasaurus.com/djpbessems/Packer.Images)
|
||||||
|
|||||||
@@ -1,7 +1,10 @@
|
|||||||
---
|
---
|
||||||
- hosts: all
|
- hosts: all
|
||||||
gather_facts: false
|
gather_facts: false
|
||||||
|
vars_files:
|
||||||
|
- metacluster.yml
|
||||||
become: true
|
become: true
|
||||||
roles:
|
roles:
|
||||||
- os
|
- os
|
||||||
- firstboot
|
- firstboot
|
||||||
|
- assets
|
||||||
|
|||||||
4
ansible/requirements.yml
Normal file
4
ansible/requirements.yml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
collections:
|
||||||
|
- ansible.utils
|
||||||
|
- community.general
|
||||||
|
- kubernetes.core
|
||||||
97
ansible/roles/assets/tasks/containerimages.yml
Normal file
97
ansible/roles/assets/tasks/containerimages.yml
Normal file
@@ -0,0 +1,97 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Aggregate chart_values into dict
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
chart_values: "{{ chart_values | default({}) | combine({ (item.key | regex_replace('[^A-Za-z0-9]', '')): { 'chart_values': (item.value.helm.chart_values | from_yaml) } }) }}"
|
||||||
|
when: item.value.helm.chart_values is defined
|
||||||
|
loop: "{{ lookup('ansible.builtin.dict', components) }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.key }}"
|
||||||
|
|
||||||
|
- name: Write dict to vars_file
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: /opt/firstboot/ansible/vars/metacluster.yml
|
||||||
|
content: "{{ { 'components': (chart_values | combine({ 'clusterapi': components.clusterapi })) } | to_nice_yaml(indent=2, width=4096) }}"
|
||||||
|
|
||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Download ClusterAPI manifests
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: "{{ item.url }}"
|
||||||
|
dest: /opt/metacluster/cluster-api/{{ item.dest }}
|
||||||
|
register: clusterapi_manifests
|
||||||
|
loop:
|
||||||
|
# This list is based on `clusterctl config repositories`
|
||||||
|
# Note: Each manifest also needs a `metadata.yaml` file stored in the respective folder
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/bootstrap-components.yaml
|
||||||
|
dest: bootstrap-kubeadm/{{ components.clusterapi.management.version.base }}/bootstrap-components.yaml
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/core-components.yaml
|
||||||
|
dest: cluster-api/{{ components.clusterapi.management.version.base }}/core-components.yaml
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/control-plane-components.yaml
|
||||||
|
dest: control-plane-kubeadm/{{ components.clusterapi.management.version.base }}/control-plane-components.yaml
|
||||||
|
# This downloads the same `metadata.yaml` file to three separate folders
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
||||||
|
dest: bootstrap-kubeadm/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
||||||
|
dest: cluster-api/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
||||||
|
dest: control-plane-kubeadm/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
||||||
|
# The vsphere infrastructure provider requires multiple files (`cluster-template.yaml` and `metadata.yaml` on top of default files)
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api-provider-vsphere/releases/download/{{ components.clusterapi.management.version.infrastructure_vsphere }}/infrastructure-components.yaml
|
||||||
|
dest: infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}/infrastructure-components.yaml
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api-provider-vsphere/releases/download/{{ components.clusterapi.management.version.infrastructure_vsphere }}/cluster-template.yaml
|
||||||
|
dest: infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}/cluster-template.yaml
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api-provider-vsphere/releases/download/{{ components.clusterapi.management.version.infrastructure_vsphere }}/metadata.yaml
|
||||||
|
dest: infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}/metadata.yaml
|
||||||
|
# Additionally, cert-manager is a prerequisite
|
||||||
|
- url: https://github.com/cert-manager/cert-manager/releases/download/{{ components.clusterapi.management.version.cert_manager }}/cert-manager.yaml
|
||||||
|
dest: cert-manager/{{ components.clusterapi.management.version.cert_manager }}/cert-manager.yaml
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.url | basename }}"
|
||||||
|
retries: 5
|
||||||
|
delay: 5
|
||||||
|
until: clusterapi_manifests is not failed
|
||||||
|
|
||||||
|
- name: Parse manifests
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: cat {{ item.dest }} | yq --no-doc eval '.. | .image? | select(.)' | awk '!/ /' | sort
|
||||||
|
register: parsedmanifests
|
||||||
|
loop: "{{ clusterapi_manifests.results }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.dest | basename }}"
|
||||||
|
|
||||||
|
- name: Store container images
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
clusterapi_containerimages: "{{ parsedmanifests | json_query('results[*].stdout_lines') | select() | flatten }}"
|
||||||
|
|
||||||
|
- name: Parse helm charts for container images
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: "{{ item.value.helm.parse_logic }}"
|
||||||
|
chdir: /opt/metacluster/helm-charts/{{ item.key }}
|
||||||
|
register: containerimages
|
||||||
|
when: item.value.helm is defined
|
||||||
|
loop: "{{ lookup('ansible.builtin.dict', components) }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.key }}"
|
||||||
|
|
||||||
|
- name: Pull and store containerimages
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
skopeo copy \
|
||||||
|
--insecure-policy \
|
||||||
|
--retry-times=5 \
|
||||||
|
docker://{{ item }} \
|
||||||
|
docker-archive:./{{ ( item | regex_findall('[^/:]+'))[-2] }}_{{ lookup('ansible.builtin.password', '/dev/null length=5 chars=ascii_lowercase,digits seed={{ item }}') }}.tar:{{ item }}
|
||||||
|
chdir: /opt/metacluster/container-images
|
||||||
|
loop: "{{ ((containerimages.results | map(attribute='stdout_lines') | select('defined') | flatten) + dependencies.container_images + (clusterapi_containerimages | list)) | unique }}"
|
||||||
|
|
||||||
|
# - name: Inject manifests
|
||||||
|
# ansible.builtin.template:
|
||||||
|
# src: "{{ item.type }}.j2"
|
||||||
|
# dest: /var/lib/rancher/k3s/server/manifests/{{ item.name }}-manifest.yaml
|
||||||
|
# owner: root
|
||||||
|
# group: root
|
||||||
|
# mode: 0600
|
||||||
|
# loop: "{{ lookup('ansible.builtin.dict', components) | map(attribute='value.manifests') | list | select('defined') | flatten }}"
|
||||||
|
# loop_control:
|
||||||
|
# label: "{{ item.type + '/' + item.name }}"
|
||||||
@@ -0,0 +1,27 @@
|
|||||||
|
---
|
||||||
|
- name: Initialize tempfolder
|
||||||
|
ansible.builtin.tempfile:
|
||||||
|
state: directory
|
||||||
|
register: archive
|
||||||
|
|
||||||
|
- name: Download & extract archived static binary
|
||||||
|
ansible.builtin.unarchive:
|
||||||
|
src: "{{ item.url }}"
|
||||||
|
dest: "{{ archive.path }}"
|
||||||
|
remote_src: yes
|
||||||
|
extra_opts: "{{ item.extra_opts | default(omit) }}"
|
||||||
|
|
||||||
|
- name: Install extracted binary
|
||||||
|
ansible.builtin.copy:
|
||||||
|
src: "{{ archive.path }}/{{ item.filename }}"
|
||||||
|
dest: /usr/local/bin/{{ item.filename }}
|
||||||
|
remote_src: yes
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0755
|
||||||
|
|
||||||
|
- name: Cleanup tempfolder
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ archive.path }}"
|
||||||
|
state: absent
|
||||||
|
when: archive.path is defined
|
||||||
50
ansible/roles/assets/tasks/dependencies.yml
Normal file
50
ansible/roles/assets/tasks/dependencies.yml
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
- name: Download & install static binaries
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: "{{ item.url }}"
|
||||||
|
url_username: "{{ item.username | default(omit) }}"
|
||||||
|
url_password: "{{ item.password | default(omit) }}"
|
||||||
|
dest: /usr/local/bin/{{ item.filename }}
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0755
|
||||||
|
loop: "{{ dependencies.static_binaries | selectattr('archive', 'undefined') }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.filename }}"
|
||||||
|
|
||||||
|
- name: Download, extract & install archived static binaries
|
||||||
|
include_tasks: dependencies.archive_compressed.yml
|
||||||
|
loop: "{{ dependencies.static_binaries | rejectattr('archive', 'undefined') | selectattr('archive', 'equalto', 'compressed') }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.filename }}"
|
||||||
|
|
||||||
|
- name: Install ansible-galaxy collections
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: ansible-galaxy collection install {{ item }}
|
||||||
|
register: collections
|
||||||
|
loop: "{{ dependencies.ansible_galaxy_collections }}"
|
||||||
|
retries: 5
|
||||||
|
delay: 5
|
||||||
|
until: collections is not failed
|
||||||
|
|
||||||
|
- name: Install distro packages
|
||||||
|
ansible.builtin.apt:
|
||||||
|
pkg: "{{ dependencies.packages.apt }}"
|
||||||
|
state: latest
|
||||||
|
update_cache: yes
|
||||||
|
install_recommends: no
|
||||||
|
|
||||||
|
- name: Upgrade all packages
|
||||||
|
ansible.builtin.apt:
|
||||||
|
name: '*'
|
||||||
|
state: latest
|
||||||
|
update_cache: yes
|
||||||
|
|
||||||
|
- name: Install additional python packages
|
||||||
|
ansible.builtin.pip:
|
||||||
|
name: "{{ dependencies.packages.pip }}"
|
||||||
|
state: latest
|
||||||
|
|
||||||
|
- name: Cleanup apt cache
|
||||||
|
ansible.builtin.apt:
|
||||||
|
autoremove: yes
|
||||||
|
purge: yes
|
||||||
5
ansible/roles/assets/tasks/git.yml
Normal file
5
ansible/roles/assets/tasks/git.yml
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
- name: Clone git repository
|
||||||
|
ansible.builtin.git:
|
||||||
|
repo: "{{ platform.gitops.repository.uri }}"
|
||||||
|
version: "{{ platform.gitops.repository.revision }}"
|
||||||
|
dest: /opt/metacluster/git-repositories/gitops
|
||||||
19
ansible/roles/assets/tasks/helm.yml
Normal file
19
ansible/roles/assets/tasks/helm.yml
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
- name: Add helm repositories
|
||||||
|
kubernetes.core.helm_repository:
|
||||||
|
name: "{{ item.name }}"
|
||||||
|
repo_url: "{{ item.url }}"
|
||||||
|
state: present
|
||||||
|
loop: "{{ platform.helm_repositories }}"
|
||||||
|
|
||||||
|
- name: Fetch helm charts
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: helm fetch {{ item.value.helm.chart }} --untar --version {{ item.value.helm.version }}
|
||||||
|
chdir: /opt/metacluster/helm-charts
|
||||||
|
when: item.value.helm is defined
|
||||||
|
register: helmcharts
|
||||||
|
loop: "{{ lookup('ansible.builtin.dict', components) }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.key }}"
|
||||||
|
retries: 5
|
||||||
|
delay: 5
|
||||||
|
until: helmcharts is not failed
|
||||||
44
ansible/roles/assets/tasks/k3s.yml
Normal file
44
ansible/roles/assets/tasks/k3s.yml
Normal file
@@ -0,0 +1,44 @@
|
|||||||
|
|
||||||
|
- name: Download & install K3s binary
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: https://github.com/k3s-io/k3s/releases/download/{{ platform.k3s.version }}/k3s
|
||||||
|
dest: /usr/local/bin/k3s
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0755
|
||||||
|
register: download
|
||||||
|
until: download is not failed
|
||||||
|
retries: 3
|
||||||
|
delay: 10
|
||||||
|
|
||||||
|
- name: Download K3s images tarball
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: https://github.com/k3s-io/k3s/releases/download/{{ platform.k3s.version }}/k3s-airgap-images-amd64.tar.gz
|
||||||
|
dest: /var/lib/rancher/k3s/agent/images
|
||||||
|
register: download
|
||||||
|
until: download is not failed
|
||||||
|
retries: 3
|
||||||
|
delay: 10
|
||||||
|
|
||||||
|
- name: Download K3s install script
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: https://get.k3s.io
|
||||||
|
dest: /opt/metacluster/k3s/install.sh
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0755
|
||||||
|
register: download
|
||||||
|
until: download is not failed
|
||||||
|
retries: 3
|
||||||
|
delay: 10
|
||||||
|
|
||||||
|
- name: Inject manifests
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: helmchartconfig.j2
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/{{ item.name }}-config.yaml
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0600
|
||||||
|
loop: "{{ platform.packaged_components }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.name }}"
|
||||||
24
ansible/roles/assets/tasks/main.yml
Normal file
24
ansible/roles/assets/tasks/main.yml
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
- name: Create folder structure(s)
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
state: directory
|
||||||
|
loop:
|
||||||
|
- /opt/metacluster/cluster-api/bootstrap-kubeadm/{{ components.clusterapi.management.version.base }}
|
||||||
|
- /opt/metacluster/cluster-api/cert-manager/{{ components.clusterapi.management.version.cert_manager }}
|
||||||
|
- /opt/metacluster/cluster-api/cluster-api/{{ components.clusterapi.management.version.base }}
|
||||||
|
- /opt/metacluster/cluster-api/control-plane-kubeadm/{{ components.clusterapi.management.version.base }}
|
||||||
|
- /opt/metacluster/cluster-api/infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}
|
||||||
|
- /opt/metacluster/container-images
|
||||||
|
- /opt/metacluster/git-repositories/gitops
|
||||||
|
- /opt/metacluster/helm-charts
|
||||||
|
- /opt/metacluster/k3s
|
||||||
|
- /opt/workloadcluster/node-templates
|
||||||
|
- /var/lib/rancher/k3s/agent/images
|
||||||
|
- /var/lib/rancher/k3s/server/manifests
|
||||||
|
|
||||||
|
- import_tasks: dependencies.yml
|
||||||
|
- import_tasks: k3s.yml
|
||||||
|
- import_tasks: helm.yml
|
||||||
|
- import_tasks: git.yml
|
||||||
|
- import_tasks: containerimages.yml
|
||||||
|
- import_tasks: nodetemplates.yml
|
||||||
4
ansible/roles/assets/tasks/nodetemplates.yml
Normal file
4
ansible/roles/assets/tasks/nodetemplates.yml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
- name: Download node-template image
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: "{{ components.clusterapi.workload.node_template.url }}"
|
||||||
|
dest: /opt/workloadcluster/node-templates/{{ components.clusterapi.workload.node_template.name }}
|
||||||
8
ansible/roles/assets/templates/helmchartconfig.j2
Normal file
8
ansible/roles/assets/templates/helmchartconfig.j2
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
apiVersion: helm.cattle.io/v1
|
||||||
|
kind: HelmChartConfig
|
||||||
|
metadata:
|
||||||
|
name: {{ item.name }}
|
||||||
|
namespace: {{ item.namespace }}
|
||||||
|
spec:
|
||||||
|
valuesContent: |-
|
||||||
|
{{ item.config }}
|
||||||
@@ -1,10 +1,24 @@
|
|||||||
---
|
---
|
||||||
- hosts: 127.0.0.1
|
- hosts: 127.0.0.1
|
||||||
connection: local
|
connection: local
|
||||||
gather_facts: false
|
gather_facts: true
|
||||||
|
vars_files:
|
||||||
|
- metacluster.yml
|
||||||
# become: true
|
# become: true
|
||||||
roles:
|
roles:
|
||||||
- vapp
|
- vapp
|
||||||
- network
|
- network
|
||||||
- users
|
- users
|
||||||
|
- disks
|
||||||
|
- metacluster
|
||||||
|
- workloadcluster
|
||||||
|
- tty
|
||||||
- cleanup
|
- cleanup
|
||||||
|
handlers:
|
||||||
|
- name: Apply manifests
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
src: "{{ item }}"
|
||||||
|
state: present
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
loop: "{{ query('ansible.builtin.fileglob', '/var/lib/rancher/k3s/server/manifests/*.yaml') | sort }}"
|
||||||
|
ignore_errors: yes
|
||||||
|
|||||||
@@ -0,0 +1,4 @@
|
|||||||
|
- name: Disable crontab job
|
||||||
|
ansible.builtin.cron:
|
||||||
|
name: firstboot
|
||||||
|
state: absent
|
||||||
@@ -1,20 +1,12 @@
|
|||||||
- name: Disable crontab job
|
- import_tasks: service.yml
|
||||||
ansible.builtin.cron:
|
- import_tasks: cron.yml
|
||||||
name: firstboot
|
|
||||||
|
- name: Cleanup tempfile
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ kubeconfig.path }}"
|
||||||
state: absent
|
state: absent
|
||||||
- name: Restore extra tty
|
when: kubeconfig.path is defined
|
||||||
ansible.builtin.lineinfile:
|
|
||||||
path: /etc/systemd/logind.conf
|
|
||||||
regexp: "{{ item.regexp }}"
|
|
||||||
line: "{{ item.line }}"
|
|
||||||
loop:
|
|
||||||
- { regexp: '^NAutoVTs=', line: '#NAutoVTs=6'}
|
|
||||||
- { regexp: '^ReserveVT=', line: '#ReserveVT=6'}
|
|
||||||
- name: Unmask getty@tty1 service
|
|
||||||
ansible.builtin.systemd:
|
|
||||||
name: getty@tty1
|
|
||||||
enabled: yes
|
|
||||||
masked: no
|
|
||||||
- name: Reboot host
|
- name: Reboot host
|
||||||
ansible.builtin.shell:
|
ansible.builtin.shell:
|
||||||
cmd: /usr/sbin/reboot now
|
cmd: /usr/sbin/reboot now
|
||||||
|
|||||||
@@ -0,0 +1,26 @@
|
|||||||
|
- name: Create tarball compression service
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "{{ item.src }}"
|
||||||
|
dest: "{{ item.dest }}"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: "{{ item.mode | default(omit) }}"
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
service:
|
||||||
|
name: compressTarballs
|
||||||
|
executable: /opt/firstboot/compresstarballs.sh
|
||||||
|
workingdir: /opt/metacluster/container-images/
|
||||||
|
loop:
|
||||||
|
- src: compresstarballs.j2
|
||||||
|
dest: "{{ _template.service.executable }}"
|
||||||
|
mode: o+x
|
||||||
|
- src: systemdunit.j2
|
||||||
|
dest: /etc/systemd/system/{{ _template.service.name }}.service
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.src }}"
|
||||||
|
|
||||||
|
- name: Enable tarball compression service
|
||||||
|
ansible.builtin.systemd:
|
||||||
|
name: compressTarballs
|
||||||
|
enabled: yes
|
||||||
@@ -0,0 +1,24 @@
|
|||||||
|
- name: Create volume group
|
||||||
|
community.general.lvg:
|
||||||
|
vg: longhorn_vg
|
||||||
|
pvs:
|
||||||
|
- /dev/sdb
|
||||||
|
pvresize: yes
|
||||||
|
|
||||||
|
- name: Create logical volume
|
||||||
|
community.general.lvol:
|
||||||
|
vg: longhorn_vg
|
||||||
|
lv: longhorn_lv
|
||||||
|
size: 100%VG
|
||||||
|
|
||||||
|
- name: Create filesystem
|
||||||
|
community.general.filesystem:
|
||||||
|
dev: /dev/mapper/longhorn_vg-longhorn_lv
|
||||||
|
fstype: ext4
|
||||||
|
|
||||||
|
- name: Mount dynamic disk
|
||||||
|
ansible.posix.mount:
|
||||||
|
path: /mnt/blockstorage
|
||||||
|
src: /dev/mapper/longhorn_vg-longhorn_lv
|
||||||
|
fstype: ext4
|
||||||
|
state: mounted
|
||||||
@@ -0,0 +1,14 @@
|
|||||||
|
import netaddr
|
||||||
|
|
||||||
|
def netaddr_iter_iprange(ip_start, ip_end):
|
||||||
|
return [str(ip) for ip in netaddr.iter_iprange(ip_start, ip_end)]
|
||||||
|
|
||||||
|
class FilterModule(object):
|
||||||
|
''' Ansible filter. Interface to netaddr methods.
|
||||||
|
https://pypi.org/project/netaddr/
|
||||||
|
'''
|
||||||
|
|
||||||
|
def filters(self):
|
||||||
|
return {
|
||||||
|
'netaddr_iter_iprange': netaddr_iter_iprange
|
||||||
|
}
|
||||||
@@ -0,0 +1,12 @@
|
|||||||
|
- name: Import container images
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: k3s ctr image import {{ item }} --digests
|
||||||
|
chdir: /opt/metacluster/container-images
|
||||||
|
register: import_result
|
||||||
|
loop: "{{ query('ansible.builtin.fileglob', '/opt/metacluster/container-images/*.tar') | sort }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item | basename }}"
|
||||||
|
# Probably should add a task before that ensures K3s node is fully initialized before starting imports; currently K3s goes away briefly during this loop
|
||||||
|
retries: 3
|
||||||
|
delay: 10
|
||||||
|
until: import_result is not failed
|
||||||
@@ -0,0 +1,122 @@
|
|||||||
|
- name: Install step-ca chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: step-certificates
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/step-certificates
|
||||||
|
release_namespace: step-ca
|
||||||
|
create_namespace: yes
|
||||||
|
wait: yes
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: "{{ components.stepcertificates.chart_values }}"
|
||||||
|
|
||||||
|
- name: Retrieve configmap w/ root certificate
|
||||||
|
kubernetes.core.k8s_info:
|
||||||
|
kind: ConfigMap
|
||||||
|
name: step-certificates-certs
|
||||||
|
namespace: step-ca
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
register: stepca_cm_certs
|
||||||
|
|
||||||
|
- name: Create target namespaces
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
kind: Namespace
|
||||||
|
name: "{{ item }}"
|
||||||
|
state: present
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
loop:
|
||||||
|
- argo-cd
|
||||||
|
# - kube-system
|
||||||
|
|
||||||
|
- name: Store root certificate in namespaced configmaps/secrets
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
state: present
|
||||||
|
template: "{{ item.kind }}.j2"
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: "{{ item.name }}"
|
||||||
|
namespace: "{{ item.namespace }}"
|
||||||
|
annotations: "{{ item.annotations | default('{}') | indent(width=4, first=True) }}"
|
||||||
|
labels: "{{ item.labels | default('{}') | indent(width=4, first=True) }}"
|
||||||
|
data: "{{ item.data }}"
|
||||||
|
loop:
|
||||||
|
- name: argocd-tls-certs-cm
|
||||||
|
namespace: argo-cd
|
||||||
|
kind: configmap
|
||||||
|
annotations: |
|
||||||
|
meta.helm.sh/release-name: argo-cd
|
||||||
|
meta.helm.sh/release-namespace: argo-cd
|
||||||
|
labels: |
|
||||||
|
app.kubernetes.io/managed-by: Helm
|
||||||
|
app.kubernetes.io/name: argocd-cm
|
||||||
|
app.kubernetes.io/part-of: argocd
|
||||||
|
data:
|
||||||
|
- key: git.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
value: "{{ stepca_cm_certs.resources[0].data['root_ca.crt'] }}"
|
||||||
|
- name: step-certificates-certs
|
||||||
|
namespace: kube-system
|
||||||
|
kind: secret
|
||||||
|
data:
|
||||||
|
- key: root_ca.crt
|
||||||
|
value: "{{ stepca_cm_certs.resources[0].data['root_ca.crt'] | b64encode }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.kind + '/' + item.name + ' (' + item.namespace + ')' }}"
|
||||||
|
|
||||||
|
- name: Configure step-ca passthrough ingress
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: ingressroutetcp.j2
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.name }}-manifest.yaml
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0600
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: step-ca
|
||||||
|
namespace: step-ca
|
||||||
|
config: |2
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: HostSNI(`ca.{{ vapp['metacluster.fqdn'] }}`)
|
||||||
|
services:
|
||||||
|
- name: step-certificates
|
||||||
|
port: 443
|
||||||
|
tls:
|
||||||
|
passthrough: true
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Inject step-ca certificate into traefik container
|
||||||
|
ansible.builtin.blockinfile:
|
||||||
|
path: /var/lib/rancher/k3s/server/manifests/traefik-config.yaml
|
||||||
|
block: |2
|
||||||
|
volumes:
|
||||||
|
- name: step-certificates-certs
|
||||||
|
mountPath: /step-ca
|
||||||
|
type: secret
|
||||||
|
env:
|
||||||
|
- name: LEGO_CA_CERTIFICATES
|
||||||
|
value: /step-ca/root_ca.crt
|
||||||
|
marker: ' # {mark} ANSIBLE MANAGED BLOCK'
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Trigger handlers
|
||||||
|
ansible.builtin.meta: flush_handlers
|
||||||
|
|
||||||
|
- name: Retrieve step-ca configuration
|
||||||
|
kubernetes.core.k8s_info:
|
||||||
|
kind: ConfigMap
|
||||||
|
name: step-certificates-config
|
||||||
|
namespace: step-ca
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
register: stepca_cm_config
|
||||||
|
|
||||||
|
- name: Install root CA in system truststore
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
step ca bootstrap \
|
||||||
|
--ca-url=https://ca.{{ vapp['metacluster.fqdn'] }} \
|
||||||
|
--fingerprint={{ stepca_cm_config.resources[0].data['defaults.json'] | from_json | json_query('fingerprint') }} \
|
||||||
|
--install \
|
||||||
|
--force
|
||||||
|
update-ca-certificates
|
||||||
@@ -0,0 +1,137 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Install gitea chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: gitea
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/gitea
|
||||||
|
release_namespace: gitea
|
||||||
|
create_namespace: yes
|
||||||
|
wait: yes
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: "{{ components.gitea.chart_values }}"
|
||||||
|
|
||||||
|
- name: Configure additional SSH ingress
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: ingressroutetcp.j2
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.name }}-manifest.yaml
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0600
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: gitea-ssh
|
||||||
|
namespace: gitea
|
||||||
|
config: |2
|
||||||
|
entryPoints:
|
||||||
|
- ssh
|
||||||
|
routes:
|
||||||
|
- match: HostSNI(`*`)
|
||||||
|
services:
|
||||||
|
- name: gitea-ssh
|
||||||
|
port: 22
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Trigger handlers
|
||||||
|
ansible.builtin.meta: flush_handlers
|
||||||
|
|
||||||
|
- name: Ensure gitea API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/api/healthz
|
||||||
|
method: GET
|
||||||
|
register: api_readycheck
|
||||||
|
until: api_readycheck.json.status is defined
|
||||||
|
retries: 5
|
||||||
|
delay: 30
|
||||||
|
|
||||||
|
- name: Generate gitea API token
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/api/v1/users/administrator/tokens
|
||||||
|
method: POST
|
||||||
|
user: administrator
|
||||||
|
password: "{{ vapp['guestinfo.rootpw'] }}"
|
||||||
|
force_basic_auth: yes
|
||||||
|
body:
|
||||||
|
name: token_init_{{ lookup('password', '/dev/null length=5 chars=ascii_letters,digits') }}
|
||||||
|
register: gitea_api_token
|
||||||
|
|
||||||
|
- name: Retrieve existing gitea configuration
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/api/v1/repos/search
|
||||||
|
method: GET
|
||||||
|
register: gitea_existing_config
|
||||||
|
|
||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Register SSH public key
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/api/v1/user/keys
|
||||||
|
method: POST
|
||||||
|
headers:
|
||||||
|
Authorization: token {{ gitea_api_token.json.sha1 }}
|
||||||
|
body:
|
||||||
|
key: "{{ gitops_sshkey.public_key }}"
|
||||||
|
read_only: false
|
||||||
|
title: GitOps
|
||||||
|
|
||||||
|
- name: Create organization(s)
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/api/v1/orgs
|
||||||
|
method: POST
|
||||||
|
headers:
|
||||||
|
Authorization: token {{ gitea_api_token.json.sha1 }}
|
||||||
|
body: "{{ item }}"
|
||||||
|
loop:
|
||||||
|
- full_name: Meta-cluster
|
||||||
|
description: Meta-cluster configuration items
|
||||||
|
username: mc
|
||||||
|
website: https://git.{{ vapp['metacluster.fqdn'] }}/mc
|
||||||
|
location: '[...]'
|
||||||
|
visibility: public
|
||||||
|
- full_name: Workload-cluster
|
||||||
|
description: Workload-cluster configuration items
|
||||||
|
username: wl
|
||||||
|
website: https://git.{{ vapp['metacluster.fqdn'] }}/wl
|
||||||
|
location: '[...]'
|
||||||
|
visibility: public
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.full_name }}"
|
||||||
|
|
||||||
|
- name: Create repositories
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/api/v1/orgs/{{ item.organization }}/repos
|
||||||
|
method: POST
|
||||||
|
headers:
|
||||||
|
Authorization: token {{ gitea_api_token.json.sha1 }}
|
||||||
|
body: "{{ item.body }}"
|
||||||
|
loop:
|
||||||
|
- organization: mc
|
||||||
|
body:
|
||||||
|
name: GitOps.Config
|
||||||
|
# auto_init: true
|
||||||
|
# default_branch: main
|
||||||
|
description: GitOps manifests
|
||||||
|
- organization: wl
|
||||||
|
body:
|
||||||
|
name: Template.GitOps.Config
|
||||||
|
# auto_init: true
|
||||||
|
# default_branch: main
|
||||||
|
description: GitOps manifests
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.organization + '/' + item.body.name }}"
|
||||||
|
|
||||||
|
- name: Rebase/Push source gitops repository
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: |
|
||||||
|
git config --local http.sslVerify false
|
||||||
|
git remote set-url origin https://administrator:{{ vapp['guestinfo.rootpw'] | urlencode }}@git.{{ vapp['metacluster.fqdn'] }}/mc/GitOps.Config.git
|
||||||
|
git push
|
||||||
|
chdir: /opt/metacluster/git-repositories/gitops
|
||||||
|
|
||||||
|
when: (gitea_existing_config.json is undefined) or (gitea_existing_config.json.data | length == 0)
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201]
|
||||||
|
body_format: json
|
||||||
@@ -0,0 +1,69 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Install argo-cd chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: argo-cd
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/argo-cd
|
||||||
|
release_namespace: argo-cd
|
||||||
|
create_namespace: yes
|
||||||
|
wait: yes
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: "{{ components.argocd.chart_values }}"
|
||||||
|
|
||||||
|
- name: Ensure argo-cd API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://gitops.{{ vapp['metacluster.fqdn'] }}/api/version
|
||||||
|
method: GET
|
||||||
|
register: api_readycheck
|
||||||
|
until: api_readycheck.json.Version is defined
|
||||||
|
retries: 5
|
||||||
|
delay: 30
|
||||||
|
|
||||||
|
- name: Generate argo-cd API token
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://gitops.{{ vapp['metacluster.fqdn'] }}/api/v1/session
|
||||||
|
method: POST
|
||||||
|
force_basic_auth: yes
|
||||||
|
body:
|
||||||
|
username: admin
|
||||||
|
password: "{{ vapp['guestinfo.rootpw'] }}"
|
||||||
|
register: argocd_api_token
|
||||||
|
|
||||||
|
- name: Configure metacluster-gitops repository
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: gitrepo.j2
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.name }}-manifest.yaml
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0600
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: argocd-gitrepo-metacluster
|
||||||
|
namespace: argo-cd
|
||||||
|
uid: "{{ lookup('ansible.builtin.password', '/dev/null length=5 chars=ascii_lowercase,digits seed=inventory_hostname') }}"
|
||||||
|
privatekey: "{{ lookup('ansible.builtin.file', '~/.ssh/git_rsa_id') | indent(4, true) }}"
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Create applicationset
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: applicationset.j2
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.name }}-manifest.yaml
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0600
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: argocd-applicationset-metacluster
|
||||||
|
namespace: argo-cd
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Trigger handlers
|
||||||
|
ansible.builtin.meta: flush_handlers
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201]
|
||||||
|
body_format: json
|
||||||
@@ -0,0 +1,26 @@
|
|||||||
|
- name: Configure traefik dashboard ingress
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: ingressroute.j2
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.name }}-manifest.yaml
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0600
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: traefik-dashboard
|
||||||
|
namespace: kube-system
|
||||||
|
config: |2
|
||||||
|
entryPoints:
|
||||||
|
- web
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- kind: Rule
|
||||||
|
match: Host(`ingress.{{ vapp['metacluster.fqdn'] }}`)
|
||||||
|
services:
|
||||||
|
- kind: TraefikService
|
||||||
|
name: api@internal
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Trigger handlers
|
||||||
|
ansible.builtin.meta: flush_handlers
|
||||||
@@ -0,0 +1,13 @@
|
|||||||
|
- name: Configure fallback name resolution
|
||||||
|
ansible.builtin.lineinfile:
|
||||||
|
path: /etc/hosts
|
||||||
|
line: "{{ vapp['guestinfo.ipaddress'] }} {{ item + '.' + vapp['metacluster.fqdn'] }}"
|
||||||
|
state: present
|
||||||
|
loop:
|
||||||
|
# TODO: Make this list dynamic
|
||||||
|
- ca
|
||||||
|
- git
|
||||||
|
- gitops
|
||||||
|
- ingress
|
||||||
|
- registry
|
||||||
|
- storage
|
||||||
@@ -0,0 +1,55 @@
|
|||||||
|
- name: Gather service facts
|
||||||
|
ansible.builtin.service_facts:
|
||||||
|
# Module requires no attributes
|
||||||
|
|
||||||
|
- name: Install K3s
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: ./install.sh
|
||||||
|
chdir: /opt/metacluster/k3s
|
||||||
|
environment:
|
||||||
|
INSTALL_K3S_SKIP_DOWNLOAD: 'true'
|
||||||
|
INSTALL_K3S_EXEC: 'server --cluster-init --disable local-storage'
|
||||||
|
when: ansible_facts.services['k3s.service'] is undefined
|
||||||
|
|
||||||
|
- name: Debug possible taints on k3s node
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
while true;
|
||||||
|
do
|
||||||
|
kubectl get nodes -o custom-columns=NAME:.metadata.name,TAINTS:.spec.taints --no-headers | awk '{print strftime("%H:%M:%S"),$0;fflush();}' >> /var/log/taintlog
|
||||||
|
sleep 1
|
||||||
|
done
|
||||||
|
async: 1800
|
||||||
|
poll: 0
|
||||||
|
|
||||||
|
- name: Ensure API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://{{ vapp['guestinfo.ipaddress'] }}:6443/livez?verbose
|
||||||
|
method: GET
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 401]
|
||||||
|
register: api_readycheck
|
||||||
|
until: api_readycheck.json.apiVersion is defined
|
||||||
|
retries: 5
|
||||||
|
delay: 30
|
||||||
|
|
||||||
|
- name: Install kubectl tab-completion
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: kubectl completion bash | tee /etc/bash_completion.d/kubectl
|
||||||
|
|
||||||
|
- name: Initialize tempfile
|
||||||
|
ansible.builtin.tempfile:
|
||||||
|
state: file
|
||||||
|
register: kubeconfig
|
||||||
|
|
||||||
|
- name: Retrieve kubeconfig
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: kubectl config view --raw
|
||||||
|
register: kubectl_config
|
||||||
|
|
||||||
|
- name: Store kubeconfig in tempfile
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ kubeconfig.path }}"
|
||||||
|
content: "{{ kubectl_config.stdout }}"
|
||||||
|
mode: 0600
|
||||||
|
no_log: true
|
||||||
@@ -0,0 +1,10 @@
|
|||||||
|
- import_tasks: init.yml
|
||||||
|
- import_tasks: k3s.yml
|
||||||
|
- import_tasks: assets.yml
|
||||||
|
- import_tasks: ingress.yml
|
||||||
|
- import_tasks: storage.yml
|
||||||
|
- import_tasks: certauthority.yml
|
||||||
|
- import_tasks: registry.yml
|
||||||
|
- import_tasks: secrets.yml
|
||||||
|
- import_tasks: git.yml
|
||||||
|
- import_tasks: gitops.yml
|
||||||
@@ -0,0 +1,41 @@
|
|||||||
|
- name: Install harbor chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: harbor
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/harbor
|
||||||
|
release_namespace: harbor
|
||||||
|
create_namespace: yes
|
||||||
|
wait: yes
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: "{{ components.harbor.chart_values }}"
|
||||||
|
|
||||||
|
- name: Ensure harbor API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://registry.{{ vapp['metacluster.fqdn'] }}/api/v2.0/health
|
||||||
|
method: GET
|
||||||
|
register: api_readycheck
|
||||||
|
until: api_readycheck.json.status == 'healthy'
|
||||||
|
retries: 5
|
||||||
|
delay: 30
|
||||||
|
|
||||||
|
- name: Push images to registry
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
skopeo copy \
|
||||||
|
--insecure-policy \
|
||||||
|
--dest-tls-verify=false \
|
||||||
|
--dest-creds admin:{{ vapp['guestinfo.rootpw'] }} \
|
||||||
|
docker-archive:./{{ item | basename }} \
|
||||||
|
docker://registry.{{ vapp['metacluster.fqdn'] }}/library/$( \
|
||||||
|
skopeo list-tags \
|
||||||
|
--insecure-policy \
|
||||||
|
docker-archive:./{{ item | basename }} | \
|
||||||
|
jq -r '.Tags[0]')
|
||||||
|
chdir: /opt/metacluster/container-images/
|
||||||
|
loop: "{{ query('ansible.builtin.fileglob', '/opt/metacluster/container-images/*.tar') | sort }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item | basename }}"
|
||||||
|
|
||||||
|
- name: Configure K3s node for private registry
|
||||||
|
ansible.builtin.template:
|
||||||
|
dest: /etc/rancher/k3s/registries.yaml
|
||||||
|
src: registries.j2
|
||||||
@@ -0,0 +1,52 @@
|
|||||||
|
- name: Install sealed-secrets chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: sealed-secrets-controller
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/sealed-secrets
|
||||||
|
release_namespace: kube-system
|
||||||
|
wait: yes
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
# values: "{{ components.sealedsecrets.chart_values }}"
|
||||||
|
|
||||||
|
- name: Store hypervisor details in configmap/secret
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
state: present
|
||||||
|
template: "{{ item.kind }}.j2"
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: "{{ item.name }}"
|
||||||
|
namespace: "{{ item.namespace }}"
|
||||||
|
annotations: "{{ item.annotations | default('{}') | indent(width=4, first=True) }}"
|
||||||
|
labels: "{{ item.labels | default('{}') | indent(width=4, first=True) }}"
|
||||||
|
data: "{{ item.data }}"
|
||||||
|
loop:
|
||||||
|
- name: hypervisor-credentials
|
||||||
|
namespace: kube-system
|
||||||
|
kind: secret
|
||||||
|
data:
|
||||||
|
- key: HV_FQDN
|
||||||
|
value: "{{ vapp['hv.fqdn'] | b64encode }}"
|
||||||
|
- key: HV_USERNAME
|
||||||
|
value: "{{ vapp['hv.username'] | b64encode }}"
|
||||||
|
- key: HV_PASSWORD
|
||||||
|
value: "{{ vapp['hv.password'] | b64encode }}"
|
||||||
|
- name: hypervisor-ippool
|
||||||
|
namespace: kube-system
|
||||||
|
kind: configmap
|
||||||
|
data:
|
||||||
|
- key: VAPP_MOREF
|
||||||
|
value: "{{ moref_id }}"
|
||||||
|
- key: VAPP_IPPOOL_FQDN
|
||||||
|
value: "{{ vapp['metacluster.fqdn'] }}"
|
||||||
|
- key: VAPP_IPPOOL_NETWORK
|
||||||
|
value: "{{ (vapp['guestinfo.ipaddress'] + '/' + vapp['guestinfo.prefixlength']) | ansible.utils.ipaddr('network') }}"
|
||||||
|
- key: VAPP_IPPOOL_NETMASK
|
||||||
|
value: "{{ (vapp['guestinfo.ipaddress'] + '/' + vapp['guestinfo.prefixlength']) | ansible.utils.ipaddr('netmask') }}"
|
||||||
|
- key: VAPP_IPPOOL_DNSSERVER
|
||||||
|
value: "{{ vapp['guestinfo.dnsserver'] }}"
|
||||||
|
- key: VAPP_IPPOOL_GATEWAY
|
||||||
|
value: "{{ vapp['guestinfo.gateway'] }}"
|
||||||
|
- key: VAPP_IPPOOL_RANGE
|
||||||
|
value: "{{ vapp['ippool.startip'] + '#' + (vapp['ippool.startip'] | netaddr_iter_iprange(vapp['ippool.endip']) | length | string) }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.kind + '/' + item.name + ' (' + item.namespace + ')' }}"
|
||||||
@@ -0,0 +1,9 @@
|
|||||||
|
- name: Install longhorn chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: longhorn
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/longhorn
|
||||||
|
release_namespace: longhorn-system
|
||||||
|
create_namespace: yes
|
||||||
|
wait: yes
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: "{{ components.longhorn.chart_values }}"
|
||||||
@@ -1,10 +1,12 @@
|
|||||||
- name: Set hostname
|
- name: Set hostname
|
||||||
ansible.builtin.hostname:
|
ansible.builtin.hostname:
|
||||||
name: "{{ ovfproperties['guestinfo.hostname'] }}"
|
name: "{{ vapp['guestinfo.hostname'] }}"
|
||||||
|
|
||||||
- name: Create netplan configuration file
|
- name: Create netplan configuration file
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: netplan.j2
|
src: netplan.j2
|
||||||
dest: /etc/netplan/00-installer-config.yaml
|
dest: /etc/netplan/00-installer-config.yaml
|
||||||
|
|
||||||
- name: Apply netplan configuration
|
- name: Apply netplan configuration
|
||||||
ansible.builtin.shell:
|
ansible.builtin.shell:
|
||||||
cmd: /usr/sbin/netplan apply
|
cmd: /usr/sbin/netplan apply
|
||||||
|
|||||||
@@ -3,8 +3,8 @@ network:
|
|||||||
ethernets:
|
ethernets:
|
||||||
ens192:
|
ens192:
|
||||||
addresses:
|
addresses:
|
||||||
- {{ ovfproperties['guestinfo.ipaddress'] }}/{{ ovfproperties['guestinfo.prefixlength'] }}
|
- {{ vapp['guestinfo.ipaddress'] }}/{{ vapp['guestinfo.prefixlength'] }}
|
||||||
gateway4: {{ ovfproperties['guestinfo.gateway'] }}
|
gateway4: {{ vapp['guestinfo.gateway'] }}
|
||||||
nameservers:
|
nameservers:
|
||||||
addresses:
|
addresses:
|
||||||
- {{ ovfproperties['guestinfo.dnsserver'] }}
|
- {{ vapp['guestinfo.dnsserver'] }}
|
||||||
|
|||||||
@@ -0,0 +1,20 @@
|
|||||||
|
- name: Create folder structure(s)
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
state: directory
|
||||||
|
loop:
|
||||||
|
- /opt/firstboot
|
||||||
|
|
||||||
|
- name: Save tty script file
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: tty.j2
|
||||||
|
dest: /opt/firstboot/tty.sh
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0700
|
||||||
|
|
||||||
|
- name: Create @reboot crontab job
|
||||||
|
ansible.builtin.cron:
|
||||||
|
name: tty.consolemessage
|
||||||
|
special_time: reboot
|
||||||
|
job: /opt/firstboot/tty.sh
|
||||||
@@ -1,14 +1,16 @@
|
|||||||
- name: Set root password
|
- name: Set root password
|
||||||
ansible.builtin.user:
|
ansible.builtin.user:
|
||||||
name: root
|
name: root
|
||||||
password: "{{ ovfproperties['guestinfo.rootpw'] | password_hash('sha512', 65534 | random(seed=ovfproperties['guestinfo.hostname']) | string) }}"
|
password: "{{ vapp['guestinfo.rootpw'] | password_hash('sha512', 65534 | random(seed=vapp['guestinfo.hostname']) | string) }}"
|
||||||
generate_ssh_key: yes
|
generate_ssh_key: yes
|
||||||
ssh_key_bits: 2048
|
ssh_key_bits: 2048
|
||||||
ssh_key_file: .ssh/id_rsa
|
ssh_key_file: .ssh/id_rsa
|
||||||
|
|
||||||
- name: Save root SSH publickey
|
- name: Save root SSH publickey
|
||||||
ansible.builtin.lineinfile:
|
ansible.builtin.lineinfile:
|
||||||
path: /root/.ssh/authorized_keys
|
path: /root/.ssh/authorized_keys
|
||||||
line: "{{ ovfproperties['guestinfo.rootsshkey'] }}"
|
line: "{{ vapp['guestinfo.rootsshkey'] }}"
|
||||||
|
|
||||||
- name: Disable SSH password authentication
|
- name: Disable SSH password authentication
|
||||||
ansible.builtin.lineinfile:
|
ansible.builtin.lineinfile:
|
||||||
path: /etc/ssh/sshd_config
|
path: /etc/ssh/sshd_config
|
||||||
@@ -16,8 +18,20 @@
|
|||||||
line: "{{ item.line }}"
|
line: "{{ item.line }}"
|
||||||
state: "{{ item.state }}"
|
state: "{{ item.state }}"
|
||||||
loop:
|
loop:
|
||||||
- { regex: '^#PasswordAuthentication', line: 'PasswordAuthentication no', state: present}
|
- regex: '^#PasswordAuthentication'
|
||||||
- { regex: '^PasswordAuthentication yes', line: 'PasswordAuthentication yes', state: absent}
|
line: 'PasswordAuthentication no'
|
||||||
|
state: present
|
||||||
|
- regex: '^PasswordAuthentication yes'
|
||||||
|
line: 'PasswordAuthentication yes'
|
||||||
|
state: absent
|
||||||
|
loop_control:
|
||||||
|
label: "{{ '[' + item.line + '] ' + item.state }}"
|
||||||
|
|
||||||
|
- name: Create dedicated SSH keypair
|
||||||
|
community.crypto.openssh_keypair:
|
||||||
|
path: /root/.ssh/git_rsa_id
|
||||||
|
register: gitops_sshkey
|
||||||
|
|
||||||
- name: Delete 'ubuntu' user
|
- name: Delete 'ubuntu' user
|
||||||
ansible.builtin.user:
|
ansible.builtin.user:
|
||||||
name: ubuntu
|
name: ubuntu
|
||||||
|
|||||||
@@ -2,6 +2,21 @@
|
|||||||
ansible.builtin.shell:
|
ansible.builtin.shell:
|
||||||
cmd: /usr/bin/vmtoolsd --cmd "info-get guestinfo.ovfEnv"
|
cmd: /usr/bin/vmtoolsd --cmd "info-get guestinfo.ovfEnv"
|
||||||
register: ovfenv
|
register: ovfenv
|
||||||
|
|
||||||
|
- name: Parse XML for MoRef ID
|
||||||
|
community.general.xml:
|
||||||
|
xmlstring: "{{ ovfenv.stdout }}"
|
||||||
|
namespaces:
|
||||||
|
ns: http://schemas.dmtf.org/ovf/environment/1
|
||||||
|
ve: http://www.vmware.com/schema/ovfenv
|
||||||
|
xpath: /ns:Environment
|
||||||
|
content: attribute
|
||||||
|
register: environment_attribute
|
||||||
|
|
||||||
|
- name: Store MoRef ID
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
moref_id: "{{ ((environment_attribute.matches[0].values() | list)[0].values() | list)[1] }}"
|
||||||
|
|
||||||
- name: Parse XML for vApp properties
|
- name: Parse XML for vApp properties
|
||||||
community.general.xml:
|
community.general.xml:
|
||||||
xmlstring: "{{ ovfenv.stdout }}"
|
xmlstring: "{{ ovfenv.stdout }}"
|
||||||
@@ -9,13 +24,15 @@
|
|||||||
ns: http://schemas.dmtf.org/ovf/environment/1
|
ns: http://schemas.dmtf.org/ovf/environment/1
|
||||||
xpath: /ns:Environment/ns:PropertySection/ns:Property
|
xpath: /ns:Environment/ns:PropertySection/ns:Property
|
||||||
content: attribute
|
content: attribute
|
||||||
register: ovfenv
|
register: property_section
|
||||||
|
|
||||||
- name: Assign vApp properties to dictionary
|
- name: Assign vApp properties to dictionary
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.set_fact:
|
||||||
ovfproperties: >-
|
vapp: >-
|
||||||
{{ ovfproperties | default({}) |
|
{{ vapp | default({}) | combine({
|
||||||
combine({((item.values() | list)[0].values() | list)[0]:
|
((item.values() | list)[0].values() | list)[0]:
|
||||||
((item.values() | list)[0].values() | list)[1]})
|
((item.values() | list)[0].values() | list)[1]})
|
||||||
}}
|
}}
|
||||||
loop: "{{ ovfenv.matches }}"
|
loop: "{{ property_section.matches }}"
|
||||||
no_log: true
|
loop_control:
|
||||||
|
label: "{{ ((item.values() | list)[0].values() | list)[0] }}"
|
||||||
|
|||||||
@@ -0,0 +1,30 @@
|
|||||||
|
- name: Configure clusterctl
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: clusterctl.j2
|
||||||
|
dest: /opt/metacluster/cluster-api/clusterctl.yaml
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
version:
|
||||||
|
base: "{{ components.clusterapi.management.version.base }}"
|
||||||
|
cert_manager: "{{ components.clusterapi.management.version.cert_manager }}"
|
||||||
|
infrastructure_vsphere: "{{ components.clusterapi.management.version.infrastructure_vsphere }}"
|
||||||
|
hv:
|
||||||
|
fqdn: "{{ vapp['hv.fqdn'] }}"
|
||||||
|
tlsthumbprint: "{{ tls_thumbprint.stdout }}"
|
||||||
|
username: "{{ vapp['hv.username'] }}"
|
||||||
|
password: "{{ vapp['hv.password'] }}"
|
||||||
|
datacenter: "{{ vcenter_info.datacenter }}"
|
||||||
|
datastore: "{{ vcenter_info.datastore }}"
|
||||||
|
network: "{{ vcenter_info.network }}"
|
||||||
|
resourcepool: "{{ vcenter_info.resourcepool }}"
|
||||||
|
folder: "{{ vcenter_info.folder }}"
|
||||||
|
cluster:
|
||||||
|
nodetemplate: "{{ (components.clusterapi.workload.node_template.name | split('.'))[:-1] | join('.') }}"
|
||||||
|
publickey: "{{ vapp['guestinfo.rootsshkey'] }}"
|
||||||
|
version: "{{ components.clusterapi.workload.version.k8s }}"
|
||||||
|
vip: "{{ vapp['workloadcluster.vip'] }}"
|
||||||
|
|
||||||
|
- name: Initialize Cluster API management cluster
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: clusterctl init -v5 -i vsphere:{{ components.clusterapi.management.version.infrastructure_vsphere }} --config ./clusterctl.yaml --kubeconfig {{ kubeconfig.path }}
|
||||||
|
chdir: /opt/metacluster/cluster-api
|
||||||
@@ -0,0 +1,57 @@
|
|||||||
|
- name: Gather hypervisor details
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: govc ls -L {{ item.moref }} | awk -F/ '{print ${{ item.part }}}'
|
||||||
|
environment:
|
||||||
|
GOVC_INSECURE: '1'
|
||||||
|
GOVC_URL: "{{ vapp['hv.fqdn'] }}"
|
||||||
|
GOVC_USERNAME: "{{ vapp['hv.username'] }}"
|
||||||
|
GOVC_PASSWORD: "{{ vapp['hv.password'] }}"
|
||||||
|
register: govc_inventory
|
||||||
|
loop:
|
||||||
|
- attribute: cluster
|
||||||
|
moref: >-
|
||||||
|
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
||||||
|
jq -r '.[] | select(.Name == "runtime").Val.Host | .Type + ":" + .Value')
|
||||||
|
part: (NF-1)
|
||||||
|
- attribute: datacenter
|
||||||
|
moref: VirtualMachine:{{ moref_id }}
|
||||||
|
part: 2
|
||||||
|
- attribute: datastore
|
||||||
|
moref: >-
|
||||||
|
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
||||||
|
jq -r '.[] | select(.Name == "datastore").Val.ManagedObjectReference | .[].Type + ":" + .[].Value')
|
||||||
|
part: NF
|
||||||
|
- attribute: folder
|
||||||
|
moref: >-
|
||||||
|
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
||||||
|
jq -r '.[] | select(.Name == "parent").Val | .Type + ":" + .Value')
|
||||||
|
part: 0
|
||||||
|
# - attribute: host
|
||||||
|
# moref: >-
|
||||||
|
# $(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
||||||
|
# jq -r '.[] | select(.Name == "runtime").Val.Host | .Type + ":" + .Value')
|
||||||
|
# part: NF
|
||||||
|
- attribute: network
|
||||||
|
moref: >-
|
||||||
|
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
||||||
|
jq -r '.[] | select(.Name == "network").Val.ManagedObjectReference | .[].Type + ":" + .[].Value')
|
||||||
|
part: NF
|
||||||
|
- attribute: resourcepool
|
||||||
|
moref: >-
|
||||||
|
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
||||||
|
jq -r '.[] | select(.Name == "resourcePool").Val | .Type + ":" + .Value')
|
||||||
|
part: 0
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.attribute }}"
|
||||||
|
|
||||||
|
- name: Retrieve hypervisor TLS thumbprint
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: openssl s_client -connect {{ vapp['hv.fqdn'] }}:443 < /dev/null 2>/dev/null | openssl x509 -fingerprint -noout -in /dev/stdin | awk -F'=' '{print $2}'
|
||||||
|
register: tls_thumbprint
|
||||||
|
|
||||||
|
- name: Store hypervisor details in dictionary
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
vcenter_info: "{{ vcenter_info | default({}) | combine({ item.item.attribute : item.stdout }) }}"
|
||||||
|
loop: "{{ govc_inventory.results }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.item.attribute }}"
|
||||||
@@ -0,0 +1,3 @@
|
|||||||
|
- import_tasks: hypervisor.yml
|
||||||
|
- import_tasks: clusterapi.yml
|
||||||
|
- import_tasks: nodetemplates.yml
|
||||||
@@ -0,0 +1,68 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Check for existing templates on hypervisor
|
||||||
|
community.vmware.vmware_guest_info:
|
||||||
|
name: "{{ (item | basename | split('.'))[:-1] | join('.') }}"
|
||||||
|
register: existing_ova
|
||||||
|
loop: "{{ query('ansible.builtin.fileglob', '/opt/workloadcluster/node-templates/*.ova') | sort }}"
|
||||||
|
ignore_errors: yes
|
||||||
|
|
||||||
|
- name: Parse OVA files for network mappings
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: govc import.spec -json {{ item }}
|
||||||
|
environment:
|
||||||
|
GOVC_INSECURE: '1'
|
||||||
|
GOVC_URL: "{{ vapp['hv.fqdn'] }}"
|
||||||
|
GOVC_USERNAME: "{{ vapp['hv.username'] }}"
|
||||||
|
GOVC_PASSWORD: "{{ vapp['hv.password'] }}"
|
||||||
|
register: ova_spec
|
||||||
|
when: existing_ova.results[index] is failed
|
||||||
|
loop: "{{ query('ansible.builtin.fileglob', '/opt/workloadcluster/node-templates/*.ova') | sort }}"
|
||||||
|
loop_control:
|
||||||
|
index_var: index
|
||||||
|
|
||||||
|
- name: Deploy OVA templates on hypervisor
|
||||||
|
community.vmware.vmware_deploy_ovf:
|
||||||
|
cluster: "{{ vcenter_info.cluster }}"
|
||||||
|
datastore: "{{ vcenter_info.datastore }}"
|
||||||
|
folder: "{{ vcenter_info.folder }}"
|
||||||
|
name: "{{ (item | basename | split('.'))[:-1] | join('.') }}"
|
||||||
|
networks: "{u'{{ ova_spec.results[index].stdout | from_json | json_query('NetworkMapping[0].Name') }}':u'{{ vcenter_info.network }}'}"
|
||||||
|
allow_duplicates: no
|
||||||
|
power_on: false
|
||||||
|
ovf: "{{ item }}"
|
||||||
|
register: ova_deploy
|
||||||
|
when: existing_ova.results[index] is failed
|
||||||
|
loop: "{{ query('ansible.builtin.fileglob', '/opt/workloadcluster/node-templates/*.ova') | sort }}"
|
||||||
|
loop_control:
|
||||||
|
index_var: index
|
||||||
|
|
||||||
|
- name: Create snapshot on deployed VM's
|
||||||
|
community.vmware.vmware_guest_snapshot:
|
||||||
|
folder: "{{ vcenter_info.folder }}"
|
||||||
|
name: "{{ item.instance.hw_name }}"
|
||||||
|
state: present
|
||||||
|
snapshot_name: "{{ ansible_date_time.iso8601_basic_short }}-base"
|
||||||
|
when: ova_deploy.results[index] is not skipped
|
||||||
|
loop: "{{ ova_deploy.results }}"
|
||||||
|
loop_control:
|
||||||
|
index_var: index
|
||||||
|
label: "{{ item.item }}"
|
||||||
|
|
||||||
|
- name: Mark deployed VM's as templates
|
||||||
|
community.vmware.vmware_guest:
|
||||||
|
name: "{{ item.instance.hw_name }}"
|
||||||
|
is_template: yes
|
||||||
|
when: ova_deploy.results[index] is not skipped
|
||||||
|
loop: "{{ ova_deploy.results }}"
|
||||||
|
loop_control:
|
||||||
|
index_var: index
|
||||||
|
label: "{{ item.item }}"
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
group/vmware:
|
||||||
|
hostname: "{{ vapp['hv.fqdn'] }}"
|
||||||
|
validate_certs: no
|
||||||
|
username: "{{ vapp['hv.username'] }}"
|
||||||
|
password: "{{ vapp['hv.password'] }}"
|
||||||
|
datacenter: "{{ vcenter_info.datacenter }}"
|
||||||
@@ -0,0 +1,28 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: ApplicationSet
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.name }}
|
||||||
|
namespace: {{ _template.namespace }}
|
||||||
|
spec:
|
||||||
|
generators:
|
||||||
|
- git:
|
||||||
|
repoURL: ssh://git@gitea-ssh.gitea.svc.cluster.local/mc/GitOps.Config.git
|
||||||
|
revision: HEAD
|
||||||
|
directories:
|
||||||
|
- path: metacluster-applicationset/*
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
name: {% raw %}'{{ path.basename }}'{% endraw +%}
|
||||||
|
spec:
|
||||||
|
project: default
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: true
|
||||||
|
source:
|
||||||
|
repoURL: ssh://git@gitea-ssh.gitea.svc.cluster.local/mc/GitOps.Config.git
|
||||||
|
targetRevision: HEAD
|
||||||
|
path: {% raw %}'{{ path }}'{% endraw +%}
|
||||||
|
destination:
|
||||||
|
server: https://kubernetes.default.svc
|
||||||
|
namespace: default
|
||||||
@@ -0,0 +1,38 @@
|
|||||||
|
providers:
|
||||||
|
- name: "kubeadm"
|
||||||
|
url: "/opt/metacluster/cluster-api/bootstrap-kubeadm/{{ _template.version.base }}/bootstrap-components.yaml"
|
||||||
|
type: "BootstrapProvider"
|
||||||
|
- name: "cluster-api"
|
||||||
|
url: "/opt/metacluster/cluster-api/cluster-api/{{ _template.version.base }}/core-components.yaml"
|
||||||
|
type: "CoreProvider"
|
||||||
|
- name: "kubeadm"
|
||||||
|
url: "/opt/metacluster/cluster-api/control-plane-kubeadm/{{ _template.version.base }}/control-plane-components.yaml"
|
||||||
|
type: "ControlPlaneProvider"
|
||||||
|
- name: "vsphere"
|
||||||
|
url: "/opt/metacluster/cluster-api/infrastructure-vsphere/{{ _template.version.infrastructure_vsphere }}/infrastructure-components.yaml"
|
||||||
|
type: "InfrastructureProvider"
|
||||||
|
|
||||||
|
cert-manager:
|
||||||
|
url: "/opt/metacluster/cluster-api/cert-manager/{{ _template.version.cert_manager }}/cert-manager.yaml"
|
||||||
|
|
||||||
|
## -- Controller settings -- ##
|
||||||
|
VSPHERE_SERVER: "{{ _template.hv.fqdn }}"
|
||||||
|
VSPHERE_TLS_THUMBPRINT: "{{ _template.hv.tlsthumbprint }}"
|
||||||
|
VSPHERE_USERNAME: "{{ _template.hv.username }}"
|
||||||
|
VSPHERE_PASSWORD: "{{ _template.hv.password }}"
|
||||||
|
|
||||||
|
## -- Required workload cluster default settings -- ##
|
||||||
|
VSPHERE_DATACENTER: "{{ _template.hv.datacenter }}"
|
||||||
|
VSPHERE_DATASTORE: "{{ _template.hv.datastore }}"
|
||||||
|
VSPHERE_STORAGE_POLICY: ""
|
||||||
|
VSPHERE_NETWORK: "{{ _template.hv.network }}"
|
||||||
|
VSPHERE_RESOURCE_POOL: "{{ _template.hv.resourcepool }}"
|
||||||
|
VSPHERE_FOLDER: "{{ _template.hv.folder }}"
|
||||||
|
|
||||||
|
VSPHERE_TEMPLATE: "{{ _template.cluster.nodetemplate }}"
|
||||||
|
VSPHERE_SSH_AUTHORIZED_KEY: "{{ _template.cluster.publickey }}"
|
||||||
|
|
||||||
|
KUBERNETES_VERSION: "{{ _template.cluster.version }}"
|
||||||
|
CONTROL_PLANE_ENDPOINT_IP: "{{ _template.cluster.vip }}"
|
||||||
|
VIP_NETWORK_INTERFACE: "eth0"
|
||||||
|
EXP_CLUSTER_RESOURCE_SET: "true"
|
||||||
@@ -0,0 +1,10 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
# Change working directory
|
||||||
|
pushd {{ _template.service.workingdir }}
|
||||||
|
|
||||||
|
# Compress *.tar files
|
||||||
|
if tar -czf image-tarballs.tgz *.tar --remove-files; then
|
||||||
|
# Disable systemd unit
|
||||||
|
systemctl disable {{ _template.service.name }}
|
||||||
|
fi
|
||||||
@@ -0,0 +1,14 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: ConfigMap
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.name }}
|
||||||
|
namespace: {{ _template.namespace }}
|
||||||
|
annotations:
|
||||||
|
{{ _template.annotations }}
|
||||||
|
labels:
|
||||||
|
{{ _template.labels }}
|
||||||
|
data:
|
||||||
|
{% for kv_pair in _template.data %}
|
||||||
|
"{{ kv_pair.key }}": |
|
||||||
|
{{ kv_pair.value | indent(width=4, first=True) }}
|
||||||
|
{% endfor %}
|
||||||
@@ -0,0 +1,13 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.name }}-{{ _template.uid }}
|
||||||
|
namespace: {{ _template.namespace }}
|
||||||
|
labels:
|
||||||
|
argocd.argoproj.io/secret-type: repository
|
||||||
|
stringData:
|
||||||
|
url: ssh://git@gitea-ssh.gitea.svc.cluster.local/mc/GitOps.Config.git
|
||||||
|
name: {{ _template.name }}
|
||||||
|
insecure: 'true'
|
||||||
|
sshPrivateKey: |
|
||||||
|
{{ _template.privatekey }}
|
||||||
@@ -0,0 +1,7 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.name }}
|
||||||
|
namespace: {{ _template.namespace }}
|
||||||
|
spec:
|
||||||
|
{{ _template.config }}
|
||||||
@@ -0,0 +1,7 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: IngressRouteTCP
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.name }}
|
||||||
|
namespace: {{ _template.namespace }}
|
||||||
|
spec:
|
||||||
|
{{ _template.config }}
|
||||||
@@ -0,0 +1,31 @@
|
|||||||
|
mirrors:
|
||||||
|
cr.step.cm:
|
||||||
|
endpoint:
|
||||||
|
- https://registry.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
rewrite:
|
||||||
|
"(.*)": "library/cr.step.sm/$1"
|
||||||
|
docker.io:
|
||||||
|
endpoint:
|
||||||
|
- https://registry.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
rewrite:
|
||||||
|
"(.*)": "library/docker.io/$1"
|
||||||
|
gcr.io:
|
||||||
|
endpoint:
|
||||||
|
- https://registry.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
rewrite:
|
||||||
|
"(.*)": "library/gcr.io/$1"
|
||||||
|
ghcr.io:
|
||||||
|
endpoint:
|
||||||
|
- https://registry.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
rewrite:
|
||||||
|
"(.*)": "library/ghcr.io/$1"
|
||||||
|
k8s.gcr.io:
|
||||||
|
endpoint:
|
||||||
|
- https://registry.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
rewrite:
|
||||||
|
"(.*)": "library/k8s.gcr.io/$1"
|
||||||
|
quay.io:
|
||||||
|
endpoint:
|
||||||
|
- https://registry.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
rewrite:
|
||||||
|
"(.*)": "library/quay.io/$1"
|
||||||
@@ -0,0 +1,9 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.name }}
|
||||||
|
namespace: {{ _template.namespace }}
|
||||||
|
data:
|
||||||
|
{% for kv_pair in _template.data %}
|
||||||
|
"{{ kv_pair.key }}": {{ kv_pair.value }}
|
||||||
|
{% endfor %}
|
||||||
@@ -0,0 +1,9 @@
|
|||||||
|
[Unit]
|
||||||
|
Description={{ _template.service.name }}
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
ExecStart={{ _template.service.executable }}
|
||||||
|
Nice=10
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
||||||
@@ -0,0 +1,42 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
export TERM=linux
|
||||||
|
|
||||||
|
BGRN='\033[1;92m'
|
||||||
|
BGRY='\033[1;30m'
|
||||||
|
BBLU='\033[1;34m'
|
||||||
|
BRED='\033[1;91m'
|
||||||
|
BWHI='\033[1;97m'
|
||||||
|
CBLA='\033[?16;0;30c' # Hide blinking cursor
|
||||||
|
DFLT='\033[0m' # Reset colour
|
||||||
|
LCLR='\033[K' # Clear to end of line
|
||||||
|
PRST='\033[0;0H' # Reset cursor position
|
||||||
|
|
||||||
|
# COMPONENTS=('ca' 'ingress' 'storage' 'registry' 'git' 'gitops')
|
||||||
|
COMPONENTS=('ca' 'storage' 'registry' 'git' 'gitops')
|
||||||
|
FQDN='{{ vapp['metacluster.fqdn'] }}'
|
||||||
|
IPADDRESS='{{ vapp['guestinfo.ipaddress'] }}'
|
||||||
|
|
||||||
|
# Waiting to allow boot sequence to finish; crude!
|
||||||
|
sleep 30
|
||||||
|
clear > /dev/tty1
|
||||||
|
|
||||||
|
while /bin/true; do
|
||||||
|
echo -e "${PRST}" > /dev/tty1
|
||||||
|
echo -e "\n\n\t${DFLT}To manage this appliance, please connect to one of the following:${LCLR}\n" > /dev/tty1
|
||||||
|
|
||||||
|
for c in "${COMPONENTS[@]}"; do
|
||||||
|
STATUS=$(curl -ks "https://${c}.${FQDN}" -o /dev/null -w '%{http_code}')
|
||||||
|
|
||||||
|
if [[ "${STATUS}" -eq "200" ]]; then
|
||||||
|
echo -e "\t [${BGRN}+${DFLT}] ${BBLU}https://${c}.${FQDN}${DFLT}${LCLR}" > /dev/tty1
|
||||||
|
else
|
||||||
|
echo -e "\t [${BRED}-${DFLT}] ${BBLU}https://${c}.${FQDN}${DFLT}${LCLR}" > /dev/tty1
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
echo -e "\n\t${BGRY}Note that your DNS zone ${DFLT}must have${BGRY} respective records defined,\n\teach pointing to: ${DFLT}${IPADDRESS}${LCLR}" > /dev/tty1
|
||||||
|
|
||||||
|
echo -e "${CBLA}" > /dev/tty1
|
||||||
|
sleep 1
|
||||||
|
done
|
||||||
@@ -2,6 +2,7 @@
|
|||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: /opt/firstboot
|
path: /opt/firstboot
|
||||||
state: directory
|
state: directory
|
||||||
|
|
||||||
- name: Create firstboot script file
|
- name: Create firstboot script file
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: firstboot.j2
|
src: firstboot.j2
|
||||||
@@ -9,11 +10,13 @@
|
|||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
mode: o+x
|
mode: o+x
|
||||||
|
|
||||||
- name: Create @reboot crontab job
|
- name: Create @reboot crontab job
|
||||||
ansible.builtin.cron:
|
ansible.builtin.cron:
|
||||||
name: firstboot
|
name: firstboot
|
||||||
special_time: reboot
|
special_time: reboot
|
||||||
job: "/opt/firstboot/firstboot.sh"
|
job: "/opt/firstboot/firstboot.sh >/dev/tty1 2>&1"
|
||||||
|
|
||||||
- name: Copy payload folder
|
- name: Copy payload folder
|
||||||
ansible.builtin.copy:
|
ansible.builtin.copy:
|
||||||
src: ansible_payload/
|
src: ansible_payload/
|
||||||
@@ -21,6 +24,3 @@
|
|||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
mode: '0644'
|
mode: '0644'
|
||||||
- name: Install ansible-galaxy collection
|
|
||||||
ansible.builtin.shell:
|
|
||||||
cmd: ansible-galaxy collection install community.general
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
#!/bin/bash
|
#!/bin/bash
|
||||||
|
|
||||||
# Apply firstboot configuration w/ ansible
|
# Apply firstboot configuration w/ ansible
|
||||||
/usr/local/bin/ansible-playbook /opt/firstboot/ansible/playbook.yml | tee -a /var/log/firstboot.log > /dev/tty1
|
/usr/local/bin/ansible-playbook /opt/firstboot/ansible/playbook.yml | tee -a /var/log/firstboot.log > /dev/tty1 2>&1
|
||||||
|
|||||||
@@ -1,6 +0,0 @@
|
|||||||
- name: Install ansible (w/ dependencies)
|
|
||||||
ansible.builtin.pip:
|
|
||||||
name: "{{ item }}"
|
|
||||||
executable: pip3
|
|
||||||
state: latest
|
|
||||||
loop: "{{ pip_packages }}"
|
|
||||||
@@ -3,6 +3,7 @@
|
|||||||
name: cloud-init
|
name: cloud-init
|
||||||
state: absent
|
state: absent
|
||||||
purge: yes
|
purge: yes
|
||||||
|
|
||||||
- name: Delete cloud-init files
|
- name: Delete cloud-init files
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: "{{ item }}"
|
path: "{{ item }}"
|
||||||
|
|||||||
@@ -15,6 +15,3 @@
|
|||||||
|
|
||||||
- name: Install packages
|
- name: Install packages
|
||||||
import_tasks: packages.yml
|
import_tasks: packages.yml
|
||||||
|
|
||||||
- name: Install ansible
|
|
||||||
import_tasks: ansible.yml
|
|
||||||
|
|||||||
@@ -1,14 +1,36 @@
|
|||||||
|
- name: Configure 'needrestart' package
|
||||||
|
ansible.builtin.lineinfile:
|
||||||
|
path: /etc/needrestart/needrestart.conf
|
||||||
|
regexp: "{{ item.regexp }}"
|
||||||
|
line: "{{ item.line }}"
|
||||||
|
loop:
|
||||||
|
- regexp: "^#\\$nrconf\\{restart\\} = 'i';"
|
||||||
|
line: "$nrconf{restart} = 'a';"
|
||||||
|
- regexp: "^#\\$nrconf\\{kernelhints\\} = -1;"
|
||||||
|
line: "$nrconf{kernelhints} = -1;"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.line }}"
|
||||||
|
|
||||||
- name: Install additional packages
|
- name: Install additional packages
|
||||||
ansible.builtin.apt:
|
ansible.builtin.apt:
|
||||||
name: "{{ item }}"
|
pkg: "{{ packages.apt }}"
|
||||||
state: latest
|
state: latest
|
||||||
update_cache: yes
|
update_cache: yes
|
||||||
loop: "{{ packages }}"
|
install_recommends: no
|
||||||
|
|
||||||
- name: Upgrade all packages
|
- name: Upgrade all packages
|
||||||
ansible.builtin.apt:
|
ansible.builtin.apt:
|
||||||
name: "*"
|
name: '*'
|
||||||
state: latest
|
state: latest
|
||||||
update_cache: yes
|
update_cache: yes
|
||||||
|
|
||||||
|
- name: Install additional python packages
|
||||||
|
ansible.builtin.pip:
|
||||||
|
name: "{{ item }}"
|
||||||
|
executable: pip3
|
||||||
|
state: latest
|
||||||
|
loop: "{{ packages.pip }}"
|
||||||
|
|
||||||
- name: Cleanup
|
- name: Cleanup
|
||||||
ansible.builtin.apt:
|
ansible.builtin.apt:
|
||||||
autoremove: yes
|
autoremove: yes
|
||||||
|
|||||||
@@ -3,14 +3,17 @@
|
|||||||
name: snapd
|
name: snapd
|
||||||
state: absent
|
state: absent
|
||||||
purge: yes
|
purge: yes
|
||||||
|
|
||||||
- name: Delete leftover files
|
- name: Delete leftover files
|
||||||
ansible.builtin.file:
|
ansible.builtin.file:
|
||||||
path: /root/snap
|
path: /root/snap
|
||||||
state: absent
|
state: absent
|
||||||
|
|
||||||
- name: Hold snapd package
|
- name: Hold snapd package
|
||||||
ansible.builtin.dpkg_selections:
|
ansible.builtin.dpkg_selections:
|
||||||
name: snapd
|
name: snapd
|
||||||
selection: hold
|
selection: hold
|
||||||
|
|
||||||
- name: Reload systemd unit configurations
|
- name: Reload systemd unit configurations
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
daemon_reload: yes
|
daemon_reload: yes
|
||||||
|
|||||||
@@ -4,8 +4,13 @@
|
|||||||
regexp: "{{ item.regexp }}"
|
regexp: "{{ item.regexp }}"
|
||||||
line: "{{ item.line }}"
|
line: "{{ item.line }}"
|
||||||
loop:
|
loop:
|
||||||
- { regexp: '^#NAutoVTs=', line: 'NAutoVTs=1'}
|
- regexp: '^#NAutoVTs='
|
||||||
- { regexp: '^#ReserveVT=', line: 'ReserveVT=11'}
|
line: 'NAutoVTs=1'
|
||||||
|
- regexp: '^#ReserveVT='
|
||||||
|
line: 'ReserveVT=11'
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.line }}"
|
||||||
|
|
||||||
- name: Mask getty@tty1 service
|
- name: Mask getty@tty1 service
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: getty@tty1
|
name: getty@tty1
|
||||||
|
|||||||
@@ -1,11 +1,13 @@
|
|||||||
packages:
|
packages:
|
||||||
- jq
|
apt:
|
||||||
# (python3-*) Dependency for installation of Ansible
|
- jq
|
||||||
- python3-pip
|
- python3-pip
|
||||||
- python3-setuptools
|
pip:
|
||||||
- python3-wheel
|
# Some change causes high load during loops of importing/pushing container images
|
||||||
|
- ansible-core<2.14.0
|
||||||
pip_packages:
|
- jinja2
|
||||||
- pip
|
- lxml
|
||||||
- ansible-core
|
- markupsafe
|
||||||
- lxml
|
- pip
|
||||||
|
- setuptools
|
||||||
|
- wheel
|
||||||
|
|||||||
248
ansible/vars/metacluster.yml
Normal file
248
ansible/vars/metacluster.yml
Normal file
@@ -0,0 +1,248 @@
|
|||||||
|
platform:
|
||||||
|
|
||||||
|
k3s:
|
||||||
|
version: v1.24.1+k3s1
|
||||||
|
|
||||||
|
gitops:
|
||||||
|
repository:
|
||||||
|
uri: https://code.spamasaurus.com/djpbessems/GitOps.MetaCluster.git
|
||||||
|
# revision: v0.1.0
|
||||||
|
revision: HEAD
|
||||||
|
|
||||||
|
packaged_components:
|
||||||
|
- name: traefik
|
||||||
|
namespace: kube-system
|
||||||
|
config: |2
|
||||||
|
additionalArguments:
|
||||||
|
- "--certificatesResolvers.stepca.acme.caserver=https://step-certificates.step-ca.svc.cluster.local/acme/acme/directory"
|
||||||
|
- "--certificatesResolvers.stepca.acme.email=admin"
|
||||||
|
- "--certificatesResolvers.stepca.acme.storage=/data/acme.json"
|
||||||
|
- "--certificatesResolvers.stepca.acme.tlsChallenge=true"
|
||||||
|
- "--certificatesresolvers.stepca.acme.certificatesduration=24"
|
||||||
|
globalArguments: []
|
||||||
|
ingressRoute:
|
||||||
|
dashboard:
|
||||||
|
enabled: false
|
||||||
|
ports:
|
||||||
|
ssh:
|
||||||
|
port: 8022
|
||||||
|
protocol: TCP
|
||||||
|
web:
|
||||||
|
redirectTo: websecure
|
||||||
|
websecure:
|
||||||
|
tls:
|
||||||
|
certResolver: stepca
|
||||||
|
|
||||||
|
helm_repositories:
|
||||||
|
- name: argo
|
||||||
|
url: https://argoproj.github.io/argo-helm
|
||||||
|
- name: gitea-charts
|
||||||
|
url: https://dl.gitea.io/charts/
|
||||||
|
- name: harbor
|
||||||
|
url: https://helm.goharbor.io
|
||||||
|
- name: jetstack
|
||||||
|
url: https://charts.jetstack.io
|
||||||
|
- name: longhorn
|
||||||
|
url: https://charts.longhorn.io
|
||||||
|
- name: sealed-secrets
|
||||||
|
url: https://bitnami-labs.github.io/sealed-secrets
|
||||||
|
- name: smallstep
|
||||||
|
url: https://smallstep.github.io/helm-charts/
|
||||||
|
|
||||||
|
components:
|
||||||
|
|
||||||
|
argo-cd:
|
||||||
|
helm:
|
||||||
|
version: 4.9.7 # (= ArgoCD v2.4.2)
|
||||||
|
chart: argo/argo-cd
|
||||||
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
||||||
|
chart_values: !unsafe |
|
||||||
|
configs:
|
||||||
|
secret:
|
||||||
|
argocdServerAdminPassword: "{{ vapp['guestinfo.rootpw'] | password_hash('bcrypt') }}"
|
||||||
|
server:
|
||||||
|
extraArgs:
|
||||||
|
- --insecure
|
||||||
|
ingress:
|
||||||
|
enabled: true
|
||||||
|
hosts:
|
||||||
|
- gitops.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
|
||||||
|
cert-manager:
|
||||||
|
helm:
|
||||||
|
version: 1.10.1
|
||||||
|
chart: jetstack/cert-manager
|
||||||
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
||||||
|
# chart_values: !unsafe |
|
||||||
|
# installCRDs: true
|
||||||
|
|
||||||
|
clusterapi:
|
||||||
|
management:
|
||||||
|
version:
|
||||||
|
# Must match the version referenced at `dependencies.static_binaries[.filename==clusterctl].url`
|
||||||
|
base: v1.2.6
|
||||||
|
# Must match the version referenced at `components.cert-manager.helm.version`
|
||||||
|
cert_manager: v1.10.1
|
||||||
|
infrastructure_vsphere: v1.5.0
|
||||||
|
workload:
|
||||||
|
version:
|
||||||
|
k8s: v1.23.5
|
||||||
|
node_template:
|
||||||
|
# Refer to `https://github.com/kubernetes-sigs/cluster-api-provider-vsphere/blob/v1.3.5/README.md#kubernetes-versions-with-published-ovas` for a list of supported node templates
|
||||||
|
url: https://storage.googleapis.com/capv-images/release/v1.23.5/ubuntu-2004-kube-v1.23.5.ova
|
||||||
|
name: ubuntu-2004-kube-v1.23.5.ova
|
||||||
|
|
||||||
|
gitea:
|
||||||
|
helm:
|
||||||
|
version: v6.0.0 # (= Gitea v1.17.1)
|
||||||
|
chart: gitea-charts/gitea
|
||||||
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | sed '/:/!s/$/:latest/'
|
||||||
|
chart_values: !unsafe |
|
||||||
|
gitea:
|
||||||
|
admin:
|
||||||
|
username: administrator
|
||||||
|
password: "{{ vapp['guestinfo.rootpw'] }}"
|
||||||
|
email: admin@{{ vapp['metacluster.fqdn'] }}
|
||||||
|
config:
|
||||||
|
server:
|
||||||
|
OFFLINE_MODE: true
|
||||||
|
PROTOCOL: http
|
||||||
|
ROOT_URL: https://git.{{ vapp['metacluster.fqdn'] }}/
|
||||||
|
image:
|
||||||
|
pullPolicy: IfNotPresent
|
||||||
|
ingress:
|
||||||
|
enabled: true
|
||||||
|
hosts:
|
||||||
|
- host: git.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
paths:
|
||||||
|
- path: /
|
||||||
|
pathType: Prefix
|
||||||
|
service:
|
||||||
|
ssh:
|
||||||
|
type: ClusterIP
|
||||||
|
port: 22
|
||||||
|
clusterIP:
|
||||||
|
|
||||||
|
harbor:
|
||||||
|
helm:
|
||||||
|
version: 1.9.1 # (= Harbor v2.5.1)
|
||||||
|
chart: harbor/harbor
|
||||||
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
||||||
|
chart_values: !unsafe |
|
||||||
|
expose:
|
||||||
|
ingress:
|
||||||
|
annotations: {}
|
||||||
|
hosts:
|
||||||
|
core: registry.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
tls:
|
||||||
|
certSource: none
|
||||||
|
enabled: false
|
||||||
|
externalURL: https://registry.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
harborAdminPassword: "{{ vapp['guestinfo.rootpw'] }}"
|
||||||
|
notary:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
longhorn:
|
||||||
|
helm:
|
||||||
|
version: 1.3.0
|
||||||
|
chart: longhorn/longhorn
|
||||||
|
parse_logic: cat values.yaml | yq eval '.. | select(has("repository")) | .repository + ":" + .tag'
|
||||||
|
chart_values: !unsafe |
|
||||||
|
defaultSettings:
|
||||||
|
defaultDataPath: /mnt/blockstorage
|
||||||
|
defaultReplicaCount: 1
|
||||||
|
ingress:
|
||||||
|
enabled: true
|
||||||
|
host: storage.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
persistence:
|
||||||
|
defaultClassReplicaCount: 1
|
||||||
|
|
||||||
|
sealed-secrets:
|
||||||
|
helm:
|
||||||
|
version: 2.4.0 # (= SealedSecrets v0.18.1)
|
||||||
|
chart: sealed-secrets/sealed-secrets
|
||||||
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sort -u | awk '!/ /'
|
||||||
|
|
||||||
|
step-certificates:
|
||||||
|
helm:
|
||||||
|
version: 1.18.2+20220324
|
||||||
|
chart: smallstep/step-certificates
|
||||||
|
parse_logic: helm template . | yq --no-doc eval '.. | .image? | select(.)' | sed '/:/!s/$/:latest/' | sort -u
|
||||||
|
chart_values: !unsafe |
|
||||||
|
ca:
|
||||||
|
bootstrap:
|
||||||
|
postInitHook: |
|
||||||
|
echo '{{ vapp["guestinfo.rootpw"] }}' > ~/pwfile
|
||||||
|
step ca provisioner add acme \
|
||||||
|
--type ACME \
|
||||||
|
--password-file=~/pwfile \
|
||||||
|
--force-cn
|
||||||
|
rm ~/pwfile
|
||||||
|
dns: ca.{{ vapp['metacluster.fqdn'] }},step-certificates.step-ca.svc.cluster.local,127.0.0.1
|
||||||
|
password: "{{ vapp['guestinfo.rootpw'] }}"
|
||||||
|
provisioner:
|
||||||
|
name: admin
|
||||||
|
password: "{{ vapp['guestinfo.rootpw'] }}"
|
||||||
|
inject:
|
||||||
|
secrets:
|
||||||
|
ca_password: "{{ vapp['guestinfo.rootpw'] | b64encode }}"
|
||||||
|
provisioner_password: "{{ vapp['guestinfo.rootpw'] | b64encode }}"
|
||||||
|
service:
|
||||||
|
targetPort: 9000
|
||||||
|
|
||||||
|
dependencies:
|
||||||
|
|
||||||
|
ansible_galaxy_collections:
|
||||||
|
- ansible.posix
|
||||||
|
- ansible.utils
|
||||||
|
- community.crypto
|
||||||
|
- community.general
|
||||||
|
- community.vmware
|
||||||
|
- kubernetes.core
|
||||||
|
|
||||||
|
container_images:
|
||||||
|
- vmware/powerclicore:12.7
|
||||||
|
# The following list is generated by running the following commands:
|
||||||
|
# $ clusterctl init -i vsphere:<version> [...]
|
||||||
|
# $ clusterctl generate cluster <name> [...] | yq eval '.data.data' | yq --no-doc eval '.. | .image? | select(.)'
|
||||||
|
- quay.io/k8scsi/csi-node-driver-registrar:v2.0.1
|
||||||
|
- gcr.io/cloud-provider-vsphere/csi/release/driver:v2.1.0
|
||||||
|
- quay.io/k8scsi/livenessprobe:v2.1.0
|
||||||
|
- quay.io/k8scsi/csi-attacher:v3.0.0
|
||||||
|
- gcr.io/cloud-provider-vsphere/csi/release/driver:v2.1.0
|
||||||
|
- quay.io/k8scsi/livenessprobe:v2.1.0
|
||||||
|
- gcr.io/cloud-provider-vsphere/csi/release/syncer:v2.1.0
|
||||||
|
- quay.io/k8scsi/csi-provisioner:v2.0.0
|
||||||
|
- gcr.io/cloud-provider-vsphere/cpi/release/manager:v1.18.1
|
||||||
|
|
||||||
|
static_binaries:
|
||||||
|
- filename: clusterctl
|
||||||
|
url: https://github.com/kubernetes-sigs/cluster-api/releases/download/v1.2.6/clusterctl-linux-amd64
|
||||||
|
- filename: govc
|
||||||
|
url: https://github.com/vmware/govmomi/releases/download/v0.29.0/govc_Linux_x86_64.tar.gz
|
||||||
|
archive: compressed
|
||||||
|
- filename: helm
|
||||||
|
url: https://get.helm.sh/helm-v3.9.0-linux-amd64.tar.gz
|
||||||
|
archive: compressed
|
||||||
|
extra_opts: --strip-components=1
|
||||||
|
- filename: kubeseal
|
||||||
|
url: https://github.com/bitnami-labs/sealed-secrets/releases/download/v0.18.2/kubeseal-0.18.2-linux-amd64.tar.gz
|
||||||
|
archive: compressed
|
||||||
|
- filename: skopeo
|
||||||
|
url: https://code.spamasaurus.com/api/packages/djpbessems/generic/skopeo/v1.11.0-dev/skopeo
|
||||||
|
- filename: step
|
||||||
|
url: https://dl.step.sm/gh-release/cli/gh-release-header/v0.22.0/step_linux_0.22.0_amd64.tar.gz
|
||||||
|
archive: compressed
|
||||||
|
extra_opts: --strip-components=2
|
||||||
|
- filename: yq
|
||||||
|
url: http://github.com/mikefarah/yq/releases/download/v4.25.3/yq_linux_amd64
|
||||||
|
|
||||||
|
packages:
|
||||||
|
apt:
|
||||||
|
- lvm2
|
||||||
|
pip:
|
||||||
|
- jmespath
|
||||||
|
- kubernetes
|
||||||
|
- netaddr
|
||||||
|
- passlib
|
||||||
|
- pyvmomi
|
||||||
@@ -1,4 +1,4 @@
|
|||||||
iso_url = "sn.itch.fyi/Repository/iso/Canonical/Ubuntu%20Server%2020.04/ubuntu-20.04.4-live-server-amd64.iso"
|
iso_url = "sn.itch.fyi/Repository/iso/Canonical/Ubuntu%20Server%2022.04/ubuntu-22.04-live-server-amd64.iso"
|
||||||
iso_checksum = "sha256:28CCDB56450E643BAD03BB7BCF7507CE3D8D90E8BF09E38F6BD9AC298A98EAAD"
|
iso_checksum = "sha256:84AEAF7823C8C61BAA0AE862D0A06B03409394800000B3235854A6B38EB4856F"
|
||||||
// iso_url = "sn.itch.fyi/Repository/iso/Canonical/Ubuntu%20Server%2020.04/ubuntu-20.04.2-live-server-amd64.iso"
|
// iso_url = "sn.itch.fyi/Repository/iso/Canonical/Ubuntu%20Server%2020.04/ubuntu-20.04.2-live-server-amd64.iso"
|
||||||
// iso_checksum = "sha256:D1F2BF834BBE9BB43FAF16F9BE992A6F3935E65BE0EDECE1DEE2AA6EB1767423"
|
// iso_checksum = "sha256:D1F2BF834BBE9BB43FAF16F9BE992A6F3935E65BE0EDECE1DEE2AA6EB1767423"
|
||||||
|
|||||||
@@ -3,7 +3,7 @@ packer {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
source "vsphere-iso" "ubuntuserver" {
|
source "vsphere-iso" "k8sbootstrap" {
|
||||||
vcenter_server = var.vcenter_server
|
vcenter_server = var.vcenter_server
|
||||||
username = var.vsphere_username
|
username = var.vsphere_username
|
||||||
password = var.vsphere_password
|
password = var.vsphere_password
|
||||||
@@ -20,9 +20,9 @@ source "vsphere-iso" "ubuntuserver" {
|
|||||||
|
|
||||||
boot_order = "disk,cdrom"
|
boot_order = "disk,cdrom"
|
||||||
boot_command = [
|
boot_command = [
|
||||||
"<enter><wait2><enter><wait><f6><esc><wait>",
|
"e<down><down><down><end>",
|
||||||
" autoinstall<wait2> ds=nocloud;",
|
" autoinstall ds=nocloud;",
|
||||||
"<wait><enter>"
|
"<F10>"
|
||||||
]
|
]
|
||||||
boot_wait = "2s"
|
boot_wait = "2s"
|
||||||
|
|
||||||
@@ -34,22 +34,22 @@ source "vsphere-iso" "ubuntuserver" {
|
|||||||
ssh_pty = true
|
ssh_pty = true
|
||||||
|
|
||||||
CPUs = 2
|
CPUs = 2
|
||||||
RAM = 4096
|
RAM = 8192
|
||||||
|
|
||||||
network_adapters {
|
network_adapters {
|
||||||
network = var.vsphere_network
|
network = var.vsphere_network
|
||||||
network_card = "vmxnet3"
|
network_card = "vmxnet3"
|
||||||
}
|
}
|
||||||
storage {
|
storage {
|
||||||
disk_size = 20480
|
disk_size = 76800
|
||||||
disk_thin_provisioned = true
|
disk_thin_provisioned = true
|
||||||
}
|
}
|
||||||
disk_controller_type = ["pvscsi"]
|
disk_controller_type = ["pvscsi"]
|
||||||
usb_controller = ["xhci"]
|
usb_controller = ["xhci"]
|
||||||
|
|
||||||
cd_files = [
|
cd_files = [
|
||||||
"packer/preseed/UbuntuServer20.04/user-data",
|
"packer/preseed/UbuntuServer22.04/user-data",
|
||||||
"packer/preseed/UbuntuServer20.04/meta-data"
|
"packer/preseed/UbuntuServer22.04/meta-data"
|
||||||
]
|
]
|
||||||
cd_label = "cidata"
|
cd_label = "cidata"
|
||||||
iso_url = local.iso_authenticatedurl
|
iso_url = local.iso_authenticatedurl
|
||||||
@@ -60,18 +60,18 @@ source "vsphere-iso" "ubuntuserver" {
|
|||||||
|
|
||||||
export {
|
export {
|
||||||
images = false
|
images = false
|
||||||
output_directory = "/scratch/ubuntuserver"
|
output_directory = "/scratch/k8sbootstrap"
|
||||||
}
|
}
|
||||||
remove_cdrom = true
|
remove_cdrom = true
|
||||||
}
|
}
|
||||||
|
|
||||||
build {
|
build {
|
||||||
sources = [
|
sources = [
|
||||||
"source.vsphere-iso.ubuntuserver"
|
"source.vsphere-iso.k8sbootstrap"
|
||||||
]
|
]
|
||||||
|
|
||||||
provisioner "ansible" {
|
provisioner "ansible" {
|
||||||
only = ["vsphere-iso.ubuntuserver"]
|
pause_before = "2m30s"
|
||||||
|
|
||||||
playbook_file = "ansible/playbook.yml"
|
playbook_file = "ansible/playbook.yml"
|
||||||
user = "ubuntu"
|
user = "ubuntu"
|
||||||
@@ -80,21 +80,22 @@ build {
|
|||||||
]
|
]
|
||||||
use_proxy = "false"
|
use_proxy = "false"
|
||||||
extra_arguments = [
|
extra_arguments = [
|
||||||
"--extra-vars", "ansible_ssh_pass=${var.ssh_password}"
|
"--extra-vars", "ansible_ssh_pass=${var.ssh_password}",
|
||||||
|
"--extra-vars", "repo_username=${var.repo_username}",
|
||||||
|
"--extra-vars", "repo_password=${var.repo_password}"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
post-processor "shell-local" {
|
post-processor "shell-local" {
|
||||||
only = ["vsphere-iso.ubuntuserver"]
|
|
||||||
inline = [
|
inline = [
|
||||||
"pwsh -command \"& scripts/Update-OvfConfiguration.ps1 \\",
|
"pwsh -command \"& scripts/Update-OvfConfiguration.ps1 \\",
|
||||||
" -OVFFile '/scratch/ubuntuserver/${var.vm_guestos}-${var.vm_name}.ovf' \\",
|
" -OVFFile '/scratch/k8sbootstrap/${var.vm_guestos}-${var.vm_name}.ovf' \\",
|
||||||
" -Parameter @{'appliance.name'='${var.vm_guestos}';'appliance.version'='${var.vm_name}'}\"",
|
" -Parameter @{'appliance.name'='${var.vm_guestos}';'appliance.version'='${var.vm_name}'}\"",
|
||||||
"pwsh -file scripts/Update-Manifest.ps1 \\",
|
"pwsh -file scripts/Update-Manifest.ps1 \\",
|
||||||
" -ManifestFileName '/scratch/ubuntuserver/${var.vm_guestos}-${var.vm_name}.mf'",
|
" -ManifestFileName '/scratch/k8sbootstrap/${var.vm_guestos}-${var.vm_name}.mf'",
|
||||||
"ovftool --acceptAllEulas --allowExtraConfig --overwrite \\",
|
"ovftool --acceptAllEulas --allowExtraConfig --overwrite \\",
|
||||||
" '/scratch/ubuntuserver/${var.vm_guestos}-${var.vm_name}.ovf' \\",
|
" '/scratch/k8sbootstrap/${var.vm_guestos}-${var.vm_name}.ovf' \\",
|
||||||
" /output/Ubuntu-Server-20.04.ova"
|
" /output/Kubernetes.Bootstrap.Appliance.ova"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
0
packer/preseed/UbuntuServer22.04/meta-data
Normal file
0
packer/preseed/UbuntuServer22.04/meta-data
Normal file
@@ -11,6 +11,7 @@ autoinstall:
|
|||||||
ethernets:
|
ethernets:
|
||||||
ens192:
|
ens192:
|
||||||
dhcp4: true
|
dhcp4: true
|
||||||
|
dhcp-identifier: mac
|
||||||
storage:
|
storage:
|
||||||
layout:
|
layout:
|
||||||
name: direct
|
name: direct
|
||||||
@@ -1,9 +1,9 @@
|
|||||||
vcenter_server = "bv11-vc.bessems.lan"
|
vcenter_server = "bv11-vc.bessems.lan"
|
||||||
vsphere_username = "administrator@vsphere.local"
|
vsphere_username = "administrator@vsphere.local"
|
||||||
vsphere_datacenter = "DeSchakel"
|
vsphere_datacenter = "DeSchakel"
|
||||||
vsphere_cluster = "Cluster.Legacy"
|
vsphere_cluster = "Cluster.01"
|
||||||
vsphere_host = "bv11-esx.bessems.lan"
|
vsphere_host = "bv11-esx02.bessems.lan"
|
||||||
vsphere_datastore = "ESX00.SSD01"
|
vsphere_datastore = "NAS01.RAID5"
|
||||||
vsphere_folder = "/Packer"
|
vsphere_folder = "/Packer"
|
||||||
vsphere_templatefolder = "/Templates"
|
vsphere_templatefolder = "/Templates"
|
||||||
vsphere_network = "LAN"
|
vsphere_network = "LAN"
|
||||||
|
|||||||
@@ -1,35 +1,49 @@
|
|||||||
DeploymentConfigurations:
|
DeploymentConfigurations:
|
||||||
|
|
||||||
- Id: small
|
- Id: small
|
||||||
Label: 'Ubuntu Server 20.04 [SMALL: 1 vCPU/2GB RAM]'
|
Label: 'Ubuntu Server 22.04 [SMALL: 2 vCPU/4GB RAM]'
|
||||||
Description: Ubuntu Server 20.04.x
|
Description: Ubuntu Server 22.04.x
|
||||||
Size:
|
Size:
|
||||||
CPU: 1
|
CPU: 2
|
||||||
Memory: 2048
|
Memory: 4096
|
||||||
- Id: large
|
|
||||||
Label: 'Ubuntu Server 20.04 [LARGE: 4 vCPU/8GB RAM]'
|
- Id: medium
|
||||||
Description: Ubuntu Server 20.04.x
|
Label: 'Ubuntu Server 22.04 [MEDIUM: 4 vCPU/8GB RAM]'
|
||||||
|
Description: Ubuntu Server 22.04.x
|
||||||
Size:
|
Size:
|
||||||
CPU: 4
|
CPU: 4
|
||||||
Memory: 8192
|
Memory: 8192
|
||||||
DynamicDisks: []
|
|
||||||
|
DynamicDisks:
|
||||||
|
|
||||||
|
- Description: Longhorn persistent storage
|
||||||
|
UnitSize: GB
|
||||||
|
Constraints:
|
||||||
|
Minimum: 100
|
||||||
|
Maximum: ''
|
||||||
|
|
||||||
PropertyCategories:
|
PropertyCategories:
|
||||||
|
|
||||||
# - Name: 0) Deployment information
|
# - Name: 0) Deployment information
|
||||||
# ProductProperties:
|
# ProductProperties:
|
||||||
# - Key: deployment.type
|
# - Key: deployment.type
|
||||||
# Type: string
|
# Type: string
|
||||||
# Value:
|
# Value:
|
||||||
# - small
|
# - small
|
||||||
# - large
|
# - medium
|
||||||
# UserConfigurable: false
|
# UserConfigurable: false
|
||||||
- Name: 1) Operating System
|
|
||||||
|
- Name: 1) Meta-cluster
|
||||||
ProductProperties:
|
ProductProperties:
|
||||||
|
|
||||||
- Key: guestinfo.hostname
|
- Key: guestinfo.hostname
|
||||||
Type: string(1..15)
|
Type: string(1..15)
|
||||||
Label: Hostname*
|
Label: Hostname*
|
||||||
Description: '(max length: 15 characters)'
|
Description: ''
|
||||||
DefaultValue: ''
|
DefaultValue: 'META-NODE-{{ hostname.suffix }}'
|
||||||
Configurations: '*'
|
Configurations: '*'
|
||||||
UserConfigurable: true
|
UserConfigurable: true
|
||||||
|
|
||||||
- Key: guestinfo.rootpw
|
- Key: guestinfo.rootpw
|
||||||
Type: password(7..)
|
Type: password(7..)
|
||||||
Label: Local root password*
|
Label: Local root password*
|
||||||
@@ -37,22 +51,7 @@ PropertyCategories:
|
|||||||
DefaultValue: ''
|
DefaultValue: ''
|
||||||
Configurations: '*'
|
Configurations: '*'
|
||||||
UserConfigurable: true
|
UserConfigurable: true
|
||||||
- Key: guestinfo.rootsshkey
|
|
||||||
Type: password(1..)
|
|
||||||
Label: Local root SSH public key*
|
|
||||||
Description: This line should start with 'ssh-rsa AAAAB3N'
|
|
||||||
DefaultValue: ''
|
|
||||||
Configurations: '*'
|
|
||||||
UserConfigurable: true
|
|
||||||
- Key: guestinfo.ntpserver
|
|
||||||
Type: string(1..)
|
|
||||||
Label: Time server*
|
|
||||||
Description: A comma-separated list of timeservers
|
|
||||||
DefaultValue: 0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org
|
|
||||||
Configurations: '*'
|
|
||||||
UserConfigurable: true
|
|
||||||
- Name: 2) Networking
|
|
||||||
ProductProperties:
|
|
||||||
- Key: guestinfo.ipaddress
|
- Key: guestinfo.ipaddress
|
||||||
Type: ip
|
Type: ip
|
||||||
Label: IP Address*
|
Label: IP Address*
|
||||||
@@ -60,6 +59,7 @@ PropertyCategories:
|
|||||||
DefaultValue: ''
|
DefaultValue: ''
|
||||||
Configurations: '*'
|
Configurations: '*'
|
||||||
UserConfigurable: true
|
UserConfigurable: true
|
||||||
|
|
||||||
- Key: guestinfo.prefixlength
|
- Key: guestinfo.prefixlength
|
||||||
Type: int(8..32)
|
Type: int(8..32)
|
||||||
Label: Subnet prefix length*
|
Label: Subnet prefix length*
|
||||||
@@ -67,6 +67,15 @@ PropertyCategories:
|
|||||||
DefaultValue: '24'
|
DefaultValue: '24'
|
||||||
Configurations: '*'
|
Configurations: '*'
|
||||||
UserConfigurable: true
|
UserConfigurable: true
|
||||||
|
|
||||||
|
- Key: metacluster.fqdn
|
||||||
|
Type: string(1..)
|
||||||
|
Label: Appliance FQDN*
|
||||||
|
Description: Respective subdomains will be available for each component (e.g. storage.example.org); this address should already be configured as a wildcard record within your DNS zone.
|
||||||
|
DefaultValue: meta.k8s.cluster
|
||||||
|
Configurations: '*'
|
||||||
|
UserConfigurable: true
|
||||||
|
|
||||||
- Key: guestinfo.dnsserver
|
- Key: guestinfo.dnsserver
|
||||||
Type: ip
|
Type: ip
|
||||||
Label: DNS server*
|
Label: DNS server*
|
||||||
@@ -74,6 +83,7 @@ PropertyCategories:
|
|||||||
DefaultValue: ''
|
DefaultValue: ''
|
||||||
Configurations: '*'
|
Configurations: '*'
|
||||||
UserConfigurable: true
|
UserConfigurable: true
|
||||||
|
|
||||||
- Key: guestinfo.gateway
|
- Key: guestinfo.gateway
|
||||||
Type: ip
|
Type: ip
|
||||||
Label: Gateway*
|
Label: Gateway*
|
||||||
@@ -81,6 +91,80 @@ PropertyCategories:
|
|||||||
DefaultValue: ''
|
DefaultValue: ''
|
||||||
Configurations: '*'
|
Configurations: '*'
|
||||||
UserConfigurable: true
|
UserConfigurable: true
|
||||||
|
|
||||||
|
- Key: guestinfo.ntpserver
|
||||||
|
Type: string(1..)
|
||||||
|
Label: Time server*
|
||||||
|
Description: A comma-separated list of timeservers
|
||||||
|
DefaultValue: 0.pool.ntp.org,1.pool.ntp.org,2.pool.ntp.org
|
||||||
|
Configurations: '*'
|
||||||
|
UserConfigurable: true
|
||||||
|
|
||||||
|
- Name: 2) Workload-cluster
|
||||||
|
ProductProperties:
|
||||||
|
|
||||||
|
- Key: workloadcluster.vip
|
||||||
|
Type: ip
|
||||||
|
Label: Workload-cluster virtual IP*
|
||||||
|
Description: Workload-cluster control plane endpoint virtual IP
|
||||||
|
DefaultValue: ''
|
||||||
|
Configurations: '*'
|
||||||
|
UserConfigurable: true
|
||||||
|
|
||||||
|
- Key: ippool.startip
|
||||||
|
Type: ip
|
||||||
|
Label: Workload-cluster IP-pool start IP*
|
||||||
|
Description: All nodes for the workload-cluster will be provisioned within this IP pool
|
||||||
|
DefaultValue: ''
|
||||||
|
Configurations: '*'
|
||||||
|
UserConfigurable: true
|
||||||
|
|
||||||
|
- Key: ippool.endip
|
||||||
|
Type: ip
|
||||||
|
Label: Workload-cluster IP-pool end IP*
|
||||||
|
Description: All nodes for the workload-cluster will be provisioned within this IP pool
|
||||||
|
DefaultValue: ''
|
||||||
|
Configurations: '*'
|
||||||
|
UserConfigurable: true
|
||||||
|
|
||||||
|
- Name: 3) Common
|
||||||
|
ProductProperties:
|
||||||
|
|
||||||
|
- Key: guestinfo.rootsshkey
|
||||||
|
Type: password(1..)
|
||||||
|
Label: SSH public key*
|
||||||
|
Description: Authentication for any node (meta-cluster *and* workloadcluster); this line should start with 'ssh-rsa AAAAB3N'
|
||||||
|
DefaultValue: ''
|
||||||
|
Configurations: '*'
|
||||||
|
UserConfigurable: true
|
||||||
|
|
||||||
|
- Name: 4) Hypervisor
|
||||||
|
ProductProperties:
|
||||||
|
|
||||||
|
- Key: hv.fqdn
|
||||||
|
Type: string(1..)
|
||||||
|
Label: vCenter FQDN/IP-address*
|
||||||
|
Description: The address of the vCenter instance which this bootstrap appliance will interact with for provisioning new VM's.
|
||||||
|
DefaultValue: ''
|
||||||
|
Configurations: '*'
|
||||||
|
UserConfigurable: true
|
||||||
|
|
||||||
|
- Key: hv.username
|
||||||
|
Type: string(1..)
|
||||||
|
Label: vCenter username*
|
||||||
|
Description: The username which this bootstrap appliance will authenticate with to the vCenter instance.
|
||||||
|
DefaultValue: 'administrator@vsphere.local'
|
||||||
|
Configurations: '*'
|
||||||
|
UserConfigurable: true
|
||||||
|
|
||||||
|
- Key: hv.password
|
||||||
|
Type: password(1..)
|
||||||
|
Label: vCenter password*
|
||||||
|
Description: The password which this bootstrap appliance will authenticate with to the vCenter instance.
|
||||||
|
DefaultValue: ''
|
||||||
|
Configurations: '*'
|
||||||
|
UserConfigurable: true
|
||||||
|
|
||||||
AdvancedOptions:
|
AdvancedOptions:
|
||||||
- Key: appliance.name
|
- Key: appliance.name
|
||||||
Value: "{{ appliance.name }}"
|
Value: "{{ appliance.name }}"
|
||||||
@@ -91,6 +175,9 @@ AdvancedOptions:
|
|||||||
|
|
||||||
---
|
---
|
||||||
Variables:
|
Variables:
|
||||||
|
- Name: hostname.suffix
|
||||||
|
Expression: |
|
||||||
|
(-join ((48..57) + (97..122) | Get-Random -Count 5 | % {[char]$_})).ToUpper()
|
||||||
- Name: appliance.name
|
- Name: appliance.name
|
||||||
Expression: |
|
Expression: |
|
||||||
$Parameter['appliance.name']
|
$Parameter['appliance.name']
|
||||||
|
|||||||
Reference in New Issue
Block a user