Compare commits
366 Commits
b9575d2de4
...
Appliance.
| Author | SHA1 | Date | |
|---|---|---|---|
| 5740faeb9d | |||
| e057f313ea | |||
| ac38731dcf | |||
| 9cbb84a0f3 | |||
| 066ec9a967 | |||
| dda14af238 | |||
| 2db1c4d623 | |||
| 1451e8f105 | |||
| baf809159b | |||
| 066a21b1d2 | |||
| 46fe962e77 | |||
| 74070f266c | |||
| 20f28f7d8a | |||
| 2802b49d02 | |||
| 594e62cf71 | |||
| 544f98a8fb | |||
| 562e0b8167 | |||
| 88e37bb706 | |||
| 8323668aeb | |||
| afe29e3407 | |||
| 2473aa05dc | |||
| 7870ef8cf0 | |||
| e42479f214 | |||
| d459c98045 | |||
| bf7ccc8962 | |||
| 75309bdf11 | |||
| 1469ba08d8 | |||
| 8764634ea0 | |||
| 1b4c4b5d64 | |||
| 8c1016a231 | |||
| 663804e1b6 | |||
| 33ba3771cc | |||
| c05b58e93a | |||
| 29c89e16ee | |||
| 201c6f8bca | |||
| 67f91f2962 | |||
| be02f884ac | |||
| 8037d4d1c7 | |||
| d99fca654f | |||
| 7d431d88c3 | |||
| 691dcee21f | |||
| 95c14fc385 | |||
| 33cd272d53 | |||
| e46e5c0802 | |||
| 2d468d8b83 | |||
| f45b96f42b | |||
| 4dc5a6ed39 | |||
| 34af03ca99 | |||
| 55c594d242 | |||
| 8555e677b3 | |||
| 3cefd67458 | |||
| 1a0e674aa8 | |||
| 6e37fd756b | |||
| 6568acf541 | |||
| 092ce5eabc | |||
| a785e57126 | |||
| 71e9957122 | |||
| 877fc24235 | |||
| 778a7581c0 | |||
| d1bce54a2d | |||
| a8cb53429d | |||
| e1f83f2245 | |||
| 1cfca1fa4a | |||
| 27cb500b8c | |||
| 720bc43546 | |||
| 49b8b80db0 | |||
| 3bc3da54be | |||
| 8e7e23c8bc | |||
| e4cfc26e2c | |||
| 3b89aed52b | |||
| 5cdd6ef052 | |||
| ef8766b5ca | |||
| ab14a966e0 | |||
| f6961b5e3a | |||
| c1a8a35494 | |||
| ba7e233c27 | |||
| 8c6a9f38ba | |||
| bf3d7ed239 | |||
| 0509a7cb8a | |||
| 01601de897 | |||
| a2198f1109 | |||
| 7cc8fbbccb | |||
| da0558711c | |||
| 90082ca36a | |||
| b2ae56e54b | |||
| b21b8b5376 | |||
| 931eaf366c | |||
| 32dda728cb | |||
| 4c1f1fce5e | |||
| bb58e287b7 | |||
| ef58b823c2 | |||
| 5000c324e1 | |||
| 87e89cfa27 | |||
| ac5d3e3668 | |||
| 616f8b9a53 | |||
| 2c5e8e10b5 | |||
| 17ad64013a | |||
| eb2ada2164 | |||
| 3e3a92c344 | |||
| d86f70a458 | |||
| 436995accc | |||
| 0310bb9d1a | |||
| 21f03ba048 | |||
| b009395f62 | |||
| 2110eb9e2c | |||
| 423ecc2f95 | |||
| 1a1440f751 | |||
| b17501ee1d | |||
| 87eb5e0dd7 | |||
| f5ed60fa38 | |||
| eab5cfc688 | |||
| 05b271214c | |||
| 455a2e14be | |||
| f5154f6961 | |||
| 4bf5121086 | |||
| 393b1092e5 | |||
| 36c30ca646 | |||
| 8005b172a5 | |||
| 13f4965278 | |||
| 05f085aee7 | |||
| 072fc56050 | |||
| 5363eba1a3 | |||
| a245cc3d48 | |||
| 51c477fb07 | |||
| 1446cba537 | |||
| 0501a035f2 | |||
| 6e942af974 | |||
| 89874d57ce | |||
| 2b497d4653 | |||
| cfa4a5379a | |||
| a2c2766ff7 | |||
| 76d3b6c742 | |||
| a5248bd54c | |||
| cbedc9679f | |||
| 740b6b3dc9 | |||
| 0ba87988bc | |||
| aa14a8a3a8 | |||
| 1f55ff7cfa | |||
| ba4a0148ff | |||
| c177dbd03b | |||
| 2e8ce6cc00 | |||
| 7fd1cf73db | |||
| cf001cd0ce | |||
| 438b944011 | |||
| 679a9457b5 | |||
| 8b4a1e380c | |||
| 0468cd6269 | |||
| b808397d47 | |||
| 8fd0136bb7 | |||
| 479d896599 | |||
| 263f156eb1 | |||
| f1dfc83d7c | |||
| 5b950a3834 | |||
| 978f39d45b | |||
| 9b9ab6b784 | |||
| 24dca2755a | |||
| 0d1db2f29f | |||
| cce39a5bb7 | |||
| 823cc467fa | |||
| 9cb89bf055 | |||
| 358cbe39ea | |||
| 0fee2df2a6 | |||
| e4e58e4789 | |||
| 75158a8a5b | |||
| c83d541a0d | |||
| a46610f828 | |||
| fe5147bd2e | |||
| 6d168f0517 | |||
| 68445ee13f | |||
| 48c14afd0f | |||
| 31b21c9b7a | |||
| 2addda3f06 | |||
| e03cd20d65 | |||
| fd1c306061 | |||
| ca8044b4ab | |||
| 3c98e16e74 | |||
| 1860d8e2dd | |||
| 16fdd66328 | |||
| d73320da32 | |||
| 572b7df74c | |||
| ee08fd47b5 | |||
| 75277e285a | |||
| debe80a2a1 | |||
| 2534cea4a0 | |||
| 05c3a09ab3 | |||
| 2f91c0f7c3 | |||
| c385baf630 | |||
| 5c18869d60 | |||
| 1941e02d94 | |||
| 610495e424 | |||
| 4e6a0549b5 | |||
| db090ac564 | |||
| 2b56677e9a | |||
| 641ee2d9a7 | |||
| 979ac38794 | |||
| 86a0b684e2 | |||
| 56a33134a0 | |||
| 915660f618 | |||
| d0c4251e06 | |||
| 9ff0e09625 | |||
| 8e76617794 | |||
| 5a82c9e122 | |||
| cde92b4514 | |||
| 6942c33ae8 | |||
| 7ac4cc0914 | |||
| c054c76b60 | |||
| 25230fdda2 | |||
| 89cf69adc7 | |||
| 3f9fc4b7aa | |||
| 570047df3b | |||
| d187f60091 | |||
| 933615adeb | |||
| 1c60214f5a | |||
| 414b72bcb8 | |||
| 29396de154 | |||
| 5effe00c19 | |||
| 767be3b8f5 | |||
| eb2f491f72 | |||
| cd5fa89a0d | |||
| d7e8685225 | |||
| 5113dd5b6c | |||
| 89fd23f66a | |||
| fa0b72a903 | |||
| ec6f712427 | |||
| 1c19708855 | |||
| 942c13dde7 | |||
| 439223c56e | |||
| b644dc1a04 | |||
| 2de2259c76 | |||
| 214a3d189a | |||
| df91de5516 | |||
| 68f0524bda | |||
| ff555ce0de | |||
| ad0c511651 | |||
| bae9696023 | |||
| 23e1ec1e71 | |||
| 6bd49750a4 | |||
| daa7a240cc | |||
| c0b2857be1 | |||
| 925bc5be39 | |||
| b6a03484e1 | |||
| 462aebdf17 | |||
| 230dc5e0cd | |||
| f47777763a | |||
| cabf813daa | |||
| 5aa2141f84 | |||
| 70a4962afa | |||
| e8da87afd8 | |||
| 90efda336a | |||
| 8f17551d50 | |||
| 75e2250a50 | |||
| 6c9a8e4abd | |||
| 6940bdb1d3 | |||
| 64644d7eff | |||
| c9c8b79891 | |||
| 8aa42ffb67 | |||
| 0f335d6841 | |||
| 0170ee7944 | |||
| e0726f858c | |||
| b7a3669681 | |||
| 438b40dd53 | |||
| 9e7eaf2ff7 | |||
| 7931b1ed44 | |||
| b8cb76e7ac | |||
| 4d2513c1a5 | |||
| df069672f3 | |||
| 27106b1f34 | |||
| abcf530b49 | |||
| 1c950086fa | |||
| ede82ea7e7 | |||
| 6d5b8e2d96 | |||
| a020ac0e15 | |||
| f74d94a5e0 | |||
| d874da0cb3 | |||
| 07e95d82a2 | |||
| 5aecf61a01 | |||
| be4b6177f9 | |||
| aacfbfc2fa | |||
| 0c44f1fd54 | |||
| e5908fde1c | |||
| c793ced9f3 | |||
| 2870041530 | |||
| 9887faa7c4 | |||
| 51cabfa8d2 | |||
| 95f5750291 | |||
| e3ce60bcb4 | |||
| 79b794dba2 | |||
| 907ec8bf3b | |||
| a4db841a7a | |||
| 3f2f19b36a | |||
| 8a753daed7 | |||
| fdfe5f100b | |||
| 4bcb1198f3 | |||
| 64c2c35383 | |||
| e21b11a37a | |||
| dd802e0620 | |||
| 17cf7925d6 | |||
| 2b81d4caa0 | |||
| a4e243e882 | |||
| 2531a4fb5d | |||
| ca51303602 | |||
| e7d89006fc | |||
| 531ead868a | |||
| 3dec92a955 | |||
| d67bf86dab | |||
| 43d83e8e31 | |||
| 1428fe73f7 | |||
| cd308d116b | |||
| d915c21e44 | |||
| 89532ff7fb | |||
| 1f7fb31afe | |||
| 52fbc561dd | |||
| 849c86b22b | |||
| c1bff94cd1 | |||
| 8ba8b5aaab | |||
| f2dadb3e47 | |||
| 8e2df51993 | |||
| 2a9841fb0c | |||
| c2219a5ddc | |||
| 336150b00c | |||
| d1b1635942 | |||
| 62660c8d6c | |||
| 2a5a154df0 | |||
| 36e3a2b99f | |||
| 07b61d8bf3 | |||
| 3710f97b38 | |||
| 6c3867fb57 | |||
| edc19464e2 | |||
| 85dcbb73a4 | |||
| 9e63e243b8 | |||
| d343b84b30 | |||
| 31a91d826f | |||
| 3f24a4af1a | |||
| dc4fa31070 | |||
| d91acb9c0d | |||
| 9c6e1ff386 | |||
| f03e0c3bda | |||
| deb524d1f5 | |||
| 3674862ff4 | |||
| 08a543e27f | |||
| 0fd4cbb92f | |||
| 6c31038b1a | |||
| fdead3c41c | |||
| 3efee69602 | |||
| 0c8272c9e4 | |||
| fcb05e2e12 | |||
| 6de8ea3029 | |||
| 4b5acf5e95 | |||
| 5c68b87d67 | |||
| e538fce0f8 | |||
| b67bc43a70 | |||
| 78c1d7fb54 | |||
| ab5f082933 | |||
| e3f44fab0a | |||
| f68189e3b7 | |||
| f3224416cb | |||
| 96ee96b470 | |||
| a20cb4417c | |||
| 433a231487 | |||
| b890a03760 | |||
| 92eee0744e | |||
| 83ce1be8bf | |||
| a364a7c359 | |||
| edca98549c | |||
| 146887e9e1 | |||
| 9bfa6bf658 |
89
.drone.yml
89
.drone.yml
@@ -1,89 +0,0 @@
|
|||||||
kind: pipeline
|
|
||||||
type: kubernetes
|
|
||||||
name: 'Packer Build'
|
|
||||||
|
|
||||||
volumes:
|
|
||||||
- name: output
|
|
||||||
claim:
|
|
||||||
name: flexvolsmb-drone-output
|
|
||||||
- name: scratch
|
|
||||||
claim:
|
|
||||||
name: flexvolsmb-drone-scratch
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: Debugging information
|
|
||||||
image: bv11-cr01.bessems.eu/library/packer-extended
|
|
||||||
commands:
|
|
||||||
- ansible --version
|
|
||||||
- ovftool --version
|
|
||||||
- packer --version
|
|
||||||
- yamllint --version
|
|
||||||
- name: Kubernetes Bootstrap Appliance
|
|
||||||
image: bv11-cr01.bessems.eu/library/packer-extended
|
|
||||||
pull: always
|
|
||||||
commands:
|
|
||||||
- |
|
|
||||||
sed -i -e "s/<<img-password>>/$${SSH_PASSWORD}/g" \
|
|
||||||
packer/preseed/UbuntuServer22.04/user-data
|
|
||||||
- |
|
|
||||||
yamllint -d "{extends: relaxed, rules: {line-length: disable}}" \
|
|
||||||
ansible \
|
|
||||||
packer/preseed/UbuntuServer22.04/user-data \
|
|
||||||
scripts
|
|
||||||
- |
|
|
||||||
ansible-galaxy install \
|
|
||||||
-r ansible/requirements.yml
|
|
||||||
- |
|
|
||||||
packer init -upgrade \
|
|
||||||
./packer
|
|
||||||
- |
|
|
||||||
packer validate \
|
|
||||||
-var vm_name=$DRONE_BUILD_NUMBER-${DRONE_COMMIT_SHA:0:10} \
|
|
||||||
-var vm_guestos=k8sbootstrap \
|
|
||||||
-var repo_username=$${REPO_USERNAME} \
|
|
||||||
-var repo_password=$${REPO_PASSWORD} \
|
|
||||||
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
|
||||||
-var ssh_password=$${SSH_PASSWORD} \
|
|
||||||
./packer
|
|
||||||
- |
|
|
||||||
packer build \
|
|
||||||
-on-error=cleanup -timestamp-ui \
|
|
||||||
-var vm_name=$DRONE_BUILD_NUMBER-${DRONE_COMMIT_SHA:0:10} \
|
|
||||||
-var vm_guestos=k8sbootstrap \
|
|
||||||
-var repo_username=$${REPO_USERNAME} \
|
|
||||||
-var repo_password=$${REPO_PASSWORD} \
|
|
||||||
-var vsphere_password=$${VSPHERE_PASSWORD} \
|
|
||||||
-var ssh_password=$${SSH_PASSWORD} \
|
|
||||||
./packer
|
|
||||||
environment:
|
|
||||||
VSPHERE_PASSWORD:
|
|
||||||
from_secret: vsphere_password
|
|
||||||
SSH_PASSWORD:
|
|
||||||
from_secret: ssh_password
|
|
||||||
REPO_USERNAME:
|
|
||||||
from_secret: repo_username
|
|
||||||
REPO_PASSWORD:
|
|
||||||
from_secret: repo_password
|
|
||||||
# PACKER_LOG: 1
|
|
||||||
volumes:
|
|
||||||
- name: output
|
|
||||||
path: /output
|
|
||||||
- name: Remove temporary resources
|
|
||||||
image: bv11-cr01.bessems.eu/library/packer-extended
|
|
||||||
commands:
|
|
||||||
- |
|
|
||||||
pwsh -file scripts/Remove-Resources.ps1 \
|
|
||||||
-VMName $DRONE_BUILD_NUMBER-${DRONE_COMMIT_SHA:0:10} \
|
|
||||||
-VSphereFQDN 'bv11-vc.bessems.lan' \
|
|
||||||
-VSphereUsername 'administrator@vsphere.local' \
|
|
||||||
-VSpherePassword $${VSPHERE_PASSWORD}
|
|
||||||
environment:
|
|
||||||
VSPHERE_PASSWORD:
|
|
||||||
from_secret: vsphere_password
|
|
||||||
volumes:
|
|
||||||
- name: scratch
|
|
||||||
path: /scratch
|
|
||||||
when:
|
|
||||||
status:
|
|
||||||
- success
|
|
||||||
- failure
|
|
||||||
145
.gitea/workflows/actions.yaml
Normal file
145
.gitea/workflows/actions.yaml
Normal file
@@ -0,0 +1,145 @@
|
|||||||
|
name: Container & Helm chart
|
||||||
|
on: [push]
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
linting:
|
||||||
|
name: Linting
|
||||||
|
runs-on: dind-rootless
|
||||||
|
steps:
|
||||||
|
- name: Check out repository code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
- name: yamllint
|
||||||
|
uses: bewuethr/yamllint-action@v1
|
||||||
|
with:
|
||||||
|
config-file: .yamllint.yaml
|
||||||
|
|
||||||
|
semrel_dryrun:
|
||||||
|
name: Semantic Release (Dry-run)
|
||||||
|
runs-on: dind-rootless
|
||||||
|
outputs:
|
||||||
|
version: ${{ steps.sem_rel.outputs.version }}
|
||||||
|
steps:
|
||||||
|
- name: Check out repository code
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
- name: Setup Node
|
||||||
|
uses: actions/setup-node@v3
|
||||||
|
with:
|
||||||
|
node-version: 20
|
||||||
|
- name: Install dependencies
|
||||||
|
run: |
|
||||||
|
npm install \
|
||||||
|
semantic-release \
|
||||||
|
@semantic-release/commit-analyzer \
|
||||||
|
@semantic-release/exec
|
||||||
|
- name: Semantic Release (dry-run)
|
||||||
|
id: sem_rel
|
||||||
|
run: |
|
||||||
|
npx semantic-release \
|
||||||
|
--package @semantic-release/exec \
|
||||||
|
--package semantic-release \
|
||||||
|
--branches ${{ gitea.refname }} \
|
||||||
|
--tag-format 'v${version}' \
|
||||||
|
--dry-run \
|
||||||
|
--plugins @semantic-release/commit-analyzer,@semantic-release/exec \
|
||||||
|
--analyzeCommits @semantic-release/commit-analyzer \
|
||||||
|
--verifyRelease @semantic-release/exec \
|
||||||
|
--verifyReleaseCmd 'echo "version=${nextRelease.version}" >> $GITHUB_OUTPUT'
|
||||||
|
env:
|
||||||
|
GIT_CREDENTIALS: ${{ secrets.GIT_USERNAME }}:${{ secrets.GIT_APIKEY }}
|
||||||
|
- name: Assert semantic release output
|
||||||
|
run: |
|
||||||
|
[[ -z "${{ steps.sem_rel.outputs.version }}" ]] && {
|
||||||
|
echo 'No release tag - exiting'; exit 1
|
||||||
|
} || {
|
||||||
|
echo 'Release tag set correctly: ${{ steps.sem_rel.outputs.version }}'; exit 0
|
||||||
|
}
|
||||||
|
|
||||||
|
build_image:
|
||||||
|
name: Kubernetes Bootstrap Appliance
|
||||||
|
container: code.spamasaurus.com/djpbessems/packer-extended:1.3.0
|
||||||
|
runs-on: dind-rootless
|
||||||
|
needs: [semrel_dryrun, linting]
|
||||||
|
steps:
|
||||||
|
- name: Checkout
|
||||||
|
uses: actions/checkout@v4
|
||||||
|
- name: Parse Kubernetes version
|
||||||
|
uses: mikefarah/yq@master
|
||||||
|
id: get_k8sversion
|
||||||
|
with:
|
||||||
|
cmd: yq '.components.clusterapi.workload.version.k8s' ansible/vars/metacluster.yml
|
||||||
|
- name: Set up packer
|
||||||
|
uses: hashicorp/setup-packer@main
|
||||||
|
id: setup
|
||||||
|
with:
|
||||||
|
version: "latest"
|
||||||
|
- name: Prepare build environment
|
||||||
|
id: init
|
||||||
|
run: |
|
||||||
|
packer init -upgrade ./packer
|
||||||
|
|
||||||
|
ansible-galaxy collection install \
|
||||||
|
-r ansible/requirements.yml \
|
||||||
|
-p ./ansible/collections
|
||||||
|
|
||||||
|
echo "BUILD_COMMIT=$(echo ${{ gitea.sha }} | cut -c 1-10)" >> $GITHUB_ENV
|
||||||
|
echo "BUILD_SUFFIX=$(openssl rand -hex 3)" >> $GITHUB_ENV
|
||||||
|
- name: Validate packer template files
|
||||||
|
id: validate
|
||||||
|
run: |
|
||||||
|
packer validate \
|
||||||
|
-only=vsphere-iso.bootstrap \
|
||||||
|
-var vm_name=${{ gitea.run_number }}-${BUILD_COMMIT}-${BUILD_SUFFIX} \
|
||||||
|
-var docker_username=${{ secrets.DOCKER_USERNAME }} \
|
||||||
|
-var docker_password=${{ secrets.DOCKER_PASSWORD }} \
|
||||||
|
-var repo_username=${{ secrets.REPO_USERNAME }} \
|
||||||
|
-var repo_password=${{ secrets.REPO_PASSWORD }} \
|
||||||
|
-var ssh_password=${{ secrets.SSH_PASSWORD }} \
|
||||||
|
-var hv_password=${{ secrets.HV_PASSWORD }} \
|
||||||
|
-var k8s_version=${{ steps.get_k8sversion.outputs.result }} \
|
||||||
|
-var appliance_version=${{ needs.semrel_dryrun.outputs.version }} \
|
||||||
|
./packer
|
||||||
|
- name: Build packer template
|
||||||
|
run: |
|
||||||
|
packer build \
|
||||||
|
-on-error=cleanup -timestamp-ui \
|
||||||
|
-only=vsphere-iso.bootstrap \
|
||||||
|
-var vm_name=${{ gitea.run_number }}-${BUILD_COMMIT}-${BUILD_SUFFIX} \
|
||||||
|
-var docker_username=${{ secrets.DOCKER_USERNAME }} \
|
||||||
|
-var docker_password=${{ secrets.DOCKER_PASSWORD }} \
|
||||||
|
-var repo_username=${{ secrets.REPO_USERNAME }} \
|
||||||
|
-var repo_password=${{ secrets.REPO_PASSWORD }} \
|
||||||
|
-var ssh_password=${{ secrets.SSH_PASSWORD }} \
|
||||||
|
-var hv_password=${{ secrets.HV_PASSWORD }} \
|
||||||
|
-var k8s_version=${{ steps.get_k8sversion.outputs.result }} \
|
||||||
|
-var appliance_version=${{ needs.semrel_dryrun.outputs.version }} \
|
||||||
|
./packer
|
||||||
|
# env:
|
||||||
|
# PACKER_LOG: 1
|
||||||
|
|
||||||
|
# semrel:
|
||||||
|
# name: Semantic Release
|
||||||
|
# runs-on: dind-rootless
|
||||||
|
# needs: [build_container, build_chart]
|
||||||
|
# steps:
|
||||||
|
# - name: Check out repository code
|
||||||
|
# uses: actions/checkout@v3
|
||||||
|
# - name: Setup Node
|
||||||
|
# uses: actions/setup-node@v3
|
||||||
|
# with:
|
||||||
|
# node-version: 20
|
||||||
|
# - name: Install dependencies
|
||||||
|
# run: |
|
||||||
|
# npm install \
|
||||||
|
# semantic-release \
|
||||||
|
# @semantic-release/changelog \
|
||||||
|
# @semantic-release/commit-analyzer \
|
||||||
|
# @semantic-release/git \
|
||||||
|
# @semantic-release/release-notes-generator
|
||||||
|
# - name: Semantic Release
|
||||||
|
# run: |
|
||||||
|
# npx semantic-release \
|
||||||
|
# --branches ${{ gitea.refname }} \
|
||||||
|
# --tag-format 'v${version}' \
|
||||||
|
# --plugins @semantic-release/commit-analyzer,@semantic-release/release-notes-generator,@semantic-release/changelog,@semantic-release/git
|
||||||
|
# env:
|
||||||
|
# GIT_CREDENTIALS: ${{ secrets.GIT_USERNAME }}:${{ secrets.GIT_APIKEY }}
|
||||||
4
.gitignore
vendored
Normal file
4
.gitignore
vendored
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
**/hv.vcenter.yaml
|
||||||
|
**/ova.bootstrap.yaml
|
||||||
|
**/pb.secrets.yaml
|
||||||
|
**/pwdfile
|
||||||
4
.yamllint.yaml
Normal file
4
.yamllint.yaml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
extends: relaxed
|
||||||
|
|
||||||
|
rules:
|
||||||
|
line-length: disable
|
||||||
@@ -3,6 +3,7 @@
|
|||||||
gather_facts: false
|
gather_facts: false
|
||||||
vars_files:
|
vars_files:
|
||||||
- metacluster.yml
|
- metacluster.yml
|
||||||
|
- workloadcluster.yml
|
||||||
become: true
|
become: true
|
||||||
roles:
|
roles:
|
||||||
- os
|
- os
|
||||||
|
|||||||
@@ -1,4 +1,9 @@
|
|||||||
collections:
|
collections:
|
||||||
- ansible.utils
|
- name: https://github.com/ansible-collections/ansible.posix
|
||||||
- community.general
|
type: git
|
||||||
- kubernetes.core
|
- name: https://github.com/ansible-collections/ansible.utils
|
||||||
|
type: git
|
||||||
|
- name: https://github.com/ansible-collections/community.general
|
||||||
|
type: git
|
||||||
|
- name: https://github.com/ansible-collections/kubernetes.core
|
||||||
|
type: git
|
||||||
|
|||||||
@@ -1,79 +1,68 @@
|
|||||||
- block:
|
- name: Parse Cluster-API manifests for container images
|
||||||
|
ansible.builtin.shell:
|
||||||
|
# This set of commands is necessary to deal with multi-line scalar values
|
||||||
|
# eg.:
|
||||||
|
# key: |
|
||||||
|
# multi-line
|
||||||
|
# value
|
||||||
|
cmd: >-
|
||||||
|
cat {{ item.dest }} | yq --no-doc eval '.. | .image? | select(.)' | awk '!/ /';
|
||||||
|
cat {{ item.dest }} | yq eval '.data.data' | yq --no-doc eval '.. | .image? | select(.)';
|
||||||
|
cat {{ item.dest }} | yq --no-doc eval '.. | .files? | with_entries(select(.value.path == "*.yaml")).[0].content' | awk '!/null/' | yq eval '.. | .image? | select(.)'
|
||||||
|
register: clusterapi_parsedmanifests
|
||||||
|
loop: "{{ clusterapi_manifests.results }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.dest | basename }}"
|
||||||
|
|
||||||
- name: Aggregate chart_values into dict
|
- name: Parse pinniped manifest for container images
|
||||||
ansible.builtin.set_fact:
|
ansible.builtin.shell:
|
||||||
chart_values: "{{ chart_values | default({}) | combine({ (item.key | regex_replace('[^A-Za-z0-9]', '')): { 'chart_values': (item.value.helm.chart_values | from_yaml) } }) }}"
|
cmd: >-
|
||||||
when: item.value.helm.chart_values is defined
|
cat {{ pinniped_manifest.dest }} | yq --no-doc eval '.. | .image? | select(.)' | awk '!/ /';
|
||||||
loop: "{{ lookup('ansible.builtin.dict', components) }}"
|
register: pinniped_parsedmanifest
|
||||||
loop_control:
|
|
||||||
label: "{{ item.key }}"
|
|
||||||
|
|
||||||
- name: Write dict to vars_file
|
- name: Parse metacluster helm charts for container images
|
||||||
ansible.builtin.copy:
|
|
||||||
dest: /opt/firstboot/ansible/vars/metacluster.yml
|
|
||||||
content: "{{ { 'components': (chart_values | combine({ 'clusterapi': components.clusterapi })) } | to_nice_yaml(indent=2, width=4096) }}"
|
|
||||||
|
|
||||||
- block:
|
|
||||||
|
|
||||||
- name: Download ClusterAPI manifests
|
|
||||||
ansible.builtin.get_url:
|
|
||||||
url: "{{ item.url }}"
|
|
||||||
dest: /opt/metacluster/cluster-api/{{ item.dest }}
|
|
||||||
register: clusterapi_manifests
|
|
||||||
loop:
|
|
||||||
# This list is based on `clusterctl config repositories`
|
|
||||||
# Note: Each manifest also needs a `metadata.yaml` file stored in the respective folder
|
|
||||||
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/bootstrap-components.yaml
|
|
||||||
dest: bootstrap-kubeadm/{{ components.clusterapi.management.version.base }}/bootstrap-components.yaml
|
|
||||||
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/core-components.yaml
|
|
||||||
dest: cluster-api/{{ components.clusterapi.management.version.base }}/core-components.yaml
|
|
||||||
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/control-plane-components.yaml
|
|
||||||
dest: control-plane-kubeadm/{{ components.clusterapi.management.version.base }}/control-plane-components.yaml
|
|
||||||
# This downloads the same `metadata.yaml` file to three separate folders
|
|
||||||
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
|
||||||
dest: bootstrap-kubeadm/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
|
||||||
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
|
||||||
dest: cluster-api/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
|
||||||
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
|
||||||
dest: control-plane-kubeadm/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
|
||||||
# The vsphere infrastructure provider requires multiple files (`cluster-template.yaml` and `metadata.yaml` on top of default files)
|
|
||||||
- url: https://github.com/kubernetes-sigs/cluster-api-provider-vsphere/releases/download/{{ components.clusterapi.management.version.infrastructure_vsphere }}/infrastructure-components.yaml
|
|
||||||
dest: infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}/infrastructure-components.yaml
|
|
||||||
- url: https://github.com/kubernetes-sigs/cluster-api-provider-vsphere/releases/download/{{ components.clusterapi.management.version.infrastructure_vsphere }}/cluster-template.yaml
|
|
||||||
dest: infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}/cluster-template.yaml
|
|
||||||
- url: https://github.com/kubernetes-sigs/cluster-api-provider-vsphere/releases/download/{{ components.clusterapi.management.version.infrastructure_vsphere }}/metadata.yaml
|
|
||||||
dest: infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}/metadata.yaml
|
|
||||||
# Additionally, cert-manager is a prerequisite
|
|
||||||
- url: https://github.com/cert-manager/cert-manager/releases/download/{{ components.clusterapi.management.version.cert_manager }}/cert-manager.yaml
|
|
||||||
dest: cert-manager/{{ components.clusterapi.management.version.cert_manager }}/cert-manager.yaml
|
|
||||||
loop_control:
|
|
||||||
label: "{{ item.url | basename }}"
|
|
||||||
retries: 5
|
|
||||||
delay: 5
|
|
||||||
until: clusterapi_manifests is not failed
|
|
||||||
|
|
||||||
- name: Parse manifests
|
|
||||||
ansible.builtin.shell:
|
|
||||||
cmd: cat {{ item.dest }} | yq --no-doc eval '.. | .image? | select(.)' | awk '!/ /' | sort
|
|
||||||
register: parsedmanifests
|
|
||||||
loop: "{{ clusterapi_manifests.results }}"
|
|
||||||
loop_control:
|
|
||||||
label: "{{ item.dest | basename }}"
|
|
||||||
|
|
||||||
- name: Store container images
|
|
||||||
ansible.builtin.set_fact:
|
|
||||||
clusterapi_containerimages: "{{ parsedmanifests | json_query('results[*].stdout_lines') | select() | flatten }}"
|
|
||||||
|
|
||||||
- name: Parse helm charts for container images
|
|
||||||
ansible.builtin.shell:
|
ansible.builtin.shell:
|
||||||
cmd: "{{ item.value.helm.parse_logic }}"
|
cmd: "{{ item.value.helm.parse_logic }}"
|
||||||
chdir: /opt/metacluster/helm-charts/{{ item.key }}
|
chdir: /opt/metacluster/helm-charts/{{ item.key }}
|
||||||
register: containerimages
|
register: chartimages_metacluster
|
||||||
when: item.value.helm is defined
|
when: item.value.helm is defined
|
||||||
loop: "{{ lookup('ansible.builtin.dict', components) }}"
|
loop: "{{ query('ansible.builtin.dict', components) }}"
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.key }}"
|
label: "{{ item.key }}"
|
||||||
|
|
||||||
|
- name: Parse workloadcluster helm charts for container images
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: "{{ item.value.parse_logic }}"
|
||||||
|
chdir: /opt/workloadcluster/helm-charts/{{ item.value.namespace }}/{{ item.key }}
|
||||||
|
register: chartimages_workloadcluster
|
||||||
|
loop: "{{ query('ansible.builtin.dict', downstream.helm_charts) }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.key }}"
|
||||||
|
|
||||||
|
- name: Store container images in dicts
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
containerimages_{{ item.source }}: "{{ item.results }}"
|
||||||
|
loop:
|
||||||
|
- source: charts
|
||||||
|
results: "{{ (chartimages_metacluster | json_query('results[*].stdout_lines')) + (chartimages_workloadcluster | json_query('results[*].stdout_lines')) | select() | flatten | list }}"
|
||||||
|
- source: kubeadm
|
||||||
|
results: "{{ kubeadmimages.stdout_lines }}"
|
||||||
|
- source: clusterapi
|
||||||
|
results: "{{ clusterapi_parsedmanifests | json_query('results[*].stdout_lines') | select() | flatten | list }}"
|
||||||
|
- source: pinniped
|
||||||
|
results: "{{ pinniped_parsedmanifest.stdout_lines }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.source }}"
|
||||||
|
|
||||||
|
- name: Log in to container registry
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
skopeo login \
|
||||||
|
docker.io \
|
||||||
|
--username={{ docker_username }} \
|
||||||
|
--password={{ docker_password }}
|
||||||
|
no_log: true
|
||||||
|
|
||||||
- name: Pull and store containerimages
|
- name: Pull and store containerimages
|
||||||
ansible.builtin.shell:
|
ansible.builtin.shell:
|
||||||
cmd: >-
|
cmd: >-
|
||||||
@@ -83,15 +72,4 @@
|
|||||||
docker://{{ item }} \
|
docker://{{ item }} \
|
||||||
docker-archive:./{{ ( item | regex_findall('[^/:]+'))[-2] }}_{{ lookup('ansible.builtin.password', '/dev/null length=5 chars=ascii_lowercase,digits seed={{ item }}') }}.tar:{{ item }}
|
docker-archive:./{{ ( item | regex_findall('[^/:]+'))[-2] }}_{{ lookup('ansible.builtin.password', '/dev/null length=5 chars=ascii_lowercase,digits seed={{ item }}') }}.tar:{{ item }}
|
||||||
chdir: /opt/metacluster/container-images
|
chdir: /opt/metacluster/container-images
|
||||||
loop: "{{ ((containerimages.results | map(attribute='stdout_lines') | select('defined') | flatten) + dependencies.container_images + (clusterapi_containerimages | list)) | unique }}"
|
loop: "{{ (containerimages_charts + containerimages_kubeadm + containerimages_clusterapi + containerimages_pinniped + dependencies.container_images) | flatten | unique | sort }}"
|
||||||
|
|
||||||
# - name: Inject manifests
|
|
||||||
# ansible.builtin.template:
|
|
||||||
# src: "{{ item.type }}.j2"
|
|
||||||
# dest: /var/lib/rancher/k3s/server/manifests/{{ item.name }}-manifest.yaml
|
|
||||||
# owner: root
|
|
||||||
# group: root
|
|
||||||
# mode: 0600
|
|
||||||
# loop: "{{ lookup('ansible.builtin.dict', components) | map(attribute='value.manifests') | list | select('defined') | flatten }}"
|
|
||||||
# loop_control:
|
|
||||||
# label: "{{ item.type + '/' + item.name }}"
|
|
||||||
|
|||||||
@@ -10,6 +10,10 @@
|
|||||||
dest: "{{ archive.path }}"
|
dest: "{{ archive.path }}"
|
||||||
remote_src: yes
|
remote_src: yes
|
||||||
extra_opts: "{{ item.extra_opts | default(omit) }}"
|
extra_opts: "{{ item.extra_opts | default(omit) }}"
|
||||||
|
register: staticbinary_download
|
||||||
|
retries: 5
|
||||||
|
delay: 5
|
||||||
|
until: staticbinary_download is not failed
|
||||||
|
|
||||||
- name: Install extracted binary
|
- name: Install extracted binary
|
||||||
ansible.builtin.copy:
|
ansible.builtin.copy:
|
||||||
|
|||||||
@@ -7,9 +7,13 @@
|
|||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
mode: 0755
|
mode: 0755
|
||||||
|
register: staticbinary_download
|
||||||
loop: "{{ dependencies.static_binaries | selectattr('archive', 'undefined') }}"
|
loop: "{{ dependencies.static_binaries | selectattr('archive', 'undefined') }}"
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.filename }}"
|
label: "{{ item.filename }}"
|
||||||
|
retries: 5
|
||||||
|
delay: 5
|
||||||
|
until: staticbinary_download is not failed
|
||||||
|
|
||||||
- name: Download, extract & install archived static binaries
|
- name: Download, extract & install archived static binaries
|
||||||
include_tasks: dependencies.archive_compressed.yml
|
include_tasks: dependencies.archive_compressed.yml
|
||||||
|
|||||||
@@ -1,5 +0,0 @@
|
|||||||
- name: Clone git repository
|
|
||||||
ansible.builtin.git:
|
|
||||||
repo: "{{ platform.gitops.repository.uri }}"
|
|
||||||
version: "{{ platform.gitops.repository.revision }}"
|
|
||||||
dest: /opt/metacluster/git-repositories/gitops
|
|
||||||
@@ -3,17 +3,29 @@
|
|||||||
name: "{{ item.name }}"
|
name: "{{ item.name }}"
|
||||||
repo_url: "{{ item.url }}"
|
repo_url: "{{ item.url }}"
|
||||||
state: present
|
state: present
|
||||||
loop: "{{ platform.helm_repositories }}"
|
loop: "{{ platform.helm_repositories + downstream.helm_repositories }}"
|
||||||
|
|
||||||
- name: Fetch helm charts
|
- name: Fetch helm charts for metacluster
|
||||||
ansible.builtin.command:
|
ansible.builtin.command:
|
||||||
cmd: helm fetch {{ item.value.helm.chart }} --untar --version {{ item.value.helm.version }}
|
cmd: helm fetch {{ item.value.helm.chart }} --untar --version {{ item.value.helm.version }}
|
||||||
chdir: /opt/metacluster/helm-charts
|
chdir: /opt/metacluster/helm-charts
|
||||||
when: item.value.helm is defined
|
when: item.value.helm is defined
|
||||||
register: helmcharts
|
register: helmcharts_metacluster
|
||||||
loop: "{{ lookup('ansible.builtin.dict', components) }}"
|
loop: "{{ query('ansible.builtin.dict', components) }}"
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.key }}"
|
label: "{{ item.key }}"
|
||||||
retries: 5
|
retries: 5
|
||||||
delay: 5
|
delay: 5
|
||||||
until: helmcharts is not failed
|
until: helmcharts_metacluster is not failed
|
||||||
|
|
||||||
|
- name: Fetch helm charts for workloadcluster
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: helm fetch {{ item.value.chart }} --untardir ./{{ item.value.namespace }} --untar --version {{ item.value.version }}
|
||||||
|
chdir: /opt/workloadcluster/helm-charts
|
||||||
|
register: helmcharts_workloadcluster
|
||||||
|
loop: "{{ query('ansible.builtin.dict', downstream.helm_charts) }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.key }}"
|
||||||
|
retries: 5
|
||||||
|
delay: 5
|
||||||
|
until: helmcharts_workloadcluster is not failed
|
||||||
|
|||||||
@@ -1,4 +1,3 @@
|
|||||||
|
|
||||||
- name: Download & install K3s binary
|
- name: Download & install K3s binary
|
||||||
ansible.builtin.get_url:
|
ansible.builtin.get_url:
|
||||||
url: https://github.com/k3s-io/k3s/releases/download/{{ platform.k3s.version }}/k3s
|
url: https://github.com/k3s-io/k3s/releases/download/{{ platform.k3s.version }}/k3s
|
||||||
@@ -22,7 +21,7 @@
|
|||||||
|
|
||||||
- name: Download K3s install script
|
- name: Download K3s install script
|
||||||
ansible.builtin.get_url:
|
ansible.builtin.get_url:
|
||||||
url: https://get.k3s.io
|
url: https://raw.githubusercontent.com/k3s-io/k3s/{{ platform.k3s.version | urlencode }}/install.sh
|
||||||
dest: /opt/metacluster/k3s/install.sh
|
dest: /opt/metacluster/k3s/install.sh
|
||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
|
|||||||
26
ansible/roles/assets/tasks/kubeadm.yml
Normal file
26
ansible/roles/assets/tasks/kubeadm.yml
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
- name: Initialize tempfile
|
||||||
|
ansible.builtin.tempfile:
|
||||||
|
state: directory
|
||||||
|
register: kubeadm
|
||||||
|
|
||||||
|
- name: Download kubeadm binary
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: https://dl.k8s.io/release/{{ components.clusterapi.workload.version.k8s }}/bin/linux/amd64/kubeadm
|
||||||
|
dest: "{{ kubeadm.path }}/kubeadm"
|
||||||
|
mode: u+x
|
||||||
|
|
||||||
|
- name: Retrieve container images list
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: "{{ kubeadm.path }}/kubeadm config images list --kubernetes-version {{ components.clusterapi.workload.version.k8s }}"
|
||||||
|
register: kubeadmimages
|
||||||
|
|
||||||
|
- name: Store list of container images for reference
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: /opt/metacluster/cluster-api/imagelist
|
||||||
|
content: "{{ kubeadmimages.stdout }}"
|
||||||
|
|
||||||
|
- name: Cleanup tempfile
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ kubeadm.path }}"
|
||||||
|
state: absent
|
||||||
|
when: kubeadm.path is defined
|
||||||
@@ -3,15 +3,21 @@
|
|||||||
path: "{{ item }}"
|
path: "{{ item }}"
|
||||||
state: directory
|
state: directory
|
||||||
loop:
|
loop:
|
||||||
|
- /etc/rancher/k3s
|
||||||
- /opt/metacluster/cluster-api/bootstrap-kubeadm/{{ components.clusterapi.management.version.base }}
|
- /opt/metacluster/cluster-api/bootstrap-kubeadm/{{ components.clusterapi.management.version.base }}
|
||||||
- /opt/metacluster/cluster-api/cert-manager/{{ components.clusterapi.management.version.cert_manager }}
|
- /opt/metacluster/cluster-api/cert-manager/{{ components.clusterapi.management.version.cert_manager }}
|
||||||
- /opt/metacluster/cluster-api/cluster-api/{{ components.clusterapi.management.version.base }}
|
- /opt/metacluster/cluster-api/cluster-api/{{ components.clusterapi.management.version.base }}
|
||||||
|
- /opt/metacluster/cluster-api/cni-calico/{{ components.clusterapi.workload.version.calico }}
|
||||||
- /opt/metacluster/cluster-api/control-plane-kubeadm/{{ components.clusterapi.management.version.base }}
|
- /opt/metacluster/cluster-api/control-plane-kubeadm/{{ components.clusterapi.management.version.base }}
|
||||||
- /opt/metacluster/cluster-api/infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}
|
- /opt/metacluster/cluster-api/infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}
|
||||||
|
- /opt/metacluster/cluster-api/ipam-in-cluster/{{ components.clusterapi.management.version.ipam_incluster }}
|
||||||
- /opt/metacluster/container-images
|
- /opt/metacluster/container-images
|
||||||
- /opt/metacluster/git-repositories/gitops
|
- /opt/metacluster/git-repositories
|
||||||
- /opt/metacluster/helm-charts
|
- /opt/metacluster/helm-charts
|
||||||
- /opt/metacluster/k3s
|
- /opt/metacluster/k3s
|
||||||
|
- /opt/metacluster/kube-vip
|
||||||
|
- /opt/metacluster/pinniped
|
||||||
|
- /opt/workloadcluster/helm-charts
|
||||||
- /opt/workloadcluster/node-templates
|
- /opt/workloadcluster/node-templates
|
||||||
- /var/lib/rancher/k3s/agent/images
|
- /var/lib/rancher/k3s/agent/images
|
||||||
- /var/lib/rancher/k3s/server/manifests
|
- /var/lib/rancher/k3s/server/manifests
|
||||||
@@ -19,6 +25,7 @@
|
|||||||
- import_tasks: dependencies.yml
|
- import_tasks: dependencies.yml
|
||||||
- import_tasks: k3s.yml
|
- import_tasks: k3s.yml
|
||||||
- import_tasks: helm.yml
|
- import_tasks: helm.yml
|
||||||
- import_tasks: git.yml
|
# - import_tasks: git.yml
|
||||||
|
- import_tasks: manifests.yml
|
||||||
|
- import_tasks: kubeadm.yml
|
||||||
- import_tasks: containerimages.yml
|
- import_tasks: containerimages.yml
|
||||||
- import_tasks: nodetemplates.yml
|
|
||||||
|
|||||||
137
ansible/roles/assets/tasks/manifests.yml
Normal file
137
ansible/roles/assets/tasks/manifests.yml
Normal file
@@ -0,0 +1,137 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Aggregate meta-cluster chart_values into dict
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
metacluster_chartvalues: "{{ metacluster_chartvalues | default({}) | combine({ item.key: { 'chart_values': (item.value.helm.chart_values | from_yaml) } }) }}"
|
||||||
|
when: item.value.helm.chart_values is defined
|
||||||
|
loop: "{{ query('ansible.builtin.dict', components) }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.key }}"
|
||||||
|
|
||||||
|
- name: Combine and write dict to vars_file
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: /opt/firstboot/ansible/vars/metacluster.yml
|
||||||
|
content: >-
|
||||||
|
{{
|
||||||
|
{ 'components': (
|
||||||
|
metacluster_chartvalues |
|
||||||
|
combine({ 'clusterapi' : components['clusterapi'] }) |
|
||||||
|
combine({ 'kubevip' : components['kubevip'] }) |
|
||||||
|
combine({ 'localuserauthenticator': components['pinniped']['local-user-authenticator'] })),
|
||||||
|
'appliance': {
|
||||||
|
'version': (applianceversion)
|
||||||
|
}
|
||||||
|
} | to_nice_yaml(indent=2, width=4096)
|
||||||
|
}}
|
||||||
|
|
||||||
|
- name: Aggregate workload-cluster chart_values into dict
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
workloadcluster_chartvalues: |
|
||||||
|
{{
|
||||||
|
workloadcluster_chartvalues | default({}) | combine({
|
||||||
|
item.key: {
|
||||||
|
'chart_values': (item.value.chart_values | default('') | from_yaml),
|
||||||
|
'extra_manifests': (item.value.extra_manifests | default([])),
|
||||||
|
'namespace': (item.value.namespace)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
}}
|
||||||
|
loop: "{{ query('ansible.builtin.dict', downstream.helm_charts) }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.key }}"
|
||||||
|
|
||||||
|
- name: Write dict to vars_file
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: /opt/firstboot/ansible/vars/workloadcluster.yml
|
||||||
|
content: >-
|
||||||
|
{{
|
||||||
|
{ 'downstream_components': ( workloadcluster_chartvalues )
|
||||||
|
} | to_nice_yaml(indent=2, width=4096)
|
||||||
|
}}
|
||||||
|
|
||||||
|
- name: Download Cluster-API manifests
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: "{{ item.url }}"
|
||||||
|
dest: /opt/metacluster/cluster-api/{{ item.dest }}
|
||||||
|
register: clusterapi_manifests
|
||||||
|
loop:
|
||||||
|
# This list is based on `clusterctl config repositories`
|
||||||
|
# Note: Each manifest also needs a `metadata.yaml` file stored in the respective folder
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/bootstrap-components.yaml
|
||||||
|
dest: bootstrap-kubeadm/{{ components.clusterapi.management.version.base }}/bootstrap-components.yaml
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/core-components.yaml
|
||||||
|
dest: cluster-api/{{ components.clusterapi.management.version.base }}/core-components.yaml
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/control-plane-components.yaml
|
||||||
|
dest: control-plane-kubeadm/{{ components.clusterapi.management.version.base }}/control-plane-components.yaml
|
||||||
|
# This downloads the same `metadata.yaml` file to three separate folders
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
||||||
|
dest: bootstrap-kubeadm/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
||||||
|
dest: cluster-api/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api/releases/download/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
||||||
|
dest: control-plane-kubeadm/{{ components.clusterapi.management.version.base }}/metadata.yaml
|
||||||
|
# The vsphere infrastructure provider requires multiple files (`cluster-template.yaml` and `metadata.yaml` on top of default files)
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api-provider-vsphere/releases/download/{{ components.clusterapi.management.version.infrastructure_vsphere }}/infrastructure-components.yaml
|
||||||
|
dest: infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}/infrastructure-components.yaml
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api-provider-vsphere/releases/download/{{ components.clusterapi.management.version.infrastructure_vsphere }}/cluster-template.yaml
|
||||||
|
dest: infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}/cluster-template.yaml
|
||||||
|
- url: https://github.com/kubernetes-sigs/cluster-api-provider-vsphere/releases/download/{{ components.clusterapi.management.version.infrastructure_vsphere }}/metadata.yaml
|
||||||
|
dest: infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}/metadata.yaml
|
||||||
|
# Additionally, cert-manager is a prerequisite
|
||||||
|
- url: https://github.com/cert-manager/cert-manager/releases/download/{{ components.clusterapi.management.version.cert_manager }}/cert-manager.yaml
|
||||||
|
dest: cert-manager/{{ components.clusterapi.management.version.cert_manager }}/cert-manager.yaml
|
||||||
|
# Finally, workload clusters will need a CNI plugin
|
||||||
|
- url: https://raw.githubusercontent.com/projectcalico/calico/{{ components.clusterapi.workload.version.calico }}/manifests/calico.yaml
|
||||||
|
dest: cni-calico/{{ components.clusterapi.workload.version.calico }}/calico.yaml
|
||||||
|
# IPAM in-cluster provider (w/ metadata.yaml)
|
||||||
|
- url: https://github.com/telekom/cluster-api-ipam-provider-in-cluster/releases/download/{{ components.clusterapi.management.version.ipam_incluster }}/ipam-components.yaml
|
||||||
|
dest: ipam-in-cluster/{{ components.clusterapi.management.version.ipam_incluster }}/ipam-components.yaml
|
||||||
|
- url: https://github.com/telekom/cluster-api-ipam-provider-in-cluster/releases/download/{{ components.clusterapi.management.version.ipam_incluster }}/metadata.yaml
|
||||||
|
dest: ipam-in-cluster/{{ components.clusterapi.management.version.ipam_incluster }}/metadata.yaml
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.url | basename }}"
|
||||||
|
retries: 5
|
||||||
|
delay: 5
|
||||||
|
until: clusterapi_manifests is not failed
|
||||||
|
|
||||||
|
- name: Update cluster-template with image tags
|
||||||
|
ansible.builtin.replace:
|
||||||
|
dest: /opt/metacluster/cluster-api/infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}/cluster-template.yaml
|
||||||
|
regexp: ':\${CPI_IMAGE_K8S_VERSION}'
|
||||||
|
replace: ":{{ components.clusterapi.management.version.cpi_vsphere }}"
|
||||||
|
|
||||||
|
- name: Download kube-vip RBAC manifest
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: https://kube-vip.io/manifests/rbac.yaml
|
||||||
|
dest: /opt/metacluster/kube-vip/rbac.yaml
|
||||||
|
register: kubevip_manifest
|
||||||
|
retries: 5
|
||||||
|
delay: 5
|
||||||
|
until: kubevip_manifest is not failed
|
||||||
|
|
||||||
|
- name: Download pinniped local-user-authenticator manifest
|
||||||
|
ansible.builtin.get_url:
|
||||||
|
url: https://get.pinniped.dev/{{ components.pinniped['local-user-authenticator'].version }}/install-local-user-authenticator.yaml
|
||||||
|
dest: /opt/metacluster/pinniped/local-user-authenticator.yaml
|
||||||
|
register: pinniped_manifest
|
||||||
|
retries: 5
|
||||||
|
delay: 5
|
||||||
|
until: pinniped_manifest is not failed
|
||||||
|
|
||||||
|
- name: Trim image hash from manifest
|
||||||
|
ansible.builtin.replace:
|
||||||
|
path: /opt/metacluster/pinniped/local-user-authenticator.yaml
|
||||||
|
regexp: '([ ]*image: .*)@.*'
|
||||||
|
replace: '\1'
|
||||||
|
no_log: true
|
||||||
|
|
||||||
|
# - name: Inject manifests
|
||||||
|
# ansible.builtin.template:
|
||||||
|
# src: "{{ item.type }}.j2"
|
||||||
|
# dest: /var/lib/rancher/k3s/server/manifests/{{ item.name }}-manifest.yaml
|
||||||
|
# owner: root
|
||||||
|
# group: root
|
||||||
|
# mode: 0600
|
||||||
|
# loop: "{{ query('ansible.builtin.dict', components) | map(attribute='value.manifests') | list | select('defined') | flatten }}"
|
||||||
|
# loop_control:
|
||||||
|
# label: "{{ item.type ~ '/' ~ item.name }}"
|
||||||
@@ -1,4 +0,0 @@
|
|||||||
- name: Download node-template image
|
|
||||||
ansible.builtin.uri:
|
|
||||||
url: "{{ components.clusterapi.workload.node_template.url }}"
|
|
||||||
dest: /opt/workloadcluster/node-templates/{{ components.clusterapi.workload.node_template.name }}
|
|
||||||
@@ -0,0 +1,30 @@
|
|||||||
|
---
|
||||||
|
- hosts: 127.0.0.1
|
||||||
|
connection: local
|
||||||
|
gather_facts: true
|
||||||
|
vars:
|
||||||
|
# Needed by some templating in various tasks
|
||||||
|
_newline: "\n"
|
||||||
|
vars_files:
|
||||||
|
- defaults.yml
|
||||||
|
- metacluster.yml
|
||||||
|
- workloadcluster.yml
|
||||||
|
# become: true
|
||||||
|
roles:
|
||||||
|
- vapp
|
||||||
|
- network
|
||||||
|
- preflight
|
||||||
|
- users
|
||||||
|
- disks
|
||||||
|
- metacluster
|
||||||
|
- workloadcluster
|
||||||
|
- tty
|
||||||
|
- cleanup
|
||||||
|
handlers:
|
||||||
|
- name: Apply manifests
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
src: "{{ item }}"
|
||||||
|
state: present
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
loop: "{{ query('ansible.builtin.fileglob', '/var/lib/rancher/k3s/server/manifests/*.yaml') | sort }}"
|
||||||
|
ignore_errors: yes
|
||||||
@@ -0,0 +1,176 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Install dex
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: dex
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/dex
|
||||||
|
release_namespace: dex
|
||||||
|
create_namespace: true
|
||||||
|
wait: false
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: "{{ components['dex'].chart_values }}"
|
||||||
|
|
||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Install pinniped local-user-authenticator
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
src: /opt/metacluster/pinniped/local-user-authenticator.yaml
|
||||||
|
state: present
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
|
||||||
|
- name: Create local-user-authenticator accounts
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
template: secret.j2
|
||||||
|
state: present
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: "{{ item.username }}"
|
||||||
|
namespace: local-user-authenticator
|
||||||
|
type: ''
|
||||||
|
data:
|
||||||
|
- key: groups
|
||||||
|
value: "{{ 'group1,group2' | b64encode }}"
|
||||||
|
- key: passwordHash
|
||||||
|
value: "{{ item.password | b64encode }}"
|
||||||
|
loop: "{{ components['localuserauthenticator'].users }}"
|
||||||
|
|
||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Install pinniped chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: pinniped
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/pinniped
|
||||||
|
release_namespace: pinniped-supervisor
|
||||||
|
create_namespace: true
|
||||||
|
wait: false
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: "{{ components['pinniped'].chart_values }}"
|
||||||
|
|
||||||
|
- name: Add ingress for supervisor
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
template: "{{ item.kind }}.j2"
|
||||||
|
state: present
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: "{{ item.name }}"
|
||||||
|
namespace: "{{ item.namespace }}"
|
||||||
|
spec: "{{ item.spec }}"
|
||||||
|
loop:
|
||||||
|
- kind: ingressroute
|
||||||
|
name: pinniped-supervisor
|
||||||
|
namespace: pinniped-supervisor
|
||||||
|
spec: |2
|
||||||
|
entryPoints:
|
||||||
|
- web
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- kind: Rule
|
||||||
|
match: Host(`auth.{{ vapp['metacluster.fqdn'] }}`)
|
||||||
|
services:
|
||||||
|
- kind: Service
|
||||||
|
name: pinniped-supervisor
|
||||||
|
namespace: pinniped-supervisor
|
||||||
|
port: 443
|
||||||
|
scheme: https
|
||||||
|
serversTransport: pinniped-supervisor
|
||||||
|
- kind: serverstransport
|
||||||
|
name: pinniped-supervisor
|
||||||
|
namespace: pinniped-supervisor
|
||||||
|
spec: |2
|
||||||
|
insecureSkipVerify: true
|
||||||
|
serverName: auth.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.kind ~ '/' ~ item.name ~ ' (' ~ item.namespace ~ ')' }}"
|
||||||
|
|
||||||
|
- name: Ensure pinniped API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://auth.{{ vapp['metacluster.fqdn'] }}/healthz
|
||||||
|
method: GET
|
||||||
|
register: api_readycheck
|
||||||
|
until:
|
||||||
|
- api_readycheck.status == 200
|
||||||
|
- api_readycheck.msg is search("OK")
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ ((storage_benchmark | float) * playbook.delay.short) | int }}"
|
||||||
|
|
||||||
|
# TODO: Migrate to step-ca
|
||||||
|
- name: Initialize tempfile
|
||||||
|
ansible.builtin.tempfile:
|
||||||
|
state: directory
|
||||||
|
register: certificate
|
||||||
|
|
||||||
|
- name: Create private key (RSA, 4096 bits)
|
||||||
|
community.crypto.openssl_privatekey:
|
||||||
|
path: "{{ certificate.path }}/certificate.key"
|
||||||
|
|
||||||
|
- name: Create self-signed certificate
|
||||||
|
community.crypto.x509_certificate:
|
||||||
|
path: "{{ certificate.path }}/certificate.crt"
|
||||||
|
privatekey_path: "{{ certificate.path }}/certificate.key"
|
||||||
|
provider: selfsigned
|
||||||
|
|
||||||
|
- name: Store self-signed certificate for use by pinniped supervisor
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
template: secret.j2
|
||||||
|
state: present
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: pinniped-supervisor-tls
|
||||||
|
namespace: pinniped-supervisor
|
||||||
|
type: kubernetes.io/tls
|
||||||
|
data:
|
||||||
|
- key: tls.crt
|
||||||
|
value: "{{ lookup('ansible.builtin.file', certificate.path ~ '/certificate.crt') | b64encode }}"
|
||||||
|
- key: tls.key
|
||||||
|
value: "{{ lookup('ansible.builtin.file', certificate.path ~ '/certificate.key') | b64encode }}"
|
||||||
|
# TODO: Migrate to step-ca
|
||||||
|
|
||||||
|
- name: Create pinniped resources
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
template: "{{ item.kind }}.j2"
|
||||||
|
state: present
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: "{{ item.name }}"
|
||||||
|
namespace: "{{ item.namespace }}"
|
||||||
|
type: "{{ item.type | default('') }}"
|
||||||
|
data: "{{ item.data | default(omit) }}"
|
||||||
|
spec: "{{ item.spec | default(omit) }}"
|
||||||
|
loop:
|
||||||
|
- kind: oidcidentityprovider
|
||||||
|
name: dex-staticpasswords
|
||||||
|
namespace: pinniped-supervisor
|
||||||
|
spec: |2
|
||||||
|
issuer: https://idps.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
tls:
|
||||||
|
certificateAuthorityData: "{{ (stepca_cm_certs.resources[0].data['intermediate_ca.crt'] ~ _newline ~ stepca_cm_certs.resources[0].data['root_ca.crt']) | b64encode }}"
|
||||||
|
authorizationConfig:
|
||||||
|
additionalScopes: [offline_access, groups, email]
|
||||||
|
allowPasswordGrant: false
|
||||||
|
claims:
|
||||||
|
username: email
|
||||||
|
groups: groups
|
||||||
|
client:
|
||||||
|
secretName: dex-clientcredentials
|
||||||
|
- kind: secret
|
||||||
|
name: dex-clientcredentials
|
||||||
|
namespace: pinniped-supervisor
|
||||||
|
type: secrets.pinniped.dev/oidc-client
|
||||||
|
data:
|
||||||
|
- key: clientID
|
||||||
|
value: "{{ 'pinniped-supervisor' | b64encode }}"
|
||||||
|
- key: clientSecret
|
||||||
|
value: "{{ lookup('ansible.builtin.password', '/dev/null length=64 chars=ascii_lowercase,digits seed=' ~ vapp['metacluster.fqdn']) | b64encode }}"
|
||||||
|
- kind: federationdomain
|
||||||
|
name: metacluster-sso
|
||||||
|
namespace: pinniped-supervisor
|
||||||
|
spec: |2
|
||||||
|
issuer: https://auth.{{ vapp['metacluster.fqdn'] }}/sso
|
||||||
|
tls:
|
||||||
|
secretName: pinniped-supervisor-tls
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.kind ~ '/' ~ item.name }}"
|
||||||
@@ -0,0 +1,169 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Import generated values file into dictionary and combine with custom values
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
values_initial: |
|
||||||
|
{{
|
||||||
|
lookup('ansible.builtin.file', stepconfig.path) | from_yaml |
|
||||||
|
combine( components['step-certificates'].chart_values | from_yaml, recursive=True, list_merge='append')
|
||||||
|
}}
|
||||||
|
|
||||||
|
- name: Duplicate default provisioner with modified claims
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
values_new: |
|
||||||
|
{{
|
||||||
|
values_initial |
|
||||||
|
combine({'inject':{'config':{'files':{'ca.json':{'authority': {'provisioners': [
|
||||||
|
values_initial.inject.config.files['ca.json'].authority.provisioners[0] | combine({'name':'long-lived', 'claims':{'maxTLSCertDuration':'87660h'}})
|
||||||
|
]}}}}}}, list_merge='append_rp', recursive=true)
|
||||||
|
}}
|
||||||
|
|
||||||
|
# We're facing several bugs or niche cases that result in incorrect output, despite being behaviour by design:
|
||||||
|
# - Ansible's `to_yaml` filter, sees `\n` escape sequences in PEM certificate strings and correctly converts them to actual newlines - without any way to prevent this
|
||||||
|
# So we cannot rely on Ansible to (re)create the helm chart values file
|
||||||
|
# - Python's yaml interpreter sees strings with a value of `y` as short for `yes` or `true`, even when that string is a key name.
|
||||||
|
# So we cannot use a straightforward yaml document as input for the Ansible helm module (which is written in Python)
|
||||||
|
#
|
||||||
|
# Lets explain the following workaround steps:
|
||||||
|
# - First we convert the dictionary to a json-object (through Ansible), so that yq can read it
|
||||||
|
# - Second we convert the json-object in its entirety to yaml (through yq), so that yq can actually manipulate it.
|
||||||
|
# - Finally, we take one specific subkey's contents (list of dictionaries) and iterate over each with the following steps (with `map`):
|
||||||
|
# - Convert the dictionary to json with `tojson`
|
||||||
|
# - Remove newlines (and spaces) with `sub`
|
||||||
|
# - Remove outer quotes (') with `sed`
|
||||||
|
- name: Save updated values file
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: |
|
||||||
|
echo '{{ values_new | to_nice_json }}' | yq -p json -o yaml | yq e '.inject.config.files["ca.json"].authority.provisioners |= map(tojson | sub("[\n ]";""))' | sed -e "s/- '/- /;s/'$//" > {{ stepconfig.path }}
|
||||||
|
|
||||||
|
- name: Install step-ca chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: step-certificates
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/step-certificates
|
||||||
|
release_namespace: step-ca
|
||||||
|
create_namespace: true
|
||||||
|
# Unable to use REST api based readycheck due to lack of ingress
|
||||||
|
wait: true
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values_files:
|
||||||
|
- "{{ stepconfig.path }}"
|
||||||
|
|
||||||
|
- name: Retrieve configmap w/ root certificate
|
||||||
|
kubernetes.core.k8s_info:
|
||||||
|
kind: ConfigMap
|
||||||
|
name: step-certificates-certs
|
||||||
|
namespace: step-ca
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
register: stepca_cm_certs
|
||||||
|
|
||||||
|
- name: Create target namespaces
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
kind: Namespace
|
||||||
|
name: "{{ item }}"
|
||||||
|
state: present
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
loop:
|
||||||
|
- argo-cd
|
||||||
|
- gitea
|
||||||
|
# - kube-system
|
||||||
|
|
||||||
|
- name: Store root certificate in namespaced configmaps/secrets
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
state: present
|
||||||
|
template: "{{ item.kind }}.j2"
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: "{{ item.name }}"
|
||||||
|
namespace: "{{ item.namespace }}"
|
||||||
|
annotations: "{{ item.annotations | default('{}') | indent(width=4, first=True) }}"
|
||||||
|
labels: "{{ item.labels | default('{}') | indent(width=4, first=True) }}"
|
||||||
|
type: "{{ item.type | default('') }}"
|
||||||
|
data: "{{ item.data }}"
|
||||||
|
loop:
|
||||||
|
- name: argocd-tls-certs-cm
|
||||||
|
namespace: argo-cd
|
||||||
|
kind: configmap
|
||||||
|
annotations: |
|
||||||
|
meta.helm.sh/release-name: argo-cd
|
||||||
|
meta.helm.sh/release-namespace: argo-cd
|
||||||
|
labels: |
|
||||||
|
app.kubernetes.io/managed-by: Helm
|
||||||
|
app.kubernetes.io/name: argocd-cm
|
||||||
|
app.kubernetes.io/part-of: argocd
|
||||||
|
data:
|
||||||
|
- key: git.{{ vapp['metacluster.fqdn'] }}
|
||||||
|
value: "{{ stepca_cm_certs.resources[0].data['root_ca.crt'] }}"
|
||||||
|
- name: step-certificates-certs
|
||||||
|
namespace: gitea
|
||||||
|
kind: secret
|
||||||
|
data:
|
||||||
|
- key: ca_chain.crt
|
||||||
|
value: "{{ (stepca_cm_certs.resources[0].data['intermediate_ca.crt'] ~ _newline ~ stepca_cm_certs.resources[0].data['root_ca.crt']) | b64encode }}"
|
||||||
|
- name: step-certificates-certs
|
||||||
|
namespace: kube-system
|
||||||
|
kind: secret
|
||||||
|
data:
|
||||||
|
- key: root_ca.crt
|
||||||
|
value: "{{ stepca_cm_certs.resources[0].data['root_ca.crt'] | b64encode }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.kind ~ '/' ~ item.name ~ ' (' ~ item.namespace ~ ')' }}"
|
||||||
|
|
||||||
|
- name: Configure step-ca passthrough ingress
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: ingressroutetcp.j2
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.name }}-manifest.yaml
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0600
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: step-ca
|
||||||
|
namespace: step-ca
|
||||||
|
spec: |2
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: HostSNI(`ca.{{ vapp['metacluster.fqdn'] }}`)
|
||||||
|
services:
|
||||||
|
- name: step-certificates
|
||||||
|
port: 443
|
||||||
|
tls:
|
||||||
|
passthrough: true
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Inject step-ca certificate into traefik container
|
||||||
|
ansible.builtin.blockinfile:
|
||||||
|
path: /var/lib/rancher/k3s/server/manifests/traefik-config.yaml
|
||||||
|
block: |2
|
||||||
|
volumes:
|
||||||
|
- name: step-certificates-certs
|
||||||
|
mountPath: /step-ca
|
||||||
|
type: secret
|
||||||
|
env:
|
||||||
|
- name: LEGO_CA_CERTIFICATES
|
||||||
|
value: /step-ca/root_ca.crt
|
||||||
|
marker: ' # {mark} ANSIBLE MANAGED BLOCK [rootca]'
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Trigger handlers
|
||||||
|
ansible.builtin.meta: flush_handlers
|
||||||
|
|
||||||
|
- name: Ensure step-ca API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://ca.{{ vapp['metacluster.fqdn'] }}/health
|
||||||
|
method: GET
|
||||||
|
register: api_readycheck
|
||||||
|
until:
|
||||||
|
- api_readycheck.json.status is defined
|
||||||
|
- api_readycheck.json.status == 'ok'
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.long | int) }}"
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201]
|
||||||
|
body_format: json
|
||||||
@@ -5,10 +5,21 @@
|
|||||||
name: gitea
|
name: gitea
|
||||||
chart_ref: /opt/metacluster/helm-charts/gitea
|
chart_ref: /opt/metacluster/helm-charts/gitea
|
||||||
release_namespace: gitea
|
release_namespace: gitea
|
||||||
create_namespace: yes
|
create_namespace: true
|
||||||
wait: yes
|
wait: false
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
values: "{{ components.gitea.chart_values }}"
|
values: "{{ components['gitea'].chart_values }}"
|
||||||
|
|
||||||
|
- name: Ensure gitea API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/api/healthz
|
||||||
|
method: GET
|
||||||
|
register: api_readycheck
|
||||||
|
until:
|
||||||
|
- api_readycheck.json.status is defined
|
||||||
|
- api_readycheck.json.status == 'pass'
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.long | int) }}"
|
||||||
|
|
||||||
- name: Configure additional SSH ingress
|
- name: Configure additional SSH ingress
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
@@ -21,7 +32,7 @@
|
|||||||
_template:
|
_template:
|
||||||
name: gitea-ssh
|
name: gitea-ssh
|
||||||
namespace: gitea
|
namespace: gitea
|
||||||
config: |2
|
spec: |2
|
||||||
entryPoints:
|
entryPoints:
|
||||||
- ssh
|
- ssh
|
||||||
routes:
|
routes:
|
||||||
@@ -35,24 +46,16 @@
|
|||||||
- name: Trigger handlers
|
- name: Trigger handlers
|
||||||
ansible.builtin.meta: flush_handlers
|
ansible.builtin.meta: flush_handlers
|
||||||
|
|
||||||
- name: Ensure gitea API availability
|
|
||||||
ansible.builtin.uri:
|
|
||||||
url: https://git.{{ vapp['metacluster.fqdn'] }}/api/healthz
|
|
||||||
method: GET
|
|
||||||
register: api_readycheck
|
|
||||||
until: api_readycheck.json.status is defined
|
|
||||||
retries: 5
|
|
||||||
delay: 30
|
|
||||||
|
|
||||||
- name: Generate gitea API token
|
- name: Generate gitea API token
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
url: https://git.{{ vapp['metacluster.fqdn'] }}/api/v1/users/administrator/tokens
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/api/v1/users/administrator/tokens
|
||||||
method: POST
|
method: POST
|
||||||
user: administrator
|
user: administrator
|
||||||
password: "{{ vapp['guestinfo.rootpw'] }}"
|
password: "{{ vapp['metacluster.password'] }}"
|
||||||
force_basic_auth: yes
|
force_basic_auth: yes
|
||||||
body:
|
body:
|
||||||
name: token_init_{{ lookup('password', '/dev/null length=5 chars=ascii_letters,digits') }}
|
name: token_init_{{ lookup('password', '/dev/null length=5 chars=ascii_letters,digits') }}
|
||||||
|
scopes: ["write:user","write:organization"]
|
||||||
register: gitea_api_token
|
register: gitea_api_token
|
||||||
|
|
||||||
- name: Retrieve existing gitea configuration
|
- name: Retrieve existing gitea configuration
|
||||||
@@ -105,6 +108,12 @@
|
|||||||
Authorization: token {{ gitea_api_token.json.sha1 }}
|
Authorization: token {{ gitea_api_token.json.sha1 }}
|
||||||
body: "{{ item.body }}"
|
body: "{{ item.body }}"
|
||||||
loop:
|
loop:
|
||||||
|
- organization: mc
|
||||||
|
body:
|
||||||
|
name: GitOps.ClusterAPI
|
||||||
|
auto_init: true
|
||||||
|
default_branch: main
|
||||||
|
description: ClusterAPI manifests
|
||||||
- organization: mc
|
- organization: mc
|
||||||
body:
|
body:
|
||||||
name: GitOps.Config
|
name: GitOps.Config
|
||||||
@@ -113,20 +122,26 @@
|
|||||||
description: GitOps manifests
|
description: GitOps manifests
|
||||||
- organization: wl
|
- organization: wl
|
||||||
body:
|
body:
|
||||||
name: Template.GitOps.Config
|
name: GitOps.Config
|
||||||
# auto_init: true
|
auto_init: true
|
||||||
# default_branch: main
|
default_branch: main
|
||||||
description: GitOps manifests
|
description: GitOps manifests
|
||||||
|
- organization: wl
|
||||||
|
body:
|
||||||
|
name: ClusterAccess.Store
|
||||||
|
auto_init: true
|
||||||
|
default_branch: main
|
||||||
|
description: Kubeconfig files
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.organization + '/' + item.body.name }}"
|
label: "{{ item.organization ~ '/' ~ item.body.name }}"
|
||||||
|
|
||||||
- name: Rebase/Push source gitops repository
|
# - name: Rebase/Push source gitops repository
|
||||||
ansible.builtin.shell:
|
# ansible.builtin.shell:
|
||||||
cmd: |
|
# cmd: |
|
||||||
git config --local http.sslVerify false
|
# git config --local http.sslVerify false
|
||||||
git remote set-url origin https://administrator:{{ vapp['guestinfo.rootpw'] | urlencode }}@git.{{ vapp['metacluster.fqdn'] }}/mc/GitOps.Config.git
|
# git remote set-url origin https://administrator:{{ vapp['metacluster.password'] | urlencode }}@git.{{ vapp['metacluster.fqdn'] }}/mc/GitOps.Config.git
|
||||||
git push
|
# git push
|
||||||
chdir: /opt/metacluster/git-repositories/gitops
|
# chdir: /opt/metacluster/git-repositories/gitops
|
||||||
|
|
||||||
when: (gitea_existing_config.json is undefined) or (gitea_existing_config.json.data | length == 0)
|
when: (gitea_existing_config.json is undefined) or (gitea_existing_config.json.data | length == 0)
|
||||||
|
|
||||||
@@ -5,19 +5,20 @@
|
|||||||
name: argo-cd
|
name: argo-cd
|
||||||
chart_ref: /opt/metacluster/helm-charts/argo-cd
|
chart_ref: /opt/metacluster/helm-charts/argo-cd
|
||||||
release_namespace: argo-cd
|
release_namespace: argo-cd
|
||||||
create_namespace: yes
|
create_namespace: true
|
||||||
wait: yes
|
wait: false
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
values: "{{ components.argocd.chart_values }}"
|
values: "{{ components['argo-cd'].chart_values }}"
|
||||||
|
|
||||||
- name: Ensure argo-cd API availability
|
- name: Ensure argo-cd API availability
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
url: https://gitops.{{ vapp['metacluster.fqdn'] }}/api/version
|
url: https://gitops.{{ vapp['metacluster.fqdn'] }}/api/version
|
||||||
method: GET
|
method: GET
|
||||||
register: api_readycheck
|
register: api_readycheck
|
||||||
until: api_readycheck.json.Version is defined
|
until:
|
||||||
retries: 5
|
- api_readycheck.json.Version is defined
|
||||||
delay: 30
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.long | int) }}"
|
||||||
|
|
||||||
- name: Generate argo-cd API token
|
- name: Generate argo-cd API token
|
||||||
ansible.builtin.uri:
|
ansible.builtin.uri:
|
||||||
@@ -26,7 +27,7 @@
|
|||||||
force_basic_auth: yes
|
force_basic_auth: yes
|
||||||
body:
|
body:
|
||||||
username: admin
|
username: admin
|
||||||
password: "{{ vapp['guestinfo.rootpw'] }}"
|
password: "{{ vapp['metacluster.password'] }}"
|
||||||
register: argocd_api_token
|
register: argocd_api_token
|
||||||
|
|
||||||
- name: Configure metacluster-gitops repository
|
- name: Configure metacluster-gitops repository
|
||||||
@@ -38,24 +39,29 @@
|
|||||||
mode: 0600
|
mode: 0600
|
||||||
vars:
|
vars:
|
||||||
_template:
|
_template:
|
||||||
name: argocd-gitrepo-metacluster
|
name: gitrepo-mc-gitopsconfig
|
||||||
namespace: argo-cd
|
namespace: argo-cd
|
||||||
uid: "{{ lookup('ansible.builtin.password', '/dev/null length=5 chars=ascii_lowercase,digits seed=inventory_hostname') }}"
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/mc/GitOps.Config.git
|
||||||
privatekey: "{{ lookup('ansible.builtin.file', '~/.ssh/git_rsa_id') | indent(4, true) }}"
|
|
||||||
notify:
|
notify:
|
||||||
- Apply manifests
|
- Apply manifests
|
||||||
|
|
||||||
- name: Create applicationset
|
- name: Create applicationset
|
||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: applicationset.j2
|
src: applicationset.j2
|
||||||
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.name }}-manifest.yaml
|
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.application.name }}-manifest.yaml
|
||||||
owner: root
|
owner: root
|
||||||
group: root
|
group: root
|
||||||
mode: 0600
|
mode: 0600
|
||||||
vars:
|
vars:
|
||||||
_template:
|
_template:
|
||||||
name: argocd-applicationset-metacluster
|
application:
|
||||||
namespace: argo-cd
|
name: applicationset-metacluster
|
||||||
|
namespace: argo-cd
|
||||||
|
cluster:
|
||||||
|
url: https://kubernetes.default.svc
|
||||||
|
repository:
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/mc/GitOps.Config.git
|
||||||
|
revision: main
|
||||||
notify:
|
notify:
|
||||||
- Apply manifests
|
- Apply manifests
|
||||||
|
|
||||||
@@ -0,0 +1,48 @@
|
|||||||
|
- name: Reconfigure traefik container for persistence
|
||||||
|
ansible.builtin.blockinfile:
|
||||||
|
path: /var/lib/rancher/k3s/server/manifests/traefik-config.yaml
|
||||||
|
block: |2
|
||||||
|
deployment:
|
||||||
|
initContainers:
|
||||||
|
- name: volume-permissions
|
||||||
|
image: busybox:1
|
||||||
|
command: ["sh", "-c", "touch /data/acme.json; chown 65532 /data/acme.json; chmod -v 600 /data/acme.json"]
|
||||||
|
securityContext:
|
||||||
|
runAsNonRoot: false
|
||||||
|
runAsGroup: 0
|
||||||
|
runAsUser: 0
|
||||||
|
volumeMounts:
|
||||||
|
- name: data
|
||||||
|
mountPath: /data
|
||||||
|
persistence:
|
||||||
|
enabled: true
|
||||||
|
marker: ' # {mark} ANSIBLE MANAGED BLOCK [persistence]'
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Configure traefik dashboard ingress
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: ingressroute.j2
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.name }}-manifest.yaml
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0600
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: traefik-dashboard
|
||||||
|
namespace: kube-system
|
||||||
|
spec: |2
|
||||||
|
entryPoints:
|
||||||
|
- web
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- kind: Rule
|
||||||
|
match: Host(`ingress.{{ vapp['metacluster.fqdn'] }}`)
|
||||||
|
services:
|
||||||
|
- kind: TraefikService
|
||||||
|
name: api@internal
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Trigger handlers
|
||||||
|
ansible.builtin.meta: flush_handlers
|
||||||
@@ -0,0 +1,100 @@
|
|||||||
|
- name: Configure fallback name resolution
|
||||||
|
ansible.builtin.lineinfile:
|
||||||
|
path: /etc/hosts
|
||||||
|
line: "{{ vapp['guestinfo.ipaddress'] }} {{ item ~ '.' ~ vapp['metacluster.fqdn'] }}"
|
||||||
|
state: present
|
||||||
|
loop:
|
||||||
|
# TODO: Make this list dynamic
|
||||||
|
- ca
|
||||||
|
- git
|
||||||
|
- gitops
|
||||||
|
- ingress
|
||||||
|
- registry
|
||||||
|
- storage
|
||||||
|
|
||||||
|
- name: Create step-ca config dictionary
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
stepconfig: "{{ { 'path': ansible_env.HOME ~ '/.step/config/values.yaml' } }}"
|
||||||
|
|
||||||
|
- name: Create step-ca target folder
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ stepconfig.path | dirname }}"
|
||||||
|
state: directory
|
||||||
|
|
||||||
|
- name: Initialize tempfile
|
||||||
|
ansible.builtin.tempfile:
|
||||||
|
state: file
|
||||||
|
register: stepca_password
|
||||||
|
|
||||||
|
- name: Store password in tempfile
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ stepca_password.path }}"
|
||||||
|
content: "{{ vapp['metacluster.password'] }}"
|
||||||
|
no_log: true
|
||||||
|
|
||||||
|
- name: Generate step-ca helm chart values (including root CA certificate)
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
step ca init \
|
||||||
|
--helm \
|
||||||
|
--deployment-type=standalone \
|
||||||
|
--name=ca.{{ vapp['metacluster.fqdn'] }} \
|
||||||
|
--dns=ca.{{ vapp['metacluster.fqdn'] }} \
|
||||||
|
--dns=step-certificates.step-ca.svc.cluster.local \
|
||||||
|
--dns=127.0.0.1 \
|
||||||
|
--address=:9000 \
|
||||||
|
--provisioner=admin \
|
||||||
|
--acme \
|
||||||
|
--password-file={{ stepca_password.path }} | tee {{ stepconfig.path }}
|
||||||
|
creates: "{{ stepconfig.path }}"
|
||||||
|
|
||||||
|
- name: Cleanup tempfile
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ stepca_password.path }}"
|
||||||
|
state: absent
|
||||||
|
when: stepca_password.path is defined
|
||||||
|
|
||||||
|
- name: Store root CA certificate
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: /usr/local/share/ca-certificates/root_ca.crt
|
||||||
|
content: "{{ (lookup('ansible.builtin.file', stepconfig.path) | from_yaml).inject.certificates.root_ca }}"
|
||||||
|
|
||||||
|
- name: Update certificate truststore
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: update-ca-certificates
|
||||||
|
|
||||||
|
- name: Extract container images (for idempotency purposes)
|
||||||
|
ansible.builtin.unarchive:
|
||||||
|
src: /opt/metacluster/container-images/image-tarballs.tgz
|
||||||
|
dest: /opt/metacluster/container-images
|
||||||
|
remote_src: no
|
||||||
|
when:
|
||||||
|
- lookup('ansible.builtin.fileglob', '/opt/metacluster/container-images/*.tgz') is match('.*image-tarballs.tgz')
|
||||||
|
|
||||||
|
- name: Get all stored fully qualified container image names
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
skopeo list-tags \
|
||||||
|
--insecure-policy \
|
||||||
|
docker-archive:./{{ item | basename }} | \
|
||||||
|
jq -r '.Tags[0]'
|
||||||
|
chdir: /opt/metacluster/container-images
|
||||||
|
register: registry_artifacts
|
||||||
|
loop: "{{ query('ansible.builtin.fileglob', '/opt/metacluster/container-images/*.tar') | sort }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item | basename }}"
|
||||||
|
|
||||||
|
- name: Get source registries of all artifacts
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
source_registries: "{{ (source_registries | default([]) + [(item | split('/'))[0]]) | unique | sort }}"
|
||||||
|
loop: "{{ registry_artifacts | json_query('results[*].stdout') | select | sort }}"
|
||||||
|
|
||||||
|
- name: Configure K3s node for private registry
|
||||||
|
ansible.builtin.template:
|
||||||
|
dest: /etc/rancher/k3s/registries.yaml
|
||||||
|
src: registries.j2
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
registries: "{{ source_registries }}"
|
||||||
|
hv:
|
||||||
|
fqdn: "{{ vapp['metacluster.fqdn'] }}"
|
||||||
@@ -0,0 +1,91 @@
|
|||||||
|
- name: Store custom configuration files
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ item.filename }}"
|
||||||
|
content: "{{ item.content }}"
|
||||||
|
loop:
|
||||||
|
- filename: /etc/rancher/k3s/config.yaml
|
||||||
|
content: |
|
||||||
|
kubelet-arg:
|
||||||
|
- "config=/etc/rancher/k3s/kubelet.config"
|
||||||
|
- "image-gc-high-threshold=95"
|
||||||
|
- filename: /etc/rancher/k3s/kubelet.config
|
||||||
|
content: |
|
||||||
|
apiVersion: kubelet.config.k8s.io/v1beta1
|
||||||
|
kind: KubeletConfiguration
|
||||||
|
|
||||||
|
shutdownGracePeriod: 180s
|
||||||
|
shtudownGracePeriodCriticalPods: 60s
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.filename }}"
|
||||||
|
|
||||||
|
- name: Gather service facts
|
||||||
|
ansible.builtin.service_facts:
|
||||||
|
# Module requires no attributes
|
||||||
|
|
||||||
|
- name: Install K3s
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: ./install.sh
|
||||||
|
chdir: /opt/metacluster/k3s
|
||||||
|
environment:
|
||||||
|
INSTALL_K3S_SKIP_DOWNLOAD: 'true'
|
||||||
|
INSTALL_K3S_EXEC: "server --cluster-init --token {{ vapp['metacluster.token'] | trim }} --tls-san {{ vapp['metacluster.vip'] }} --disable local-storage --config /etc/rancher/k3s/config.yaml"
|
||||||
|
when: ansible_facts.services['k3s.service'] is undefined
|
||||||
|
|
||||||
|
- name: Ensure API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://{{ vapp['guestinfo.ipaddress'] }}:6443/livez?verbose
|
||||||
|
method: GET
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 401]
|
||||||
|
register: api_readycheck
|
||||||
|
until: api_readycheck.json.apiVersion is defined
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.medium | int) }}"
|
||||||
|
|
||||||
|
- name: Install tab-completion
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: |-
|
||||||
|
{{ item }} completion bash > /etc/bash_completion.d/{{ item }}
|
||||||
|
creates: /etc/bash_completion.d/{{ item }}
|
||||||
|
loop:
|
||||||
|
- kubectl
|
||||||
|
- helm
|
||||||
|
- step
|
||||||
|
|
||||||
|
- name: Create kubeconfig dictionary
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
kubeconfig: "{{ { 'path': ansible_env.HOME ~ '/.kube/config' } }}"
|
||||||
|
|
||||||
|
- name: Create kubeconfig target folder
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ kubeconfig.path | dirname }}"
|
||||||
|
state: directory
|
||||||
|
|
||||||
|
- name: Retrieve kubeconfig
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: kubectl config view --raw
|
||||||
|
register: kubectl_config
|
||||||
|
no_log: true
|
||||||
|
|
||||||
|
- name: Store kubeconfig in tempfile
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ kubeconfig.path }}"
|
||||||
|
content: "{{ kubectl_config.stdout }}"
|
||||||
|
mode: 0600
|
||||||
|
no_log: true
|
||||||
|
|
||||||
|
- name: Add label to node object
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
name: "{{ ansible_facts.nodename | lower }}"
|
||||||
|
kind: Node
|
||||||
|
state: patched
|
||||||
|
definition:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
ova.airgappedk8s/moref_id: "{{ moref_id }}"
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
register: k8snode_patch
|
||||||
|
until:
|
||||||
|
- k8snode_patch.result.metadata.labels['ova.airgappedk8s/moref_id'] is defined
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.medium | int) }}"
|
||||||
@@ -0,0 +1,13 @@
|
|||||||
|
- import_tasks: init.yml
|
||||||
|
- import_tasks: k3s.yml
|
||||||
|
- import_tasks: assets.yml
|
||||||
|
- import_tasks: workflow.yml
|
||||||
|
- import_tasks: virtualip.yml
|
||||||
|
- import_tasks: metadata.yml
|
||||||
|
- import_tasks: storage.yml
|
||||||
|
- import_tasks: ingress.yml
|
||||||
|
- import_tasks: certauthority.yml
|
||||||
|
- import_tasks: registry.yml
|
||||||
|
- import_tasks: git.yml
|
||||||
|
- import_tasks: gitops.yml
|
||||||
|
- import_tasks: authentication.yml
|
||||||
@@ -0,0 +1,57 @@
|
|||||||
|
- block:
|
||||||
|
- name: Aggregate manifest-component versions into dictionary
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
manifest_versions: "{{ manifest_versions | default([]) + [ item | combine( {'type': 'manifest', 'id': index } ) ] }}"
|
||||||
|
loop:
|
||||||
|
- name: cluster-api
|
||||||
|
versions:
|
||||||
|
management:
|
||||||
|
base: "{{ components.clusterapi.management.version.base }}"
|
||||||
|
cert_manager: "{{ components.clusterapi.management.version.cert_manager }}"
|
||||||
|
infrastructure_vsphere: "{{ components.clusterapi.management.version.infrastructure_vsphere }}"
|
||||||
|
ipam_incluster: "{{ components.clusterapi.management.version.ipam_incluster }}"
|
||||||
|
cpi_vsphere: "{{ components.clusterapi.management.version.cpi_vsphere }}"
|
||||||
|
workload:
|
||||||
|
calico: "{{ components.clusterapi.workload.version.calico }}"
|
||||||
|
k8s: "{{ components.clusterapi.workload.version.k8s }}"
|
||||||
|
- name: kube-vip
|
||||||
|
version: "{{ components.kubevip.version }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.name }}"
|
||||||
|
index_var: index
|
||||||
|
|
||||||
|
- name: Install json-server chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: json-server
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/json-server
|
||||||
|
release_namespace: json-server
|
||||||
|
create_namespace: true
|
||||||
|
wait: false
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: |
|
||||||
|
{{
|
||||||
|
components['json-server'].chart_values |
|
||||||
|
combine(
|
||||||
|
{ 'jsonServer': { 'seedData': { 'configInline': (
|
||||||
|
{ 'appliance': { "version": appliance.version }, 'components': manifest_versions, 'healthz': { 'status': 'running' } }
|
||||||
|
) | to_json } } }
|
||||||
|
)
|
||||||
|
}}
|
||||||
|
|
||||||
|
- name: Ensure json-server API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://version.{{ vapp['metacluster.fqdn'] }}/healthz
|
||||||
|
method: GET
|
||||||
|
# This mock REST API -ironically- does not support json encoded body argument
|
||||||
|
body_format: raw
|
||||||
|
register: api_readycheck
|
||||||
|
until:
|
||||||
|
- api_readycheck.json.status is defined
|
||||||
|
- api_readycheck.json.status == 'running'
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.long | int) }}"
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201]
|
||||||
@@ -0,0 +1,50 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Install harbor chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: harbor
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/harbor
|
||||||
|
release_namespace: harbor
|
||||||
|
create_namespace: true
|
||||||
|
wait: false
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: "{{ components['harbor'].chart_values }}"
|
||||||
|
|
||||||
|
- name: Ensure harbor API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://registry.{{ vapp['metacluster.fqdn'] }}/api/v2.0/health
|
||||||
|
method: GET
|
||||||
|
register: api_readycheck
|
||||||
|
until:
|
||||||
|
- api_readycheck.json.status is defined
|
||||||
|
- api_readycheck.json.status == 'healthy'
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.long | int) }}"
|
||||||
|
|
||||||
|
- name: Push images to registry
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
skopeo copy \
|
||||||
|
--insecure-policy \
|
||||||
|
--dest-tls-verify=false \
|
||||||
|
--dest-creds admin:{{ vapp['metacluster.password'] }} \
|
||||||
|
docker-archive:./{{ item | basename }} \
|
||||||
|
docker://registry.{{ vapp['metacluster.fqdn'] }}/library/$( \
|
||||||
|
skopeo list-tags \
|
||||||
|
--insecure-policy \
|
||||||
|
docker-archive:./{{ item | basename }} | \
|
||||||
|
jq -r '.Tags[0]')
|
||||||
|
chdir: /opt/metacluster/container-images/
|
||||||
|
register: push_result
|
||||||
|
loop: "{{ query('ansible.builtin.fileglob', '/opt/metacluster/container-images/*.tar') | sort }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item | basename }}"
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ ((storage_benchmark | float) * playbook.delay.short) | int }}"
|
||||||
|
until: push_result is not failed
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201, 401]
|
||||||
|
body_format: json
|
||||||
@@ -0,0 +1,26 @@
|
|||||||
|
- block:
|
||||||
|
- name: Install longhorn chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: longhorn
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/longhorn
|
||||||
|
release_namespace: longhorn-system
|
||||||
|
create_namespace: true
|
||||||
|
wait: false
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: "{{ components['longhorn'].chart_values }}"
|
||||||
|
|
||||||
|
- name: Ensure longhorn API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://storage.{{ vapp['metacluster.fqdn'] }}/v1
|
||||||
|
method: GET
|
||||||
|
register: api_readycheck
|
||||||
|
until:
|
||||||
|
- api_readycheck is not failed
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.long | int) }}"
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201]
|
||||||
|
body_format: json
|
||||||
@@ -0,0 +1,27 @@
|
|||||||
|
- name: Generate kube-vip manifest
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
ctr run --rm --net-host ghcr.io/kube-vip/kube-vip:{{ components.kubevip.version }} vip \
|
||||||
|
/kube-vip manifest daemonset \
|
||||||
|
--interface eth0 \
|
||||||
|
--address {{ vapp['metacluster.vip'] }} \
|
||||||
|
--inCluster \
|
||||||
|
--taint \
|
||||||
|
--controlplane \
|
||||||
|
--services \
|
||||||
|
--arp \
|
||||||
|
--leaderElection
|
||||||
|
register: kubevip_manifest
|
||||||
|
|
||||||
|
- name: Inject manifests
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/kubevip-manifest.yaml
|
||||||
|
content: |
|
||||||
|
{{ lookup('ansible.builtin.file', '/opt/metacluster/kube-vip/rbac.yaml') }}
|
||||||
|
---
|
||||||
|
{{ kubevip_manifest.stdout | replace('imagePullPolicy: Always', 'imagePullPolicy: IfNotPresent') }}
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Trigger handlers
|
||||||
|
ansible.builtin.meta: flush_handlers
|
||||||
@@ -0,0 +1,54 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Create target namespace(s)
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
name: "{{ item }}"
|
||||||
|
kind: Namespace
|
||||||
|
state: present
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
loop:
|
||||||
|
# - argo-workflows
|
||||||
|
- firstboot
|
||||||
|
|
||||||
|
- name: Create ClusterRoleBinding for default serviceaccount
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
state: present
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
definition: |
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
metadata:
|
||||||
|
name: argo-workflows-firstboot-clusteradmin
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: ClusterRole
|
||||||
|
name: cluster-admin
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: default
|
||||||
|
namespace: firstboot
|
||||||
|
|
||||||
|
- name: Install argo-workflows chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: argo-workflows
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/argo-workflows
|
||||||
|
release_namespace: argo-workflows
|
||||||
|
create_namespace: true
|
||||||
|
wait: false
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: "{{ components['argo-workflows'].chart_values }}"
|
||||||
|
|
||||||
|
- name: Ensure argo workflows API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://workflow.{{ vapp['metacluster.fqdn'] }}/api/v1/version
|
||||||
|
method: GET
|
||||||
|
register: api_readycheck
|
||||||
|
until:
|
||||||
|
- api_readycheck.json.version is defined
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.long | int) }}"
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201]
|
||||||
|
body_format: json
|
||||||
@@ -0,0 +1,25 @@
|
|||||||
|
- name: Check for expected vApp properties
|
||||||
|
ansible.builtin.assert:
|
||||||
|
that:
|
||||||
|
- vapp[item] is defined
|
||||||
|
- (vapp[item] | length) > 0
|
||||||
|
quiet: true
|
||||||
|
loop:
|
||||||
|
- deployment.type
|
||||||
|
- guestinfo.dnsserver
|
||||||
|
- guestinfo.gateway
|
||||||
|
- guestinfo.hostname
|
||||||
|
- guestinfo.ipaddress
|
||||||
|
- guestinfo.prefixlength
|
||||||
|
- guestinfo.rootsshkey
|
||||||
|
- hv.fqdn
|
||||||
|
- hv.password
|
||||||
|
- hv.username
|
||||||
|
- ippool.endip
|
||||||
|
- ippool.startip
|
||||||
|
- metacluster.fqdn
|
||||||
|
- metacluster.password
|
||||||
|
- metacluster.token
|
||||||
|
- metacluster.vip
|
||||||
|
- workloadcluster.name
|
||||||
|
- workloadcluster.vip
|
||||||
@@ -0,0 +1,40 @@
|
|||||||
|
- name: Initialize tempfolder
|
||||||
|
ansible.builtin.tempfile:
|
||||||
|
state: directory
|
||||||
|
register: pinniped_kubeconfig
|
||||||
|
|
||||||
|
- name: Pull existing repository
|
||||||
|
ansible.builtin.git:
|
||||||
|
repo: https://git.{{ vapp['metacluster.fqdn'] }}/wl/ClusterAccess.Store.git
|
||||||
|
dest: "{{ pinniped_kubeconfig.path }}"
|
||||||
|
version: main
|
||||||
|
|
||||||
|
- name: Generate kubeconfig
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: pinniped get kubeconfig --kubeconfig {{ capi_kubeconfig.path }}
|
||||||
|
register: pinniped_config
|
||||||
|
until:
|
||||||
|
- pinniped_config is not failed
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ ((storage_benchmark | float) * playbook.delay.short) | int }}"
|
||||||
|
|
||||||
|
- name: Store kubeconfig in tempfile
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ pinniped_kubeconfig.path }}/kubeconfig"
|
||||||
|
content: "{{ pinniped_config.stdout }}"
|
||||||
|
mode: 0600
|
||||||
|
no_log: true
|
||||||
|
|
||||||
|
- name: Push git repository
|
||||||
|
lvrfrc87.git_acp.git_acp:
|
||||||
|
path: "{{ pinniped_kubeconfig.path }}"
|
||||||
|
branch: main
|
||||||
|
comment: "Upload kubeconfig files"
|
||||||
|
add:
|
||||||
|
- .
|
||||||
|
url: https://administrator:{{ vapp['metacluster.password'] | urlencode }}@git.{{ vapp['metacluster.fqdn'] }}/wl/ClusterAccess.Store.git
|
||||||
|
environment:
|
||||||
|
GIT_AUTHOR_NAME: administrator
|
||||||
|
GIT_AUTHOR_EMAIL: administrator@{{ vapp['metacluster.fqdn'] }}
|
||||||
|
GIT_COMMITTER_NAME: administrator
|
||||||
|
GIT_COMMITTER_EMAIL: administrator@{{ vapp['metacluster.fqdn'] }}
|
||||||
@@ -0,0 +1,328 @@
|
|||||||
|
- block:
|
||||||
|
# Below tasks circumvent usernames with `<domain>\<username>` format, which causes CAPV to
|
||||||
|
# incorrectly interpret the backslash (despite automatic escaping) as an escape sequence.
|
||||||
|
# `vcenter_session.user` will instead contain the username in `<username>@<domain>` format.
|
||||||
|
|
||||||
|
- name: Generate vCenter API token
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://{{ vapp['hv.fqdn'] }}/api/session
|
||||||
|
method: POST
|
||||||
|
headers:
|
||||||
|
Authorization: Basic {{ ( vapp['hv.username'] ~ ':' ~ vapp['hv.password'] ) | b64encode }}
|
||||||
|
register: vcenterapi_token
|
||||||
|
|
||||||
|
- name: Retrieve vCenter API session details
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://{{ vapp['hv.fqdn'] }}/api/session
|
||||||
|
method: GET
|
||||||
|
headers:
|
||||||
|
vmware-api-session-id: "{{ vcenterapi_token.json }}"
|
||||||
|
register: vcenter_session
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201]
|
||||||
|
body_format: json
|
||||||
|
|
||||||
|
- name: Configure clusterctl
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: clusterctl.j2
|
||||||
|
dest: /opt/metacluster/cluster-api/clusterctl.yaml
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
version:
|
||||||
|
base: "{{ components.clusterapi.management.version.base }}"
|
||||||
|
cert_manager: "{{ components.clusterapi.management.version.cert_manager }}"
|
||||||
|
infrastructure_vsphere: "{{ components.clusterapi.management.version.infrastructure_vsphere }}"
|
||||||
|
ipam_incluster: "{{ components.clusterapi.management.version.ipam_incluster }}"
|
||||||
|
hv:
|
||||||
|
fqdn: "{{ vapp['hv.fqdn'] }}"
|
||||||
|
tlsthumbprint: "{{ tls_thumbprint.stdout }}"
|
||||||
|
username: "{{ vcenter_session.json.user }}"
|
||||||
|
password: "{{ vapp['hv.password'] }}"
|
||||||
|
datacenter: "{{ vcenter_info.datacenter }}"
|
||||||
|
datastore: "{{ vcenter_info.datastore }}"
|
||||||
|
network: "{{ vcenter_info.network }}"
|
||||||
|
resourcepool: "{{ vcenter_info.resourcepool }}"
|
||||||
|
folder: "{{ vcenter_info.folder }}"
|
||||||
|
cluster:
|
||||||
|
nodetemplate: "{{ nodetemplate_inventorypath }}"
|
||||||
|
publickey: "{{ vapp['guestinfo.rootsshkey'] }}"
|
||||||
|
version: "{{ components.clusterapi.workload.version.k8s }}"
|
||||||
|
vip: "{{ vapp['workloadcluster.vip'] }}"
|
||||||
|
|
||||||
|
- name: Generate cluster-template kustomization manifest
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: kustomization.cluster-template.j2
|
||||||
|
dest: /opt/metacluster/cluster-api/infrastructure-vsphere/{{ components.clusterapi.management.version.infrastructure_vsphere }}/kustomization.yaml
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
network:
|
||||||
|
fqdn: "{{ vapp['metacluster.fqdn'] }}"
|
||||||
|
dnsserver: "{{ vapp['guestinfo.dnsserver'] }}"
|
||||||
|
nodesize:
|
||||||
|
cpu: "{{ config.clusterapi.size_matrix[ vapp['workloadcluster.nodesize'] ].cpu }}"
|
||||||
|
memory: "{{ config.clusterapi.size_matrix[ vapp['workloadcluster.nodesize'] ].memory }}"
|
||||||
|
rootca: "{{ stepca_cm_certs.resources[0].data['root_ca.crt'] }}"
|
||||||
|
runcmds:
|
||||||
|
- update-ca-certificates
|
||||||
|
registries: "{{ source_registries }}"
|
||||||
|
|
||||||
|
- name: Store custom cluster-template
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: /opt/metacluster/cluster-api/custom-cluster-template.yaml
|
||||||
|
content: "{{ lookup('kubernetes.core.kustomize', dir='/opt/metacluster/cluster-api/infrastructure-vsphere/' ~ components.clusterapi.management.version.infrastructure_vsphere ) }}"
|
||||||
|
|
||||||
|
- name: Initialize Cluster API management cluster
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
clusterctl init \
|
||||||
|
-v5 \
|
||||||
|
--infrastructure vsphere:{{ components.clusterapi.management.version.infrastructure_vsphere }} \
|
||||||
|
--ipam in-cluster:{{ components.clusterapi.management.version.ipam_incluster }} \
|
||||||
|
--config ./clusterctl.yaml \
|
||||||
|
--kubeconfig {{ kubeconfig.path }}
|
||||||
|
chdir: /opt/metacluster/cluster-api
|
||||||
|
|
||||||
|
- name: Initialize tempfolder
|
||||||
|
ansible.builtin.tempfile:
|
||||||
|
state: directory
|
||||||
|
register: capi_clustermanifest
|
||||||
|
|
||||||
|
- name: Pull existing repository
|
||||||
|
ansible.builtin.git:
|
||||||
|
repo: https://git.{{ vapp['metacluster.fqdn'] }}/mc/GitOps.ClusterAPI.git
|
||||||
|
dest: "{{ capi_clustermanifest.path }}"
|
||||||
|
version: main
|
||||||
|
|
||||||
|
- name: Generate Cluster API provider manifests
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
clusterctl generate provider \
|
||||||
|
-v5 \
|
||||||
|
--{{ item.type }} {{ item.name }}:{{ item.version }} \
|
||||||
|
--config ./clusterctl.yaml > {{ capi_clustermanifest.path }}/provider-{{ item.name }}.yaml
|
||||||
|
chdir: /opt/metacluster/cluster-api
|
||||||
|
loop:
|
||||||
|
- type: infrastructure
|
||||||
|
name: vsphere
|
||||||
|
version: "{{ components.clusterapi.management.version.infrastructure_vsphere }}"
|
||||||
|
- type: ipam
|
||||||
|
name: in-cluster
|
||||||
|
version: "{{ components.clusterapi.management.version.ipam_incluster }}"
|
||||||
|
|
||||||
|
- name: Split cluster API provider manifests into separate files
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
awk 'BEGINFILE {print "---"}{print}' {{ capi_clustermanifest.path }}/provider-*.yaml |
|
||||||
|
kubectl slice \
|
||||||
|
-o {{ capi_clustermanifest.path }}/providers
|
||||||
|
|
||||||
|
- name: Ensure controller availability
|
||||||
|
kubernetes.core.k8s_info:
|
||||||
|
kind: Deployment
|
||||||
|
name: "{{ item.name }}"
|
||||||
|
namespace: "{{ item.namespace }}"
|
||||||
|
wait: true
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
loop:
|
||||||
|
- name: capi-ipam-in-cluster-controller-manager
|
||||||
|
namespace: capi-ipam-in-cluster-system
|
||||||
|
- name: capi-controller-manager
|
||||||
|
namespace: capi-system
|
||||||
|
- name: capv-controller-manager
|
||||||
|
namespace: capv-system
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.name }}"
|
||||||
|
|
||||||
|
- name: Parse vApp for workload cluster sizing
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
clustersize: >-
|
||||||
|
{{ {
|
||||||
|
'controlplane': vapp['deployment.type'] | regex_findall('^cp(\d)+') | first,
|
||||||
|
'worker': vapp['deployment.type'] | regex_findall('w(\d)+') | first,
|
||||||
|
'workerstorage': vapp['deployment.type'] | regex_findall('ws(\d)+$') | first
|
||||||
|
} }}
|
||||||
|
|
||||||
|
- name: Generate workload cluster manifest
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
clusterctl generate cluster \
|
||||||
|
{{ vapp['workloadcluster.name'] | lower }} \
|
||||||
|
--control-plane-machine-count {{ clustersize.controlplane }} \
|
||||||
|
--worker-machine-count {{ clustersize.worker }} \
|
||||||
|
--from ./custom-cluster-template.yaml \
|
||||||
|
--config ./clusterctl.yaml \
|
||||||
|
--kubeconfig {{ kubeconfig.path }}
|
||||||
|
chdir: /opt/metacluster/cluster-api
|
||||||
|
register: clusterctl_newcluster
|
||||||
|
|
||||||
|
- name: Save workload cluster manifest
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ capi_clustermanifest.path }}/new-cluster.yaml"
|
||||||
|
content: "{{ clusterctl_newcluster.stdout }}"
|
||||||
|
|
||||||
|
- name: Split workload cluster manifest into separate files
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
kubectl slice \
|
||||||
|
-f {{ capi_clustermanifest.path }}/new-cluster.yaml \
|
||||||
|
-o {{ capi_clustermanifest.path }}/downstream-cluster
|
||||||
|
|
||||||
|
- name: Generate nodepool kustomization manifest
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: kustomization.longhorn-storage.j2
|
||||||
|
dest: "{{ capi_clustermanifest.path }}/kustomization.yaml"
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
cluster:
|
||||||
|
name: "{{ vapp['workloadcluster.name'] }}"
|
||||||
|
nodepool:
|
||||||
|
size: "{{ clustersize.workerstorage }}"
|
||||||
|
additionaldisk: "{{ vapp['workloadcluster.additionaldisk'] }}"
|
||||||
|
|
||||||
|
- name: Store nodepool manifest
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ capi_clustermanifest.path }}/nodepool-worker-storage.yaml"
|
||||||
|
content: "{{ lookup('kubernetes.core.kustomize', dir=capi_clustermanifest.path) }}"
|
||||||
|
|
||||||
|
- name: Split nodepool manifest into separate files
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
kubectl slice \
|
||||||
|
-f {{ capi_clustermanifest.path }}/nodepool-worker-storage.yaml \
|
||||||
|
-o {{ capi_clustermanifest.path }}/downstream-cluster
|
||||||
|
|
||||||
|
- name: Create in-cluster IpPool
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: ippool.j2
|
||||||
|
dest: "{{ capi_clustermanifest.path }}/downstream-cluster/inclusterippool-{{ _template.cluster.name }}.yml"
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
cluster:
|
||||||
|
name: "{{ vapp['workloadcluster.name'] | lower }}"
|
||||||
|
namespace: default
|
||||||
|
network:
|
||||||
|
startip: "{{ vapp['ippool.startip'] }}"
|
||||||
|
endip: "{{ vapp['ippool.endip'] }}"
|
||||||
|
prefix: "{{ vapp['guestinfo.prefixlength'] }}"
|
||||||
|
gateway: "{{ vapp['guestinfo.gateway'] }}"
|
||||||
|
|
||||||
|
- name: Push git repository
|
||||||
|
lvrfrc87.git_acp.git_acp:
|
||||||
|
path: "{{ capi_clustermanifest.path }}"
|
||||||
|
branch: main
|
||||||
|
comment: "Upload manifests"
|
||||||
|
add:
|
||||||
|
- ./downstream-cluster
|
||||||
|
- ./providers
|
||||||
|
clean: untracked
|
||||||
|
url: https://administrator:{{ vapp['metacluster.password'] | urlencode }}@git.{{ vapp['metacluster.fqdn'] }}/mc/GitOps.ClusterAPI.git
|
||||||
|
environment:
|
||||||
|
GIT_AUTHOR_NAME: administrator
|
||||||
|
GIT_AUTHOR_EMAIL: administrator@{{ vapp['metacluster.fqdn'] }}
|
||||||
|
GIT_COMMITTER_NAME: administrator
|
||||||
|
GIT_COMMITTER_EMAIL: administrator@{{ vapp['metacluster.fqdn'] }}
|
||||||
|
|
||||||
|
# - name: Cleanup tempfolder
|
||||||
|
# ansible.builtin.file:
|
||||||
|
# path: "{{ capi_clustermanifest.path }}"
|
||||||
|
# state: absent
|
||||||
|
# when: capi_clustermanifest.path is defined
|
||||||
|
|
||||||
|
- name: Configure Cluster API repository
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: gitrepo.j2
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.name }}-manifest.yaml
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0600
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: gitrepo-mc-gitopsclusterapi
|
||||||
|
namespace: argo-cd
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/mc/GitOps.ClusterAPI.git
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: WORKAROUND - Wait for ingress ACME requests to complete
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
openssl s_client -connect registry.{{ vapp['metacluster.fqdn'] }}:443 -servername registry.{{ vapp['metacluster.fqdn'] }} 2>/dev/null </dev/null | \
|
||||||
|
openssl x509 -noout -subject | \
|
||||||
|
grep 'subject=CN = registry.{{ vapp['metacluster.fqdn'] }}'
|
||||||
|
register: certificate_subject
|
||||||
|
until: certificate_subject is not failed
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.medium | int) }}"
|
||||||
|
|
||||||
|
- name: Create application
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: application.j2
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.application.name }}-manifest.yaml
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0600
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
application:
|
||||||
|
name: application-clusterapi-workloadcluster
|
||||||
|
namespace: argo-cd
|
||||||
|
cluster:
|
||||||
|
name: https://kubernetes.default.svc
|
||||||
|
namespace: default
|
||||||
|
repository:
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/mc/GitOps.ClusterAPI.git
|
||||||
|
path: downstream-cluster
|
||||||
|
revision: main
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Trigger handlers
|
||||||
|
ansible.builtin.meta: flush_handlers
|
||||||
|
|
||||||
|
- name: Wait for cluster to be available
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
kubectl wait clusters.cluster.x-k8s.io/{{ vapp['workloadcluster.name'] | lower }} \
|
||||||
|
--for=condition=Ready \
|
||||||
|
--timeout 0s
|
||||||
|
register: cluster_readycheck
|
||||||
|
until: cluster_readycheck is succeeded
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.long | int) }}"
|
||||||
|
|
||||||
|
- name: Initialize tempfile
|
||||||
|
ansible.builtin.tempfile:
|
||||||
|
state: file
|
||||||
|
register: capi_kubeconfig
|
||||||
|
|
||||||
|
- name: Retrieve kubeconfig
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
clusterctl get kubeconfig \
|
||||||
|
{{ vapp['workloadcluster.name'] | lower }} \
|
||||||
|
--kubeconfig {{ kubeconfig.path }}
|
||||||
|
register: capi_kubectl_config
|
||||||
|
|
||||||
|
- name: Store kubeconfig in tempfile
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ capi_kubeconfig.path }}"
|
||||||
|
content: "{{ capi_kubectl_config.stdout }}"
|
||||||
|
mode: 0600
|
||||||
|
no_log: true
|
||||||
|
|
||||||
|
# TODO: move to git repo
|
||||||
|
- name: Apply cni plugin manifest
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
definition: |
|
||||||
|
{{
|
||||||
|
lookup('ansible.builtin.file', '/opt/metacluster/cluster-api/cni-calico/' ~ components.clusterapi.workload.version.calico ~ '/calico.yaml') |
|
||||||
|
regex_replace('# - name: CALICO_IPV4POOL_CIDR', '- name: CALICO_IPV4POOL_CIDR') |
|
||||||
|
regex_replace('# value: "192.168.0.0/16"', ' value: "172.30.0.0/16"')
|
||||||
|
}}
|
||||||
|
state: present
|
||||||
|
wait: true
|
||||||
|
kubeconfig: "{{ capi_kubeconfig.path }}"
|
||||||
|
# TODO: move to git repo
|
||||||
@@ -0,0 +1,132 @@
|
|||||||
|
- name: Aggregate helm charts from filesystem
|
||||||
|
ansible.builtin.find:
|
||||||
|
path: /opt/workloadcluster/helm-charts
|
||||||
|
file_type: directory
|
||||||
|
recurse: false
|
||||||
|
register: helm_charts
|
||||||
|
|
||||||
|
- name: Pull existing repository
|
||||||
|
ansible.builtin.git:
|
||||||
|
repo: https://git.{{ vapp['metacluster.fqdn'] }}/wl/GitOps.Config.git
|
||||||
|
dest: /opt/workloadcluster/git-repositories/gitops
|
||||||
|
version: main
|
||||||
|
|
||||||
|
- name: Create folder structure within new git-repository
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
state: directory
|
||||||
|
loop:
|
||||||
|
- /opt/workloadcluster/git-repositories/gitops/charts
|
||||||
|
- /opt/workloadcluster/git-repositories/gitops/values
|
||||||
|
|
||||||
|
- name: Create hard-links to populate new git-repository
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
cp -lr {{ item.path }}/ /opt/workloadcluster/git-repositories/gitops/charts
|
||||||
|
loop: "{{ helm_charts.files }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.path | basename }}"
|
||||||
|
|
||||||
|
- name: Write custom manifests to respective chart templates store
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "{{ src }}"
|
||||||
|
dest: /opt/workloadcluster/git-repositories/gitops/charts/{{ manifest.value.namespace }}/{{ manifest.key }}/templates/{{ (src | split('.'))[0] ~ '-' ~ _template.name ~ '.yaml' }}
|
||||||
|
vars:
|
||||||
|
manifest: "{{ item.0 }}"
|
||||||
|
src: "{{ item.1.src }}"
|
||||||
|
_template: "{{ item.1._template }}"
|
||||||
|
loop: "{{ query('ansible.builtin.subelements', query('ansible.builtin.dict', downstream_components), 'value.extra_manifests') }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ (src | split('.'))[0] ~ '-' ~ _template.name }}"
|
||||||
|
|
||||||
|
- name: Create subfolders
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: /opt/workloadcluster/git-repositories/gitops/values/{{ item.key }}
|
||||||
|
state: directory
|
||||||
|
loop: "{{ query('ansible.builtin.dict', downstream_components) }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.key }}"
|
||||||
|
|
||||||
|
- name: Write chart values to file
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: /opt/workloadcluster/git-repositories/gitops/values/{{ item.key }}/values.yaml
|
||||||
|
content: "{{ item.value.chart_values | default('# Empty') | to_nice_yaml(indent=2, width=4096) }}"
|
||||||
|
loop: "{{ query('ansible.builtin.dict', downstream_components) }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.key }}"
|
||||||
|
|
||||||
|
- name: Push git repository
|
||||||
|
lvrfrc87.git_acp.git_acp:
|
||||||
|
path: /opt/workloadcluster/git-repositories/gitops
|
||||||
|
branch: main
|
||||||
|
comment: "Upload charts"
|
||||||
|
add:
|
||||||
|
- .
|
||||||
|
url: https://administrator:{{ vapp['metacluster.password'] | urlencode }}@git.{{ vapp['metacluster.fqdn'] }}/wl/GitOps.Config.git
|
||||||
|
environment:
|
||||||
|
GIT_AUTHOR_NAME: administrator
|
||||||
|
GIT_AUTHOR_EMAIL: administrator@{{ vapp['metacluster.fqdn'] }}
|
||||||
|
GIT_COMMITTER_NAME: administrator
|
||||||
|
GIT_COMMITTER_EMAIL: administrator@{{ vapp['metacluster.fqdn'] }}
|
||||||
|
|
||||||
|
- name: Retrieve workload-cluster kubeconfig
|
||||||
|
kubernetes.core.k8s_info:
|
||||||
|
kind: Secret
|
||||||
|
name: "{{ vapp['workloadcluster.name'] }}-kubeconfig"
|
||||||
|
namespace: default
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
register: secret_workloadcluster_kubeconfig
|
||||||
|
|
||||||
|
- name: Register workload-cluster in argo-cd
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
template: cluster.j2
|
||||||
|
state: present
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
cluster:
|
||||||
|
name: "{{ vapp['workloadcluster.name'] | lower }}"
|
||||||
|
secret: argocd-cluster-{{ vapp['workloadcluster.name'] | lower }}
|
||||||
|
url: https://{{ vapp['workloadcluster.vip'] }}:6443
|
||||||
|
kubeconfig:
|
||||||
|
ca: "{{ (secret_workloadcluster_kubeconfig.resources[0].data.value | b64decode | from_yaml).clusters[0].cluster['certificate-authority-data'] }}"
|
||||||
|
certificate: "{{ (secret_workloadcluster_kubeconfig.resources[0].data.value | b64decode | from_yaml).users[0].user['client-certificate-data'] }}"
|
||||||
|
key: "{{ (secret_workloadcluster_kubeconfig.resources[0].data.value | b64decode | from_yaml).users[0].user['client-key-data'] }}"
|
||||||
|
|
||||||
|
- name: Configure workload-cluster GitOps repository
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: gitrepo.j2
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.name }}-manifest.yaml
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0600
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
name: gitrepo-wl-gitopsconfig
|
||||||
|
namespace: argo-cd
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/wl/GitOps.Config.git
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Create applicationset
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: applicationset.j2
|
||||||
|
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.application.name }}-manifest.yaml
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: 0600
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
application:
|
||||||
|
name: applicationset-workloadcluster
|
||||||
|
namespace: argo-cd
|
||||||
|
cluster:
|
||||||
|
url: https://{{ vapp['workloadcluster.vip'] }}:6443
|
||||||
|
repository:
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/wl/GitOps.Config.git
|
||||||
|
revision: main
|
||||||
|
notify:
|
||||||
|
- Apply manifests
|
||||||
|
|
||||||
|
- name: Trigger handlers
|
||||||
|
ansible.builtin.meta: flush_handlers
|
||||||
@@ -0,0 +1,12 @@
|
|||||||
|
- import_tasks: hypervisor.yml
|
||||||
|
- import_tasks: registry.yml
|
||||||
|
- import_tasks: nodetemplates.yml
|
||||||
|
|
||||||
|
- block:
|
||||||
|
|
||||||
|
- import_tasks: clusterapi.yml
|
||||||
|
- import_tasks: gitops.yml
|
||||||
|
- import_tasks: authentication.yml
|
||||||
|
|
||||||
|
when:
|
||||||
|
- vapp['deployment.type'] != 'core'
|
||||||
@@ -0,0 +1,40 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Create dedicated kubeadm project within container registry
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://registry.{{ vapp['metacluster.fqdn'] }}/api/v2.0/projects
|
||||||
|
method: POST
|
||||||
|
headers:
|
||||||
|
Authorization: "Basic {{ ('admin:' ~ vapp['metacluster.password']) | b64encode }}"
|
||||||
|
body:
|
||||||
|
project_name: kubeadm
|
||||||
|
public: true
|
||||||
|
storage_limit: 0
|
||||||
|
metadata:
|
||||||
|
enable_content_trust: 'false'
|
||||||
|
enable_content_trust_cosign: 'false'
|
||||||
|
auto_scan: 'true'
|
||||||
|
severity: none
|
||||||
|
prevent_vul: 'false'
|
||||||
|
public: 'true'
|
||||||
|
reuse_sys_cve_allowlist: 'true'
|
||||||
|
|
||||||
|
- name: Lookup kubeadm container images
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
kubeadm_images: "{{ lookup('ansible.builtin.file', '/opt/metacluster/cluster-api/imagelist').splitlines() }}"
|
||||||
|
|
||||||
|
- name: Copy kubeadm container images to dedicated project
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://registry.{{ vapp['metacluster.fqdn'] }}/api/v2.0/projects/kubeadm/repositories/{{ ( item | regex_findall('([^:/]+)') )[-2] }}/artifacts?from=library/{{ item | replace('/', '%2F') | replace(':', '%3A') }}
|
||||||
|
method: POST
|
||||||
|
headers:
|
||||||
|
Authorization: "Basic {{ ('admin:' ~ vapp['metacluster.password']) | b64encode }}"
|
||||||
|
body:
|
||||||
|
from: "{{ item }}"
|
||||||
|
loop: "{{ kubeadm_images }}"
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201, 409]
|
||||||
|
body_format: json
|
||||||
@@ -0,0 +1,16 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.application.name }}
|
||||||
|
namespace: {{ _template.application.namespace }}
|
||||||
|
spec:
|
||||||
|
destination:
|
||||||
|
namespace: {{ _template.cluster.namespace }}
|
||||||
|
server: {{ _template.cluster.name }}
|
||||||
|
project: default
|
||||||
|
source:
|
||||||
|
repoURL: {{ _template.repository.url }}
|
||||||
|
path: {{ _template.repository.path }}
|
||||||
|
targetRevision: {{ _template.repository.revision }}
|
||||||
|
syncPolicy:
|
||||||
|
automated: {}
|
||||||
@@ -0,0 +1,33 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: ApplicationSet
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.application.name }}
|
||||||
|
namespace: {{ _template.application.namespace }}
|
||||||
|
spec:
|
||||||
|
generators:
|
||||||
|
- git:
|
||||||
|
repoURL: {{ _template.repository.url }}
|
||||||
|
revision: {{ _template.repository.revision }}
|
||||||
|
directories:
|
||||||
|
- path: charts/*/*
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
name: application-{% raw %}{{ path.basename }}{% endraw +%}
|
||||||
|
spec:
|
||||||
|
project: default
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
|
sources:
|
||||||
|
- repoURL: {{ _template.repository.url }}
|
||||||
|
targetRevision: {{ _template.repository.revision }}
|
||||||
|
path: {% raw %}'{{ path }}'{% endraw +%}
|
||||||
|
helm:
|
||||||
|
valueFiles:
|
||||||
|
- /values/{% raw %}{{ path.basename }}{% endraw %}/values.yaml
|
||||||
|
destination:
|
||||||
|
server: {{ _template.cluster.url }}
|
||||||
|
namespace: {% raw %}'{{ path[1] }}'{% endraw +%}
|
||||||
@@ -0,0 +1,20 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.cluster.secret }}
|
||||||
|
namespace: argo-cd
|
||||||
|
labels:
|
||||||
|
argocd.argoproj.io/secret-type: cluster
|
||||||
|
type: Opaque
|
||||||
|
stringData:
|
||||||
|
name: {{ _template.cluster.name }}
|
||||||
|
server: {{ _template.cluster.url }}
|
||||||
|
config: |
|
||||||
|
{
|
||||||
|
"tlsClientConfig": {
|
||||||
|
"insecure": false,
|
||||||
|
"caData": "{{ _template.kubeconfig.ca }}",
|
||||||
|
"certData": "{{ _template.kubeconfig.certificate }}",
|
||||||
|
"keyData": "{{ _template.kubeconfig.key }}"
|
||||||
|
}
|
||||||
|
}
|
||||||
@@ -11,9 +11,13 @@ providers:
|
|||||||
- name: "vsphere"
|
- name: "vsphere"
|
||||||
url: "/opt/metacluster/cluster-api/infrastructure-vsphere/{{ _template.version.infrastructure_vsphere }}/infrastructure-components.yaml"
|
url: "/opt/metacluster/cluster-api/infrastructure-vsphere/{{ _template.version.infrastructure_vsphere }}/infrastructure-components.yaml"
|
||||||
type: "InfrastructureProvider"
|
type: "InfrastructureProvider"
|
||||||
|
- name: "in-cluster"
|
||||||
|
url: "/opt/metacluster/cluster-api/ipam-in-cluster/{{ _template.version.ipam_incluster }}/ipam-components.yaml"
|
||||||
|
type: "IPAMProvider"
|
||||||
|
|
||||||
cert-manager:
|
cert-manager:
|
||||||
url: "/opt/metacluster/cluster-api/cert-manager/{{ _template.version.cert_manager }}/cert-manager.yaml"
|
url: "/opt/metacluster/cluster-api/cert-manager/{{ _template.version.cert_manager }}/cert-manager.yaml"
|
||||||
|
version: "{{ _template.version.cert_manager }}"
|
||||||
|
|
||||||
## -- Controller settings -- ##
|
## -- Controller settings -- ##
|
||||||
VSPHERE_SERVER: "{{ _template.hv.fqdn }}"
|
VSPHERE_SERVER: "{{ _template.hv.fqdn }}"
|
||||||
@@ -34,5 +38,5 @@ VSPHERE_SSH_AUTHORIZED_KEY: "{{ _template.cluster.publickey }}"
|
|||||||
|
|
||||||
KUBERNETES_VERSION: "{{ _template.cluster.version }}"
|
KUBERNETES_VERSION: "{{ _template.cluster.version }}"
|
||||||
CONTROL_PLANE_ENDPOINT_IP: "{{ _template.cluster.vip }}"
|
CONTROL_PLANE_ENDPOINT_IP: "{{ _template.cluster.vip }}"
|
||||||
VIP_NETWORK_INTERFACE: "eth0"
|
VIP_NETWORK_INTERFACE: ""
|
||||||
EXP_CLUSTER_RESOURCE_SET: "true"
|
EXP_CLUSTER_RESOURCE_SET: "true"
|
||||||
@@ -0,0 +1,7 @@
|
|||||||
|
apiVersion: config.supervisor.pinniped.dev/v1alpha1
|
||||||
|
kind: FederationDomain
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.name }}
|
||||||
|
namespace: {{ _template.namespace }}
|
||||||
|
spec:
|
||||||
|
{{ _template.spec }}
|
||||||
@@ -0,0 +1,9 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.name }}
|
||||||
|
namespace: {{ _template.namespace }}
|
||||||
|
labels:
|
||||||
|
argocd.argoproj.io/secret-type: repository
|
||||||
|
stringData:
|
||||||
|
url: {{ _template.url }}
|
||||||
@@ -4,4 +4,4 @@ metadata:
|
|||||||
name: {{ _template.name }}
|
name: {{ _template.name }}
|
||||||
namespace: {{ _template.namespace }}
|
namespace: {{ _template.namespace }}
|
||||||
spec:
|
spec:
|
||||||
{{ _template.config }}
|
{{ _template.spec }}
|
||||||
@@ -4,4 +4,4 @@ metadata:
|
|||||||
name: {{ _template.name }}
|
name: {{ _template.name }}
|
||||||
namespace: {{ _template.namespace }}
|
namespace: {{ _template.namespace }}
|
||||||
spec:
|
spec:
|
||||||
{{ _template.config }}
|
{{ _template.spec }}
|
||||||
@@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: ipam.cluster.x-k8s.io/v1alpha2
|
||||||
|
kind: InClusterIPPool
|
||||||
|
metadata:
|
||||||
|
name: inclusterippool-{{ _template.cluster.name }}
|
||||||
|
namespace: {{ _template.cluster.namespace }}
|
||||||
|
spec:
|
||||||
|
addresses:
|
||||||
|
- {{ _template.cluster.network.startip }}-{{ _template.cluster.network.endip }}
|
||||||
|
prefix: {{ _template.cluster.network.prefix }}
|
||||||
|
gateway: {{ _template.cluster.network.gateway }}
|
||||||
@@ -0,0 +1,6 @@
|
|||||||
|
apiVersion: authentication.concierge.pinniped.dev/v1alpha1
|
||||||
|
kind: JWTAuthenticator
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.name }}
|
||||||
|
spec:
|
||||||
|
{{ _template.spec }}
|
||||||
@@ -0,0 +1,266 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
resources:
|
||||||
|
- cluster-template.yaml
|
||||||
|
|
||||||
|
patches:
|
||||||
|
- patch: |-
|
||||||
|
apiVersion: controlplane.cluster.x-k8s.io/v1beta1
|
||||||
|
kind: KubeadmControlPlane
|
||||||
|
metadata:
|
||||||
|
name: '${CLUSTER_NAME}'
|
||||||
|
namespace: '${NAMESPACE}'
|
||||||
|
spec:
|
||||||
|
kubeadmConfigSpec:
|
||||||
|
clusterConfiguration:
|
||||||
|
imageRepository: registry.{{ _template.network.fqdn }}/kubeadm
|
||||||
|
- patch: |-
|
||||||
|
apiVersion: bootstrap.cluster.x-k8s.io/v1beta1
|
||||||
|
kind: KubeadmConfigTemplate
|
||||||
|
metadata:
|
||||||
|
name: '${CLUSTER_NAME}-md-0'
|
||||||
|
namespace: '${NAMESPACE}'
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
clusterConfiguration:
|
||||||
|
imageRepository: registry.{{ _template.network.fqdn }}/kubeadm
|
||||||
|
- patch: |-
|
||||||
|
apiVersion: bootstrap.cluster.x-k8s.io/v1beta1
|
||||||
|
kind: KubeadmConfigTemplate
|
||||||
|
metadata:
|
||||||
|
name: '${CLUSTER_NAME}-md-0'
|
||||||
|
namespace: '${NAMESPACE}'
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
files:
|
||||||
|
- content: |
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".registry]
|
||||||
|
config_path = "/etc/containerd/certs.d"
|
||||||
|
append: true
|
||||||
|
path: /etc/containerd/config.toml
|
||||||
|
{% for registry in _template.registries %}
|
||||||
|
- content: |
|
||||||
|
server = "https://{{ registry }}"
|
||||||
|
|
||||||
|
[host."https://registry.{{ _template.network.fqdn }}/v2/library/{{ registry }}"]
|
||||||
|
capabilities = ["pull", "resolve"]
|
||||||
|
override_path = true
|
||||||
|
owner: root:root
|
||||||
|
path: /etc/containerd/certs.d/{{ registry }}/hosts.toml
|
||||||
|
{% endfor %}
|
||||||
|
- content: |
|
||||||
|
network: {config: disabled}
|
||||||
|
owner: root:root
|
||||||
|
path: /etc/cloud/cloud.cfg.d/99-disable-network-config.cfg
|
||||||
|
- content: |
|
||||||
|
{{ _template.rootca | indent(width=14, first=False) | trim }}
|
||||||
|
owner: root:root
|
||||||
|
path: /usr/local/share/ca-certificates/root_ca.crt
|
||||||
|
- patch: |-
|
||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1beta1
|
||||||
|
kind: VSphereMachineTemplate
|
||||||
|
metadata:
|
||||||
|
name: ${CLUSTER_NAME}
|
||||||
|
namespace: '${NAMESPACE}'
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
diskGiB: 60
|
||||||
|
network:
|
||||||
|
devices:
|
||||||
|
- dhcp4: false
|
||||||
|
addressesFromPools:
|
||||||
|
- apiGroup: ipam.cluster.x-k8s.io
|
||||||
|
kind: InClusterIPPool
|
||||||
|
name: inclusterippool-${CLUSTER_NAME}
|
||||||
|
nameservers:
|
||||||
|
- {{ _template.network.dnsserver }}
|
||||||
|
networkName: '${VSPHERE_NETWORK}'
|
||||||
|
- patch: |-
|
||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1beta1
|
||||||
|
kind: VSphereMachineTemplate
|
||||||
|
metadata:
|
||||||
|
name: ${CLUSTER_NAME}-worker
|
||||||
|
namespace: '${NAMESPACE}'
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
diskGiB: 60
|
||||||
|
network:
|
||||||
|
devices:
|
||||||
|
- dhcp4: false
|
||||||
|
addressesFromPools:
|
||||||
|
- apiGroup: ipam.cluster.x-k8s.io
|
||||||
|
kind: InClusterIPPool
|
||||||
|
name: inclusterippool-${CLUSTER_NAME}
|
||||||
|
nameservers:
|
||||||
|
- {{ _template.network.dnsserver }}
|
||||||
|
networkName: '${VSPHERE_NETWORK}'
|
||||||
|
|
||||||
|
- target:
|
||||||
|
group: addons.cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: ClusterResourceSet
|
||||||
|
name: \${CLUSTER_NAME}-crs-0
|
||||||
|
patch: |-
|
||||||
|
- op: replace
|
||||||
|
path: /spec/resources
|
||||||
|
value:
|
||||||
|
- kind: Secret
|
||||||
|
name: cloud-controller-manager
|
||||||
|
- kind: Secret
|
||||||
|
name: cloud-provider-vsphere-credentials
|
||||||
|
- kind: ConfigMap
|
||||||
|
name: cpi-manifests
|
||||||
|
- op: add
|
||||||
|
path: /spec/strategy
|
||||||
|
value: Reconcile
|
||||||
|
|
||||||
|
- target:
|
||||||
|
group: controlplane.cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: KubeadmControlPlane
|
||||||
|
name: .*
|
||||||
|
patch: |-
|
||||||
|
- op: add
|
||||||
|
path: /spec/kubeadmConfigSpec/files/-
|
||||||
|
value:
|
||||||
|
content: |
|
||||||
|
[plugins."io.containerd.grpc.v1.cri".registry]
|
||||||
|
config_path = "/etc/containerd/certs.d"
|
||||||
|
append: true
|
||||||
|
path: /etc/containerd/config.toml
|
||||||
|
{% for registry in _template.registries %}
|
||||||
|
- op: add
|
||||||
|
path: /spec/kubeadmConfigSpec/files/-
|
||||||
|
value:
|
||||||
|
content: |
|
||||||
|
server = "https://{{ registry }}"
|
||||||
|
|
||||||
|
[host."https://registry.{{ _template.network.fqdn }}/v2/library/{{ registry }}"]
|
||||||
|
capabilities = ["pull", "resolve"]
|
||||||
|
override_path = true
|
||||||
|
owner: root:root
|
||||||
|
path: /etc/containerd/certs.d/{{ registry }}/hosts.toml
|
||||||
|
{% endfor %}
|
||||||
|
- op: add
|
||||||
|
path: /spec/kubeadmConfigSpec/files/-
|
||||||
|
value:
|
||||||
|
content: |
|
||||||
|
network: {config: disabled}
|
||||||
|
owner: root:root
|
||||||
|
path: /etc/cloud/cloud.cfg.d/99-disable-network-config.cfg
|
||||||
|
- op: add
|
||||||
|
path: /spec/kubeadmConfigSpec/files/-
|
||||||
|
value:
|
||||||
|
content: |
|
||||||
|
{{ _template.rootca | indent(width=10, first=False) | trim }}
|
||||||
|
owner: root:root
|
||||||
|
path: /usr/local/share/ca-certificates/root_ca.crt
|
||||||
|
- target:
|
||||||
|
group: bootstrap.cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: KubeadmConfigTemplate
|
||||||
|
name: .*
|
||||||
|
patch: |-
|
||||||
|
{% for cmd in _template.runcmds %}
|
||||||
|
- op: add
|
||||||
|
path: /spec/template/spec/preKubeadmCommands/-
|
||||||
|
value: {{ cmd }}
|
||||||
|
{% endfor %}
|
||||||
|
- target:
|
||||||
|
group: controlplane.cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: KubeadmControlPlane
|
||||||
|
name: .*
|
||||||
|
patch: |-
|
||||||
|
{% for cmd in _template.runcmds %}
|
||||||
|
- op: add
|
||||||
|
path: /spec/kubeadmConfigSpec/preKubeadmCommands/-
|
||||||
|
value: {{ cmd }}
|
||||||
|
{% endfor %}
|
||||||
|
|
||||||
|
- target:
|
||||||
|
group: infrastructure.cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: VSphereMachineTemplate
|
||||||
|
name: \${CLUSTER_NAME}
|
||||||
|
patch: |-
|
||||||
|
- op: replace
|
||||||
|
path: /metadata/name
|
||||||
|
value: ${CLUSTER_NAME}-master
|
||||||
|
- op: remove
|
||||||
|
path: /spec/template/spec/thumbprint
|
||||||
|
- target:
|
||||||
|
group: controlplane.cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: KubeadmControlPlane
|
||||||
|
name: \${CLUSTER_NAME}
|
||||||
|
patch: |-
|
||||||
|
- op: replace
|
||||||
|
path: /metadata/name
|
||||||
|
value: ${CLUSTER_NAME}-master
|
||||||
|
- op: replace
|
||||||
|
path: /spec/machineTemplate/infrastructureRef/name
|
||||||
|
value: ${CLUSTER_NAME}-master
|
||||||
|
- target:
|
||||||
|
group: cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: Cluster
|
||||||
|
name: \${CLUSTER_NAME}
|
||||||
|
patch: |-
|
||||||
|
- op: replace
|
||||||
|
path: /spec/clusterNetwork/pods
|
||||||
|
value:
|
||||||
|
cidrBlocks:
|
||||||
|
- 172.30.0.0/16
|
||||||
|
- op: replace
|
||||||
|
path: /spec/controlPlaneRef/name
|
||||||
|
value: ${CLUSTER_NAME}-master
|
||||||
|
|
||||||
|
- target:
|
||||||
|
group: infrastructure.cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: VSphereMachineTemplate
|
||||||
|
name: \${CLUSTER_NAME}-worker
|
||||||
|
patch: |-
|
||||||
|
- op: replace
|
||||||
|
path: /spec/template/spec/numCPUs
|
||||||
|
value: {{ _template.nodesize.cpu }}
|
||||||
|
- op: replace
|
||||||
|
path: /spec/template/spec/memoryMiB
|
||||||
|
value: {{ _template.nodesize.memory }}
|
||||||
|
- op: remove
|
||||||
|
path: /spec/template/spec/thumbprint
|
||||||
|
- target:
|
||||||
|
group: cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: MachineDeployment
|
||||||
|
name: \${CLUSTER_NAME}-md-0
|
||||||
|
patch: |-
|
||||||
|
- op: replace
|
||||||
|
path: /metadata/name
|
||||||
|
value: ${CLUSTER_NAME}-worker
|
||||||
|
- op: replace
|
||||||
|
path: /spec/template/spec/bootstrap/configRef/name
|
||||||
|
value: ${CLUSTER_NAME}-worker
|
||||||
|
- target:
|
||||||
|
group: bootstrap.cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: KubeadmConfigTemplate
|
||||||
|
name: \${CLUSTER_NAME}-md-0
|
||||||
|
patch: |-
|
||||||
|
- op: replace
|
||||||
|
path: /metadata/name
|
||||||
|
value: ${CLUSTER_NAME}-worker
|
||||||
|
|
||||||
|
- target:
|
||||||
|
group: infrastructure.cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: VSphereCluster
|
||||||
|
name: .*
|
||||||
|
patch: |-
|
||||||
|
- op: remove
|
||||||
|
path: /spec/thumbprint
|
||||||
@@ -0,0 +1,83 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
resources:
|
||||||
|
- downstream-cluster/kubeadmconfigtemplate-{{ _template.cluster.name }}-worker.yaml
|
||||||
|
- downstream-cluster/machinedeployment-{{ _template.cluster.name }}-worker.yaml
|
||||||
|
- downstream-cluster/vspheremachinetemplate-{{ _template.cluster.name }}-worker.yaml
|
||||||
|
|
||||||
|
patches:
|
||||||
|
- patch: |-
|
||||||
|
apiVersion: bootstrap.cluster.x-k8s.io/v1beta1
|
||||||
|
kind: KubeadmConfigTemplate
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.cluster.name }}-worker
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
diskSetup:
|
||||||
|
filesystems:
|
||||||
|
- device: /dev/sdb1
|
||||||
|
filesystem: ext4
|
||||||
|
label: blockstorage
|
||||||
|
partitions:
|
||||||
|
- device: /dev/sdb
|
||||||
|
layout: true
|
||||||
|
tableType: gpt
|
||||||
|
joinConfiguration:
|
||||||
|
nodeRegistration:
|
||||||
|
kubeletExtraArgs:
|
||||||
|
node-labels: "node.longhorn.io/create-default-disk=true"
|
||||||
|
mounts:
|
||||||
|
- - LABEL=blockstorage
|
||||||
|
- /mnt/blockstorage
|
||||||
|
- patch: |-
|
||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1beta1
|
||||||
|
kind: VSphereMachineTemplate
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.cluster.name }}-worker
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
additionalDisksGiB:
|
||||||
|
- {{ _template.nodepool.additionaldisk }}
|
||||||
|
|
||||||
|
- target:
|
||||||
|
group: bootstrap.cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: KubeadmConfigTemplate
|
||||||
|
name: {{ _template.cluster.name }}-worker
|
||||||
|
patch: |-
|
||||||
|
- op: replace
|
||||||
|
path: /metadata/name
|
||||||
|
value: {{ _template.cluster.name }}-worker-storage
|
||||||
|
|
||||||
|
- target:
|
||||||
|
group: cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: MachineDeployment
|
||||||
|
name: {{ _template.cluster.name }}-worker
|
||||||
|
patch: |-
|
||||||
|
- op: replace
|
||||||
|
path: /metadata/name
|
||||||
|
value: {{ _template.cluster.name }}-worker-storage
|
||||||
|
- op: replace
|
||||||
|
path: /spec/template/spec/bootstrap/configRef/name
|
||||||
|
value: {{ _template.cluster.name }}-worker-storage
|
||||||
|
- op: replace
|
||||||
|
path: /spec/template/spec/infrastructureRef/name
|
||||||
|
value: {{ _template.cluster.name }}-worker-storage
|
||||||
|
- op: replace
|
||||||
|
path: /spec/replicas
|
||||||
|
value: {{ _template.nodepool.size }}
|
||||||
|
|
||||||
|
- target:
|
||||||
|
group: infrastructure.cluster.x-k8s.io
|
||||||
|
version: v1beta1
|
||||||
|
kind: VSphereMachineTemplate
|
||||||
|
name: {{ _template.cluster.name }}-worker
|
||||||
|
patch: |-
|
||||||
|
- op: replace
|
||||||
|
path: /metadata/name
|
||||||
|
value: {{ _template.cluster.name }}-worker-storage
|
||||||
@@ -0,0 +1,7 @@
|
|||||||
|
apiVersion: idp.supervisor.pinniped.dev/v1alpha1
|
||||||
|
kind: OIDCIdentityProvider
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.name }}
|
||||||
|
namespace: {{ _template.namespace }}
|
||||||
|
spec:
|
||||||
|
{{ _template.spec }}
|
||||||
@@ -3,6 +3,7 @@ kind: Secret
|
|||||||
metadata:
|
metadata:
|
||||||
name: {{ _template.name }}
|
name: {{ _template.name }}
|
||||||
namespace: {{ _template.namespace }}
|
namespace: {{ _template.namespace }}
|
||||||
|
type: {{ _template.type }}
|
||||||
data:
|
data:
|
||||||
{% for kv_pair in _template.data %}
|
{% for kv_pair in _template.data %}
|
||||||
"{{ kv_pair.key }}": {{ kv_pair.value }}
|
"{{ kv_pair.key }}": {{ kv_pair.value }}
|
||||||
@@ -0,0 +1,7 @@
|
|||||||
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
|
kind: ServersTransport
|
||||||
|
metadata:
|
||||||
|
name: {{ _template.name }}
|
||||||
|
namespace: {{ _template.namespace }}
|
||||||
|
spec:
|
||||||
|
{{ _template.spec }}
|
||||||
@@ -0,0 +1,6 @@
|
|||||||
|
- import_tasks: service.yml
|
||||||
|
- import_tasks: cron.yml
|
||||||
|
|
||||||
|
# - name: Reboot host
|
||||||
|
# ansible.builtin.shell:
|
||||||
|
# cmd: systemctl reboot
|
||||||
@@ -20,7 +20,11 @@
|
|||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.src }}"
|
label: "{{ item.src }}"
|
||||||
|
|
||||||
- name: Enable tarball compression service
|
- name: Enable/Start services
|
||||||
ansible.builtin.systemd:
|
ansible.builtin.systemd:
|
||||||
name: compressTarballs
|
name: "{{ item }}"
|
||||||
enabled: yes
|
enabled: yes
|
||||||
|
state: started
|
||||||
|
loop:
|
||||||
|
- compressTarballs
|
||||||
|
- ttyConsoleMessage
|
||||||
@@ -0,0 +1,40 @@
|
|||||||
|
- name: Create volume group
|
||||||
|
community.general.lvg:
|
||||||
|
vg: longhorn_vg
|
||||||
|
pvs:
|
||||||
|
- /dev/sdb
|
||||||
|
pvresize: yes
|
||||||
|
|
||||||
|
- name: Create logical volume
|
||||||
|
community.general.lvol:
|
||||||
|
vg: longhorn_vg
|
||||||
|
lv: longhorn_lv
|
||||||
|
size: 100%VG
|
||||||
|
|
||||||
|
- name: Store begin timestamp
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
start_time: "{{ lookup('pipe', 'date +%s') }}"
|
||||||
|
|
||||||
|
- name: Create filesystem
|
||||||
|
community.general.filesystem:
|
||||||
|
dev: /dev/mapper/longhorn_vg-longhorn_lv
|
||||||
|
fstype: ext4
|
||||||
|
|
||||||
|
- name: Store end timestamp
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
end_time: "{{ lookup('pipe', 'date +%s') }}"
|
||||||
|
|
||||||
|
- name: Calculate crude storage benchmark
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
storage_benchmark: "{{ [storage_benchmark, (end_time | int - start_time | int)] | max }}"
|
||||||
|
|
||||||
|
- name: Log benchmark actual duration
|
||||||
|
ansible.builtin.debug:
|
||||||
|
msg: "Benchmark actual duration: {{ (end_time | int - start_time | int) }} second(s)"
|
||||||
|
|
||||||
|
- name: Mount dynamic disk
|
||||||
|
ansible.posix.mount:
|
||||||
|
path: /mnt/blockstorage
|
||||||
|
src: /dev/mapper/longhorn_vg-longhorn_lv
|
||||||
|
fstype: ext4
|
||||||
|
state: mounted
|
||||||
@@ -7,6 +7,6 @@
|
|||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item | basename }}"
|
label: "{{ item | basename }}"
|
||||||
# Probably should add a task before that ensures K3s node is fully initialized before starting imports; currently K3s goes away briefly during this loop
|
# Probably should add a task before that ensures K3s node is fully initialized before starting imports; currently K3s goes away briefly during this loop
|
||||||
retries: 3
|
retries: "{{ playbook.retries }}"
|
||||||
delay: 10
|
delay: "{{ ((storage_benchmark | float) * playbook.delay.short) | int }}"
|
||||||
until: import_result is not failed
|
until: import_result is not failed
|
||||||
@@ -6,6 +6,13 @@
|
|||||||
ansible.builtin.template:
|
ansible.builtin.template:
|
||||||
src: netplan.j2
|
src: netplan.j2
|
||||||
dest: /etc/netplan/00-installer-config.yaml
|
dest: /etc/netplan/00-installer-config.yaml
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
macaddress: "{{ ansible_facts.default_ipv4.macaddress }}"
|
||||||
|
ipaddress: "{{ vapp['guestinfo.ipaddress'] }}"
|
||||||
|
prefixlength: "{{ vapp['guestinfo.prefixlength'] }}"
|
||||||
|
gateway: "{{ vapp['guestinfo.gateway'] }}"
|
||||||
|
dnsserver: "{{ vapp['guestinfo.dnsserver'] }}"
|
||||||
|
|
||||||
- name: Apply netplan configuration
|
- name: Apply netplan configuration
|
||||||
ansible.builtin.shell:
|
ansible.builtin.shell:
|
||||||
@@ -0,0 +1,13 @@
|
|||||||
|
network:
|
||||||
|
version: 2
|
||||||
|
ethernets:
|
||||||
|
id0:
|
||||||
|
set-name: eth0
|
||||||
|
match:
|
||||||
|
macaddress: {{ _template.macaddress }}
|
||||||
|
addresses:
|
||||||
|
- {{ _template.ipaddress }}/{{ _template.prefixlength }}
|
||||||
|
gateway4: {{ _template.gateway }}
|
||||||
|
nameservers:
|
||||||
|
addresses:
|
||||||
|
- {{ _template.dnsserver }}
|
||||||
@@ -0,0 +1,2 @@
|
|||||||
|
- import_tasks: vapp.yml
|
||||||
|
- import_tasks: vcenter.yml
|
||||||
@@ -0,0 +1,16 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Check for vCenter connectivity
|
||||||
|
community.vmware.vmware_vcenter_settings_info:
|
||||||
|
schema: vsphere
|
||||||
|
register: vcenter_info
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ ((storage_benchmark | float) * playbook.delay.short) | int }}"
|
||||||
|
until: vcenter_info is not failed
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
group/vmware:
|
||||||
|
hostname: "{{ vapp['hv.fqdn'] }}"
|
||||||
|
validate_certs: no
|
||||||
|
username: "{{ vapp['hv.username'] }}"
|
||||||
|
password: "{{ vapp['hv.password'] }}"
|
||||||
@@ -0,0 +1,50 @@
|
|||||||
|
- name: Create folder structure(s)
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ item }}"
|
||||||
|
state: directory
|
||||||
|
loop:
|
||||||
|
- /opt/firstboot
|
||||||
|
|
||||||
|
- name: Create tty console message service
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "{{ item.src }}"
|
||||||
|
dest: "{{ item.dest }}"
|
||||||
|
owner: root
|
||||||
|
group: root
|
||||||
|
mode: "{{ item.mode | default(omit) }}"
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
service:
|
||||||
|
name: ttyConsoleMessage
|
||||||
|
executable: /opt/firstboot/tty.sh
|
||||||
|
workingdir: /tmp/
|
||||||
|
metacluster:
|
||||||
|
components:
|
||||||
|
- name: ArgoCD
|
||||||
|
url: https://gitops.${FQDN}
|
||||||
|
healthcheck: https://gitops.${FQDN}
|
||||||
|
- name: Gitea
|
||||||
|
url: https://git.${FQDN}
|
||||||
|
healthcheck: https://git.${FQDN}
|
||||||
|
- name: Harbor
|
||||||
|
url: https://registry.${FQDN}
|
||||||
|
healthcheck: https://registry.${FQDN}
|
||||||
|
- name: Longhorn
|
||||||
|
url: https://storage.${FQDN}
|
||||||
|
healthcheck: https://storage.${FQDN}
|
||||||
|
- name: StepCA
|
||||||
|
url: ''
|
||||||
|
healthcheck: https://ca.${FQDN}/health
|
||||||
|
- name: Traefik
|
||||||
|
url: https://ingress.${FQDN}
|
||||||
|
healthcheck: https://ingress.${FQDN}
|
||||||
|
fqdn: "{{ vapp['metacluster.fqdn'] }}"
|
||||||
|
vip: "{{ vapp['metacluster.vip'] }}"
|
||||||
|
loop:
|
||||||
|
- src: tty.j2
|
||||||
|
dest: "{{ _template.service.executable }}"
|
||||||
|
mode: o+x
|
||||||
|
- src: systemdunit.j2
|
||||||
|
dest: /etc/systemd/system/{{ _template.service.name }}.service
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.src }}"
|
||||||
@@ -1,7 +1,7 @@
|
|||||||
- name: Set root password
|
- name: Set root password
|
||||||
ansible.builtin.user:
|
ansible.builtin.user:
|
||||||
name: root
|
name: root
|
||||||
password: "{{ vapp['guestinfo.rootpw'] | password_hash('sha512', 65534 | random(seed=vapp['guestinfo.hostname']) | string) }}"
|
password: "{{ vapp['metacluster.password'] | password_hash('sha512', 65534 | random(seed=vapp['guestinfo.hostname']) | string) }}"
|
||||||
generate_ssh_key: yes
|
generate_ssh_key: yes
|
||||||
ssh_key_bits: 2048
|
ssh_key_bits: 2048
|
||||||
ssh_key_file: .ssh/id_rsa
|
ssh_key_file: .ssh/id_rsa
|
||||||
@@ -25,7 +25,7 @@
|
|||||||
line: 'PasswordAuthentication yes'
|
line: 'PasswordAuthentication yes'
|
||||||
state: absent
|
state: absent
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ '[' + item.line + '] ' + item.state }}"
|
label: "{{ '[' ~ item.regex ~ '] ' ~ item.state }}"
|
||||||
|
|
||||||
- name: Create dedicated SSH keypair
|
- name: Create dedicated SSH keypair
|
||||||
community.crypto.openssh_keypair:
|
community.crypto.openssh_keypair:
|
||||||
@@ -11,7 +11,7 @@
|
|||||||
- attribute: cluster
|
- attribute: cluster
|
||||||
moref: >-
|
moref: >-
|
||||||
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
||||||
jq -r '.[] | select(.Name == "runtime").Val.Host | .Type + ":" + .Value')
|
jq -r '.[] | select(.name == "runtime").val.host | .type + ":" + .value')
|
||||||
part: (NF-1)
|
part: (NF-1)
|
||||||
- attribute: datacenter
|
- attribute: datacenter
|
||||||
moref: VirtualMachine:{{ moref_id }}
|
moref: VirtualMachine:{{ moref_id }}
|
||||||
@@ -19,27 +19,27 @@
|
|||||||
- attribute: datastore
|
- attribute: datastore
|
||||||
moref: >-
|
moref: >-
|
||||||
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
||||||
jq -r '.[] | select(.Name == "datastore").Val.ManagedObjectReference | .[].Type + ":" + .[].Value')
|
jq -r '.[] | select(.name == "datastore").val._value | .[].type + ":" + .[].value')
|
||||||
part: NF
|
part: NF
|
||||||
- attribute: folder
|
- attribute: folder
|
||||||
moref: >-
|
moref: >-
|
||||||
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
||||||
jq -r '.[] | select(.Name == "parent").Val | .Type + ":" + .Value')
|
jq -r '.[] | select(.name == "parent").val | .type + ":" + .value')
|
||||||
part: 0
|
part: 0
|
||||||
# - attribute: host
|
# - attribute: host
|
||||||
# moref: >-
|
# moref: >-
|
||||||
# $(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
# $(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
||||||
# jq -r '.[] | select(.Name == "runtime").Val.Host | .Type + ":" + .Value')
|
# jq -r '.[] | select(.name == "runtime").val.host | .type + ":" + .value')
|
||||||
# part: NF
|
# part: NF
|
||||||
- attribute: network
|
- attribute: network
|
||||||
moref: >-
|
moref: >-
|
||||||
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
||||||
jq -r '.[] | select(.Name == "network").Val.ManagedObjectReference | .[].Type + ":" + .[].Value')
|
jq -r '.[] | select(.name == "network").val._value | .[].type + ":" + .[].value')
|
||||||
part: NF
|
part: NF
|
||||||
- attribute: resourcepool
|
- attribute: resourcepool
|
||||||
moref: >-
|
moref: >-
|
||||||
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
$(govc object.collect -json VirtualMachine:{{ moref_id }} | \
|
||||||
jq -r '.[] | select(.Name == "resourcePool").Val | .Type + ":" + .Value')
|
jq -r '.[] | select(.name == "resourcePool").val | .type + ":" + .value')
|
||||||
part: 0
|
part: 0
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.attribute }}"
|
label: "{{ item.attribute }}"
|
||||||
@@ -0,0 +1,33 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Check for existing template
|
||||||
|
community.vmware.vmware_guest_info:
|
||||||
|
name: "{{ vapp['workloadcluster.nodetemplate'] }}"
|
||||||
|
hostname: "{{ vapp['hv.fqdn'] }}"
|
||||||
|
validate_certs: false
|
||||||
|
username: "{{ vapp['hv.username'] }}"
|
||||||
|
password: "{{ vapp['hv.password'] }}"
|
||||||
|
datacenter: "{{ vcenter_info.datacenter }}"
|
||||||
|
folder: "{{ vcenter_info.folder }}"
|
||||||
|
register: nodetemplate
|
||||||
|
until:
|
||||||
|
- nodetemplate is not failed
|
||||||
|
retries: 600
|
||||||
|
delay: 30
|
||||||
|
#wait for 5 hr.
|
||||||
|
vars:
|
||||||
|
color_reset: "\e[0m"
|
||||||
|
ansible_callback_diy_runner_retry_msg: >-
|
||||||
|
{%- set result = ansible_callback_diy.result.output -%}
|
||||||
|
{%- set retries_left = result.retries - result.attempts -%}
|
||||||
|
TEMPLATE '{{ vapp['workloadcluster.nodetemplate'] }}' NOT FOUND; PLEASE UPLOAD MANUALLY -- ({{ retries_left }} retries left)
|
||||||
|
ansible_callback_diy_runner_retry_msg_color: bright yellow
|
||||||
|
|
||||||
|
- name: Store inventory path of existing template
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
nodetemplate_inventorypath: "{{ nodetemplate.instance.hw_folder ~ '/' ~ nodetemplate.instance.hw_name }}"
|
||||||
|
|
||||||
|
rescue:
|
||||||
|
- name: CRITICAL ERROR
|
||||||
|
ansible.builtin.fail:
|
||||||
|
msg: Required node-template is not available; cannot continue
|
||||||
@@ -0,0 +1,8 @@
|
|||||||
|
mirrors:
|
||||||
|
{% for registry in _template.registries %}
|
||||||
|
{{ registry }}:
|
||||||
|
endpoint:
|
||||||
|
- https://registry.{{ _template.hv.fqdn }}
|
||||||
|
rewrite:
|
||||||
|
"(.*)": "library/{{ registry }}/$1"
|
||||||
|
{% endfor %}
|
||||||
@@ -12,26 +12,34 @@ DFLT='\033[0m' # Reset colour
|
|||||||
LCLR='\033[K' # Clear to end of line
|
LCLR='\033[K' # Clear to end of line
|
||||||
PRST='\033[0;0H' # Reset cursor position
|
PRST='\033[0;0H' # Reset cursor position
|
||||||
|
|
||||||
# COMPONENTS=('ca' 'ingress' 'storage' 'registry' 'git' 'gitops')
|
FQDN='{{ _template.metacluster.fqdn }}'
|
||||||
COMPONENTS=('ca' 'storage' 'registry' 'git' 'gitops')
|
IPADDRESS='{{ _template.metacluster.vip }}'
|
||||||
FQDN='{{ vapp['metacluster.fqdn'] }}'
|
|
||||||
IPADDRESS='{{ vapp['guestinfo.ipaddress'] }}'
|
|
||||||
|
|
||||||
# Waiting to allow boot sequence to finish; crude!
|
declare -A COMPONENTS
|
||||||
sleep 30
|
{% for component in _template.metacluster.components %}
|
||||||
clear > /dev/tty1
|
COMPONENTS["{{ component.name }}\t({{ component.url }})"]="{{ component.healthcheck }}"
|
||||||
|
{% endfor %}
|
||||||
|
|
||||||
|
I=0
|
||||||
|
|
||||||
while /bin/true; do
|
while /bin/true; do
|
||||||
|
if [[ $I -gt 59 ]]; then
|
||||||
|
clear > /dev/tty1
|
||||||
|
I=0
|
||||||
|
else
|
||||||
|
I=$(( $I + 1 ))
|
||||||
|
fi
|
||||||
|
|
||||||
echo -e "${PRST}" > /dev/tty1
|
echo -e "${PRST}" > /dev/tty1
|
||||||
echo -e "\n\n\t${DFLT}To manage this appliance, please connect to one of the following:${LCLR}\n" > /dev/tty1
|
echo -e "\n\n\t${DFLT}To manage this appliance, please connect to one of the following:${LCLR}\n" > /dev/tty1
|
||||||
|
|
||||||
for c in "${COMPONENTS[@]}"; do
|
for c in $( echo "${!COMPONENTS[@]}" | tr ' ' $'\n' | sort); do
|
||||||
STATUS=$(curl -ks "https://${c}.${FQDN}" -o /dev/null -w '%{http_code}')
|
STATUS=$(curl -kLs "${COMPONENTS[${c}]}" -o /dev/null -w '%{http_code}')
|
||||||
|
|
||||||
if [[ "${STATUS}" -eq "200" ]]; then
|
if [[ "${STATUS}" -eq "200" ]]; then
|
||||||
echo -e "\t [${BGRN}+${DFLT}] ${BBLU}https://${c}.${FQDN}${DFLT}${LCLR}" > /dev/tty1
|
echo -e "\t [${BGRN}+${DFLT}] ${BBLU}${c}${DFLT}${LCLR}" > /dev/tty1
|
||||||
else
|
else
|
||||||
echo -e "\t [${BRED}-${DFLT}] ${BBLU}https://${c}.${FQDN}${DFLT}${LCLR}" > /dev/tty1
|
echo -e "\t [${BRED}-${DFLT}] ${BBLU}${c}${DFLT}${LCLR}" > /dev/tty1
|
||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
|
|
||||||
@@ -0,0 +1,23 @@
|
|||||||
|
playbook:
|
||||||
|
retries: 10
|
||||||
|
delay:
|
||||||
|
# These values are multiplied with the value of `storage_benchmark`
|
||||||
|
long: 2
|
||||||
|
medium: 1
|
||||||
|
short: 0.5
|
||||||
|
|
||||||
|
# This default value is updated during the playbook, based on an I/O intensive operation
|
||||||
|
storage_benchmark: 30
|
||||||
|
|
||||||
|
config:
|
||||||
|
clusterapi:
|
||||||
|
size_matrix:
|
||||||
|
small:
|
||||||
|
cpu: 2
|
||||||
|
memory: 6144
|
||||||
|
medium:
|
||||||
|
cpu: 4
|
||||||
|
memory: 8192
|
||||||
|
large:
|
||||||
|
cpu: 8
|
||||||
|
memory: 16384
|
||||||
@@ -1,12 +0,0 @@
|
|||||||
- import_tasks: service.yml
|
|
||||||
- import_tasks: cron.yml
|
|
||||||
|
|
||||||
- name: Cleanup tempfile
|
|
||||||
ansible.builtin.file:
|
|
||||||
path: "{{ kubeconfig.path }}"
|
|
||||||
state: absent
|
|
||||||
when: kubeconfig.path is defined
|
|
||||||
|
|
||||||
- name: Reboot host
|
|
||||||
ansible.builtin.shell:
|
|
||||||
cmd: /usr/sbin/reboot now
|
|
||||||
@@ -1,24 +0,0 @@
|
|||||||
- name: Create volume group
|
|
||||||
community.general.lvg:
|
|
||||||
vg: longhorn_vg
|
|
||||||
pvs:
|
|
||||||
- /dev/sdb
|
|
||||||
pvresize: yes
|
|
||||||
|
|
||||||
- name: Create logical volume
|
|
||||||
community.general.lvol:
|
|
||||||
vg: longhorn_vg
|
|
||||||
lv: longhorn_lv
|
|
||||||
size: 100%VG
|
|
||||||
|
|
||||||
- name: Create filesystem
|
|
||||||
community.general.filesystem:
|
|
||||||
dev: /dev/mapper/longhorn_vg-longhorn_lv
|
|
||||||
fstype: ext4
|
|
||||||
|
|
||||||
- name: Mount dynamic disk
|
|
||||||
ansible.posix.mount:
|
|
||||||
path: /mnt/blockstorage
|
|
||||||
src: /dev/mapper/longhorn_vg-longhorn_lv
|
|
||||||
fstype: ext4
|
|
||||||
state: mounted
|
|
||||||
@@ -1,14 +0,0 @@
|
|||||||
import netaddr
|
|
||||||
|
|
||||||
def netaddr_iter_iprange(ip_start, ip_end):
|
|
||||||
return [str(ip) for ip in netaddr.iter_iprange(ip_start, ip_end)]
|
|
||||||
|
|
||||||
class FilterModule(object):
|
|
||||||
''' Ansible filter. Interface to netaddr methods.
|
|
||||||
https://pypi.org/project/netaddr/
|
|
||||||
'''
|
|
||||||
|
|
||||||
def filters(self):
|
|
||||||
return {
|
|
||||||
'netaddr_iter_iprange': netaddr_iter_iprange
|
|
||||||
}
|
|
||||||
@@ -1,122 +0,0 @@
|
|||||||
- name: Install step-ca chart
|
|
||||||
kubernetes.core.helm:
|
|
||||||
name: step-certificates
|
|
||||||
chart_ref: /opt/metacluster/helm-charts/step-certificates
|
|
||||||
release_namespace: step-ca
|
|
||||||
create_namespace: yes
|
|
||||||
wait: yes
|
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
|
||||||
values: "{{ components.stepcertificates.chart_values }}"
|
|
||||||
|
|
||||||
- name: Retrieve configmap w/ root certificate
|
|
||||||
kubernetes.core.k8s_info:
|
|
||||||
kind: ConfigMap
|
|
||||||
name: step-certificates-certs
|
|
||||||
namespace: step-ca
|
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
|
||||||
register: stepca_cm_certs
|
|
||||||
|
|
||||||
- name: Create target namespaces
|
|
||||||
kubernetes.core.k8s:
|
|
||||||
kind: Namespace
|
|
||||||
name: "{{ item }}"
|
|
||||||
state: present
|
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
|
||||||
loop:
|
|
||||||
- argo-cd
|
|
||||||
# - kube-system
|
|
||||||
|
|
||||||
- name: Store root certificate in namespaced configmaps/secrets
|
|
||||||
kubernetes.core.k8s:
|
|
||||||
state: present
|
|
||||||
template: "{{ item.kind }}.j2"
|
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
|
||||||
vars:
|
|
||||||
_template:
|
|
||||||
name: "{{ item.name }}"
|
|
||||||
namespace: "{{ item.namespace }}"
|
|
||||||
annotations: "{{ item.annotations | default('{}') | indent(width=4, first=True) }}"
|
|
||||||
labels: "{{ item.labels | default('{}') | indent(width=4, first=True) }}"
|
|
||||||
data: "{{ item.data }}"
|
|
||||||
loop:
|
|
||||||
- name: argocd-tls-certs-cm
|
|
||||||
namespace: argo-cd
|
|
||||||
kind: configmap
|
|
||||||
annotations: |
|
|
||||||
meta.helm.sh/release-name: argo-cd
|
|
||||||
meta.helm.sh/release-namespace: argo-cd
|
|
||||||
labels: |
|
|
||||||
app.kubernetes.io/managed-by: Helm
|
|
||||||
app.kubernetes.io/name: argocd-cm
|
|
||||||
app.kubernetes.io/part-of: argocd
|
|
||||||
data:
|
|
||||||
- key: git.{{ vapp['metacluster.fqdn'] }}
|
|
||||||
value: "{{ stepca_cm_certs.resources[0].data['root_ca.crt'] }}"
|
|
||||||
- name: step-certificates-certs
|
|
||||||
namespace: kube-system
|
|
||||||
kind: secret
|
|
||||||
data:
|
|
||||||
- key: root_ca.crt
|
|
||||||
value: "{{ stepca_cm_certs.resources[0].data['root_ca.crt'] | b64encode }}"
|
|
||||||
loop_control:
|
|
||||||
label: "{{ item.kind + '/' + item.name + ' (' + item.namespace + ')' }}"
|
|
||||||
|
|
||||||
- name: Configure step-ca passthrough ingress
|
|
||||||
ansible.builtin.template:
|
|
||||||
src: ingressroutetcp.j2
|
|
||||||
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.name }}-manifest.yaml
|
|
||||||
owner: root
|
|
||||||
group: root
|
|
||||||
mode: 0600
|
|
||||||
vars:
|
|
||||||
_template:
|
|
||||||
name: step-ca
|
|
||||||
namespace: step-ca
|
|
||||||
config: |2
|
|
||||||
entryPoints:
|
|
||||||
- websecure
|
|
||||||
routes:
|
|
||||||
- match: HostSNI(`ca.{{ vapp['metacluster.fqdn'] }}`)
|
|
||||||
services:
|
|
||||||
- name: step-certificates
|
|
||||||
port: 443
|
|
||||||
tls:
|
|
||||||
passthrough: true
|
|
||||||
notify:
|
|
||||||
- Apply manifests
|
|
||||||
|
|
||||||
- name: Inject step-ca certificate into traefik container
|
|
||||||
ansible.builtin.blockinfile:
|
|
||||||
path: /var/lib/rancher/k3s/server/manifests/traefik-config.yaml
|
|
||||||
block: |2
|
|
||||||
volumes:
|
|
||||||
- name: step-certificates-certs
|
|
||||||
mountPath: /step-ca
|
|
||||||
type: secret
|
|
||||||
env:
|
|
||||||
- name: LEGO_CA_CERTIFICATES
|
|
||||||
value: /step-ca/root_ca.crt
|
|
||||||
marker: ' # {mark} ANSIBLE MANAGED BLOCK'
|
|
||||||
notify:
|
|
||||||
- Apply manifests
|
|
||||||
|
|
||||||
- name: Trigger handlers
|
|
||||||
ansible.builtin.meta: flush_handlers
|
|
||||||
|
|
||||||
- name: Retrieve step-ca configuration
|
|
||||||
kubernetes.core.k8s_info:
|
|
||||||
kind: ConfigMap
|
|
||||||
name: step-certificates-config
|
|
||||||
namespace: step-ca
|
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
|
||||||
register: stepca_cm_config
|
|
||||||
|
|
||||||
- name: Install root CA in system truststore
|
|
||||||
ansible.builtin.shell:
|
|
||||||
cmd: >-
|
|
||||||
step ca bootstrap \
|
|
||||||
--ca-url=https://ca.{{ vapp['metacluster.fqdn'] }} \
|
|
||||||
--fingerprint={{ stepca_cm_config.resources[0].data['defaults.json'] | from_json | json_query('fingerprint') }} \
|
|
||||||
--install \
|
|
||||||
--force
|
|
||||||
update-ca-certificates
|
|
||||||
@@ -1,26 +0,0 @@
|
|||||||
- name: Configure traefik dashboard ingress
|
|
||||||
ansible.builtin.template:
|
|
||||||
src: ingressroute.j2
|
|
||||||
dest: /var/lib/rancher/k3s/server/manifests/{{ _template.name }}-manifest.yaml
|
|
||||||
owner: root
|
|
||||||
group: root
|
|
||||||
mode: 0600
|
|
||||||
vars:
|
|
||||||
_template:
|
|
||||||
name: traefik-dashboard
|
|
||||||
namespace: kube-system
|
|
||||||
config: |2
|
|
||||||
entryPoints:
|
|
||||||
- web
|
|
||||||
- websecure
|
|
||||||
routes:
|
|
||||||
- kind: Rule
|
|
||||||
match: Host(`ingress.{{ vapp['metacluster.fqdn'] }}`)
|
|
||||||
services:
|
|
||||||
- kind: TraefikService
|
|
||||||
name: api@internal
|
|
||||||
notify:
|
|
||||||
- Apply manifests
|
|
||||||
|
|
||||||
- name: Trigger handlers
|
|
||||||
ansible.builtin.meta: flush_handlers
|
|
||||||
@@ -1,13 +0,0 @@
|
|||||||
- name: Configure fallback name resolution
|
|
||||||
ansible.builtin.lineinfile:
|
|
||||||
path: /etc/hosts
|
|
||||||
line: "{{ vapp['guestinfo.ipaddress'] }} {{ item + '.' + vapp['metacluster.fqdn'] }}"
|
|
||||||
state: present
|
|
||||||
loop:
|
|
||||||
# TODO: Make this list dynamic
|
|
||||||
- ca
|
|
||||||
- git
|
|
||||||
- gitops
|
|
||||||
- ingress
|
|
||||||
- registry
|
|
||||||
- storage
|
|
||||||
@@ -1,55 +0,0 @@
|
|||||||
- name: Gather service facts
|
|
||||||
ansible.builtin.service_facts:
|
|
||||||
# Module requires no attributes
|
|
||||||
|
|
||||||
- name: Install K3s
|
|
||||||
ansible.builtin.command:
|
|
||||||
cmd: ./install.sh
|
|
||||||
chdir: /opt/metacluster/k3s
|
|
||||||
environment:
|
|
||||||
INSTALL_K3S_SKIP_DOWNLOAD: 'true'
|
|
||||||
INSTALL_K3S_EXEC: 'server --cluster-init --disable local-storage'
|
|
||||||
when: ansible_facts.services['k3s.service'] is undefined
|
|
||||||
|
|
||||||
- name: Debug possible taints on k3s node
|
|
||||||
ansible.builtin.shell:
|
|
||||||
cmd: >-
|
|
||||||
while true;
|
|
||||||
do
|
|
||||||
kubectl get nodes -o custom-columns=NAME:.metadata.name,TAINTS:.spec.taints --no-headers | awk '{print strftime("%H:%M:%S"),$0;fflush();}' >> /var/log/taintlog
|
|
||||||
sleep 1
|
|
||||||
done
|
|
||||||
async: 1800
|
|
||||||
poll: 0
|
|
||||||
|
|
||||||
- name: Ensure API availability
|
|
||||||
ansible.builtin.uri:
|
|
||||||
url: https://{{ vapp['guestinfo.ipaddress'] }}:6443/livez?verbose
|
|
||||||
method: GET
|
|
||||||
validate_certs: no
|
|
||||||
status_code: [200, 401]
|
|
||||||
register: api_readycheck
|
|
||||||
until: api_readycheck.json.apiVersion is defined
|
|
||||||
retries: 5
|
|
||||||
delay: 30
|
|
||||||
|
|
||||||
- name: Install kubectl tab-completion
|
|
||||||
ansible.builtin.shell:
|
|
||||||
cmd: kubectl completion bash | tee /etc/bash_completion.d/kubectl
|
|
||||||
|
|
||||||
- name: Initialize tempfile
|
|
||||||
ansible.builtin.tempfile:
|
|
||||||
state: file
|
|
||||||
register: kubeconfig
|
|
||||||
|
|
||||||
- name: Retrieve kubeconfig
|
|
||||||
ansible.builtin.command:
|
|
||||||
cmd: kubectl config view --raw
|
|
||||||
register: kubectl_config
|
|
||||||
|
|
||||||
- name: Store kubeconfig in tempfile
|
|
||||||
ansible.builtin.copy:
|
|
||||||
dest: "{{ kubeconfig.path }}"
|
|
||||||
content: "{{ kubectl_config.stdout }}"
|
|
||||||
mode: 0600
|
|
||||||
no_log: true
|
|
||||||
@@ -1,41 +0,0 @@
|
|||||||
- name: Install harbor chart
|
|
||||||
kubernetes.core.helm:
|
|
||||||
name: harbor
|
|
||||||
chart_ref: /opt/metacluster/helm-charts/harbor
|
|
||||||
release_namespace: harbor
|
|
||||||
create_namespace: yes
|
|
||||||
wait: yes
|
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
|
||||||
values: "{{ components.harbor.chart_values }}"
|
|
||||||
|
|
||||||
- name: Ensure harbor API availability
|
|
||||||
ansible.builtin.uri:
|
|
||||||
url: https://registry.{{ vapp['metacluster.fqdn'] }}/api/v2.0/health
|
|
||||||
method: GET
|
|
||||||
register: api_readycheck
|
|
||||||
until: api_readycheck.json.status == 'healthy'
|
|
||||||
retries: 5
|
|
||||||
delay: 30
|
|
||||||
|
|
||||||
- name: Push images to registry
|
|
||||||
ansible.builtin.shell:
|
|
||||||
cmd: >-
|
|
||||||
skopeo copy \
|
|
||||||
--insecure-policy \
|
|
||||||
--dest-tls-verify=false \
|
|
||||||
--dest-creds admin:{{ vapp['guestinfo.rootpw'] }} \
|
|
||||||
docker-archive:./{{ item | basename }} \
|
|
||||||
docker://registry.{{ vapp['metacluster.fqdn'] }}/library/$( \
|
|
||||||
skopeo list-tags \
|
|
||||||
--insecure-policy \
|
|
||||||
docker-archive:./{{ item | basename }} | \
|
|
||||||
jq -r '.Tags[0]')
|
|
||||||
chdir: /opt/metacluster/container-images/
|
|
||||||
loop: "{{ query('ansible.builtin.fileglob', '/opt/metacluster/container-images/*.tar') | sort }}"
|
|
||||||
loop_control:
|
|
||||||
label: "{{ item | basename }}"
|
|
||||||
|
|
||||||
- name: Configure K3s node for private registry
|
|
||||||
ansible.builtin.template:
|
|
||||||
dest: /etc/rancher/k3s/registries.yaml
|
|
||||||
src: registries.j2
|
|
||||||
@@ -1,52 +0,0 @@
|
|||||||
- name: Install sealed-secrets chart
|
|
||||||
kubernetes.core.helm:
|
|
||||||
name: sealed-secrets-controller
|
|
||||||
chart_ref: /opt/metacluster/helm-charts/sealed-secrets
|
|
||||||
release_namespace: kube-system
|
|
||||||
wait: yes
|
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
|
||||||
# values: "{{ components.sealedsecrets.chart_values }}"
|
|
||||||
|
|
||||||
- name: Store hypervisor details in configmap/secret
|
|
||||||
kubernetes.core.k8s:
|
|
||||||
state: present
|
|
||||||
template: "{{ item.kind }}.j2"
|
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
|
||||||
vars:
|
|
||||||
_template:
|
|
||||||
name: "{{ item.name }}"
|
|
||||||
namespace: "{{ item.namespace }}"
|
|
||||||
annotations: "{{ item.annotations | default('{}') | indent(width=4, first=True) }}"
|
|
||||||
labels: "{{ item.labels | default('{}') | indent(width=4, first=True) }}"
|
|
||||||
data: "{{ item.data }}"
|
|
||||||
loop:
|
|
||||||
- name: hypervisor-credentials
|
|
||||||
namespace: kube-system
|
|
||||||
kind: secret
|
|
||||||
data:
|
|
||||||
- key: HV_FQDN
|
|
||||||
value: "{{ vapp['hv.fqdn'] | b64encode }}"
|
|
||||||
- key: HV_USERNAME
|
|
||||||
value: "{{ vapp['hv.username'] | b64encode }}"
|
|
||||||
- key: HV_PASSWORD
|
|
||||||
value: "{{ vapp['hv.password'] | b64encode }}"
|
|
||||||
- name: hypervisor-ippool
|
|
||||||
namespace: kube-system
|
|
||||||
kind: configmap
|
|
||||||
data:
|
|
||||||
- key: VAPP_MOREF
|
|
||||||
value: "{{ moref_id }}"
|
|
||||||
- key: VAPP_IPPOOL_FQDN
|
|
||||||
value: "{{ vapp['metacluster.fqdn'] }}"
|
|
||||||
- key: VAPP_IPPOOL_NETWORK
|
|
||||||
value: "{{ (vapp['guestinfo.ipaddress'] + '/' + vapp['guestinfo.prefixlength']) | ansible.utils.ipaddr('network') }}"
|
|
||||||
- key: VAPP_IPPOOL_NETMASK
|
|
||||||
value: "{{ (vapp['guestinfo.ipaddress'] + '/' + vapp['guestinfo.prefixlength']) | ansible.utils.ipaddr('netmask') }}"
|
|
||||||
- key: VAPP_IPPOOL_DNSSERVER
|
|
||||||
value: "{{ vapp['guestinfo.dnsserver'] }}"
|
|
||||||
- key: VAPP_IPPOOL_GATEWAY
|
|
||||||
value: "{{ vapp['guestinfo.gateway'] }}"
|
|
||||||
- key: VAPP_IPPOOL_RANGE
|
|
||||||
value: "{{ vapp['ippool.startip'] + '#' + (vapp['ippool.startip'] | netaddr_iter_iprange(vapp['ippool.endip']) | length | string) }}"
|
|
||||||
loop_control:
|
|
||||||
label: "{{ item.kind + '/' + item.name + ' (' + item.namespace + ')' }}"
|
|
||||||
@@ -1,9 +0,0 @@
|
|||||||
- name: Install longhorn chart
|
|
||||||
kubernetes.core.helm:
|
|
||||||
name: longhorn
|
|
||||||
chart_ref: /opt/metacluster/helm-charts/longhorn
|
|
||||||
release_namespace: longhorn-system
|
|
||||||
create_namespace: yes
|
|
||||||
wait: yes
|
|
||||||
kubeconfig: "{{ kubeconfig.path }}"
|
|
||||||
values: "{{ components.longhorn.chart_values }}"
|
|
||||||
@@ -1,10 +0,0 @@
|
|||||||
network:
|
|
||||||
version: 2
|
|
||||||
ethernets:
|
|
||||||
ens192:
|
|
||||||
addresses:
|
|
||||||
- {{ vapp['guestinfo.ipaddress'] }}/{{ vapp['guestinfo.prefixlength'] }}
|
|
||||||
gateway4: {{ vapp['guestinfo.gateway'] }}
|
|
||||||
nameservers:
|
|
||||||
addresses:
|
|
||||||
- {{ vapp['guestinfo.dnsserver'] }}
|
|
||||||
@@ -1,20 +0,0 @@
|
|||||||
- name: Create folder structure(s)
|
|
||||||
ansible.builtin.file:
|
|
||||||
path: "{{ item }}"
|
|
||||||
state: directory
|
|
||||||
loop:
|
|
||||||
- /opt/firstboot
|
|
||||||
|
|
||||||
- name: Save tty script file
|
|
||||||
ansible.builtin.template:
|
|
||||||
src: tty.j2
|
|
||||||
dest: /opt/firstboot/tty.sh
|
|
||||||
owner: root
|
|
||||||
group: root
|
|
||||||
mode: 0700
|
|
||||||
|
|
||||||
- name: Create @reboot crontab job
|
|
||||||
ansible.builtin.cron:
|
|
||||||
name: tty.consolemessage
|
|
||||||
special_time: reboot
|
|
||||||
job: /opt/firstboot/tty.sh
|
|
||||||
@@ -1,30 +0,0 @@
|
|||||||
- name: Configure clusterctl
|
|
||||||
ansible.builtin.template:
|
|
||||||
src: clusterctl.j2
|
|
||||||
dest: /opt/metacluster/cluster-api/clusterctl.yaml
|
|
||||||
vars:
|
|
||||||
_template:
|
|
||||||
version:
|
|
||||||
base: "{{ components.clusterapi.management.version.base }}"
|
|
||||||
cert_manager: "{{ components.clusterapi.management.version.cert_manager }}"
|
|
||||||
infrastructure_vsphere: "{{ components.clusterapi.management.version.infrastructure_vsphere }}"
|
|
||||||
hv:
|
|
||||||
fqdn: "{{ vapp['hv.fqdn'] }}"
|
|
||||||
tlsthumbprint: "{{ tls_thumbprint.stdout }}"
|
|
||||||
username: "{{ vapp['hv.username'] }}"
|
|
||||||
password: "{{ vapp['hv.password'] }}"
|
|
||||||
datacenter: "{{ vcenter_info.datacenter }}"
|
|
||||||
datastore: "{{ vcenter_info.datastore }}"
|
|
||||||
network: "{{ vcenter_info.network }}"
|
|
||||||
resourcepool: "{{ vcenter_info.resourcepool }}"
|
|
||||||
folder: "{{ vcenter_info.folder }}"
|
|
||||||
cluster:
|
|
||||||
nodetemplate: "{{ (components.clusterapi.workload.node_template.name | split('.'))[:-1] | join('.') }}"
|
|
||||||
publickey: "{{ vapp['guestinfo.rootsshkey'] }}"
|
|
||||||
version: "{{ components.clusterapi.workload.version.k8s }}"
|
|
||||||
vip: "{{ vapp['workloadcluster.vip'] }}"
|
|
||||||
|
|
||||||
- name: Initialize Cluster API management cluster
|
|
||||||
ansible.builtin.shell:
|
|
||||||
cmd: clusterctl init -v5 -i vsphere:{{ components.clusterapi.management.version.infrastructure_vsphere }} --config ./clusterctl.yaml --kubeconfig {{ kubeconfig.path }}
|
|
||||||
chdir: /opt/metacluster/cluster-api
|
|
||||||
@@ -1,68 +0,0 @@
|
|||||||
- block:
|
|
||||||
|
|
||||||
- name: Check for existing templates on hypervisor
|
|
||||||
community.vmware.vmware_guest_info:
|
|
||||||
name: "{{ (item | basename | split('.'))[:-1] | join('.') }}"
|
|
||||||
register: existing_ova
|
|
||||||
loop: "{{ query('ansible.builtin.fileglob', '/opt/workloadcluster/node-templates/*.ova') | sort }}"
|
|
||||||
ignore_errors: yes
|
|
||||||
|
|
||||||
- name: Parse OVA files for network mappings
|
|
||||||
ansible.builtin.shell:
|
|
||||||
cmd: govc import.spec -json {{ item }}
|
|
||||||
environment:
|
|
||||||
GOVC_INSECURE: '1'
|
|
||||||
GOVC_URL: "{{ vapp['hv.fqdn'] }}"
|
|
||||||
GOVC_USERNAME: "{{ vapp['hv.username'] }}"
|
|
||||||
GOVC_PASSWORD: "{{ vapp['hv.password'] }}"
|
|
||||||
register: ova_spec
|
|
||||||
when: existing_ova.results[index] is failed
|
|
||||||
loop: "{{ query('ansible.builtin.fileglob', '/opt/workloadcluster/node-templates/*.ova') | sort }}"
|
|
||||||
loop_control:
|
|
||||||
index_var: index
|
|
||||||
|
|
||||||
- name: Deploy OVA templates on hypervisor
|
|
||||||
community.vmware.vmware_deploy_ovf:
|
|
||||||
cluster: "{{ vcenter_info.cluster }}"
|
|
||||||
datastore: "{{ vcenter_info.datastore }}"
|
|
||||||
folder: "{{ vcenter_info.folder }}"
|
|
||||||
name: "{{ (item | basename | split('.'))[:-1] | join('.') }}"
|
|
||||||
networks: "{u'{{ ova_spec.results[index].stdout | from_json | json_query('NetworkMapping[0].Name') }}':u'{{ vcenter_info.network }}'}"
|
|
||||||
allow_duplicates: no
|
|
||||||
power_on: false
|
|
||||||
ovf: "{{ item }}"
|
|
||||||
register: ova_deploy
|
|
||||||
when: existing_ova.results[index] is failed
|
|
||||||
loop: "{{ query('ansible.builtin.fileglob', '/opt/workloadcluster/node-templates/*.ova') | sort }}"
|
|
||||||
loop_control:
|
|
||||||
index_var: index
|
|
||||||
|
|
||||||
- name: Create snapshot on deployed VM's
|
|
||||||
community.vmware.vmware_guest_snapshot:
|
|
||||||
folder: "{{ vcenter_info.folder }}"
|
|
||||||
name: "{{ item.instance.hw_name }}"
|
|
||||||
state: present
|
|
||||||
snapshot_name: "{{ ansible_date_time.iso8601_basic_short }}-base"
|
|
||||||
when: ova_deploy.results[index] is not skipped
|
|
||||||
loop: "{{ ova_deploy.results }}"
|
|
||||||
loop_control:
|
|
||||||
index_var: index
|
|
||||||
label: "{{ item.item }}"
|
|
||||||
|
|
||||||
- name: Mark deployed VM's as templates
|
|
||||||
community.vmware.vmware_guest:
|
|
||||||
name: "{{ item.instance.hw_name }}"
|
|
||||||
is_template: yes
|
|
||||||
when: ova_deploy.results[index] is not skipped
|
|
||||||
loop: "{{ ova_deploy.results }}"
|
|
||||||
loop_control:
|
|
||||||
index_var: index
|
|
||||||
label: "{{ item.item }}"
|
|
||||||
|
|
||||||
module_defaults:
|
|
||||||
group/vmware:
|
|
||||||
hostname: "{{ vapp['hv.fqdn'] }}"
|
|
||||||
validate_certs: no
|
|
||||||
username: "{{ vapp['hv.username'] }}"
|
|
||||||
password: "{{ vapp['hv.password'] }}"
|
|
||||||
datacenter: "{{ vcenter_info.datacenter }}"
|
|
||||||
@@ -1,28 +0,0 @@
|
|||||||
apiVersion: argoproj.io/v1alpha1
|
|
||||||
kind: ApplicationSet
|
|
||||||
metadata:
|
|
||||||
name: {{ _template.name }}
|
|
||||||
namespace: {{ _template.namespace }}
|
|
||||||
spec:
|
|
||||||
generators:
|
|
||||||
- git:
|
|
||||||
repoURL: ssh://git@gitea-ssh.gitea.svc.cluster.local/mc/GitOps.Config.git
|
|
||||||
revision: HEAD
|
|
||||||
directories:
|
|
||||||
- path: metacluster-applicationset/*
|
|
||||||
template:
|
|
||||||
metadata:
|
|
||||||
name: {% raw %}'{{ path.basename }}'{% endraw +%}
|
|
||||||
spec:
|
|
||||||
project: default
|
|
||||||
syncPolicy:
|
|
||||||
automated:
|
|
||||||
prune: true
|
|
||||||
selfHeal: true
|
|
||||||
source:
|
|
||||||
repoURL: ssh://git@gitea-ssh.gitea.svc.cluster.local/mc/GitOps.Config.git
|
|
||||||
targetRevision: HEAD
|
|
||||||
path: {% raw %}'{{ path }}'{% endraw +%}
|
|
||||||
destination:
|
|
||||||
server: https://kubernetes.default.svc
|
|
||||||
namespace: default
|
|
||||||
@@ -1,13 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: Secret
|
|
||||||
metadata:
|
|
||||||
name: {{ _template.name }}-{{ _template.uid }}
|
|
||||||
namespace: {{ _template.namespace }}
|
|
||||||
labels:
|
|
||||||
argocd.argoproj.io/secret-type: repository
|
|
||||||
stringData:
|
|
||||||
url: ssh://git@gitea-ssh.gitea.svc.cluster.local/mc/GitOps.Config.git
|
|
||||||
name: {{ _template.name }}
|
|
||||||
insecure: 'true'
|
|
||||||
sshPrivateKey: |
|
|
||||||
{{ _template.privatekey }}
|
|
||||||
@@ -1,31 +0,0 @@
|
|||||||
mirrors:
|
|
||||||
cr.step.cm:
|
|
||||||
endpoint:
|
|
||||||
- https://registry.{{ vapp['metacluster.fqdn'] }}
|
|
||||||
rewrite:
|
|
||||||
"(.*)": "library/cr.step.sm/$1"
|
|
||||||
docker.io:
|
|
||||||
endpoint:
|
|
||||||
- https://registry.{{ vapp['metacluster.fqdn'] }}
|
|
||||||
rewrite:
|
|
||||||
"(.*)": "library/docker.io/$1"
|
|
||||||
gcr.io:
|
|
||||||
endpoint:
|
|
||||||
- https://registry.{{ vapp['metacluster.fqdn'] }}
|
|
||||||
rewrite:
|
|
||||||
"(.*)": "library/gcr.io/$1"
|
|
||||||
ghcr.io:
|
|
||||||
endpoint:
|
|
||||||
- https://registry.{{ vapp['metacluster.fqdn'] }}
|
|
||||||
rewrite:
|
|
||||||
"(.*)": "library/ghcr.io/$1"
|
|
||||||
k8s.gcr.io:
|
|
||||||
endpoint:
|
|
||||||
- https://registry.{{ vapp['metacluster.fqdn'] }}
|
|
||||||
rewrite:
|
|
||||||
"(.*)": "library/k8s.gcr.io/$1"
|
|
||||||
quay.io:
|
|
||||||
endpoint:
|
|
||||||
- https://registry.{{ vapp['metacluster.fqdn'] }}
|
|
||||||
rewrite:
|
|
||||||
"(.*)": "library/quay.io/$1"
|
|
||||||
@@ -3,15 +3,18 @@
|
|||||||
connection: local
|
connection: local
|
||||||
gather_facts: true
|
gather_facts: true
|
||||||
vars_files:
|
vars_files:
|
||||||
|
- defaults.yml
|
||||||
- metacluster.yml
|
- metacluster.yml
|
||||||
# become: true
|
# become: true
|
||||||
roles:
|
roles:
|
||||||
- vapp
|
- vapp
|
||||||
- network
|
- network
|
||||||
|
- preflight
|
||||||
- users
|
- users
|
||||||
- disks
|
- disks
|
||||||
- metacluster
|
- metacluster
|
||||||
- workloadcluster
|
- workloadcluster
|
||||||
|
- decommission
|
||||||
- tty
|
- tty
|
||||||
- cleanup
|
- cleanup
|
||||||
handlers:
|
handlers:
|
||||||
@@ -0,0 +1,35 @@
|
|||||||
|
- name: Cordon node
|
||||||
|
kubernetes.core.k8s_drain:
|
||||||
|
name: "{{ decom_nodename }}"
|
||||||
|
state: cordon
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
|
||||||
|
- name: Drain node
|
||||||
|
# Currently does not work; returns with error "Failed to delete pod [...] due to: Too Many Requests"
|
||||||
|
# See also: https://github.com/ansible-collections/kubernetes.core/issues/474
|
||||||
|
# kubernetes.core.k8s_drain:
|
||||||
|
# name: "{{ decom_nodename }}"
|
||||||
|
# state: drain
|
||||||
|
# delete_options:
|
||||||
|
# ignore_daemonsets: true
|
||||||
|
# delete_emptydir_data: true
|
||||||
|
# kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
kubectl drain {{ decom_nodename }} \
|
||||||
|
--delete-emptydir-data \
|
||||||
|
--ignore-daemonsets
|
||||||
|
register: nodedrain_results
|
||||||
|
until:
|
||||||
|
- nodedrain_results is not failed
|
||||||
|
- (nodedrain_results.stdout_lines | last) is match('node/.* drained')
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ ((storage_benchmark | float) * playbook.delay.short) | int }}"
|
||||||
|
|
||||||
|
- name: Delete node
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
name: "{{ decom_nodename }}"
|
||||||
|
kind: node
|
||||||
|
state: absent
|
||||||
|
wait: true
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
@@ -0,0 +1,18 @@
|
|||||||
|
- name: Lookup node name and moref-id for decommissioning
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
decom_nodename: >-
|
||||||
|
{{
|
||||||
|
lookup('kubernetes.core.k8s', kind='Node', kubeconfig=(kubeconfig.path)) |
|
||||||
|
json_query('[? metadata.name != `' ~ ansible_facts.nodename ~ '`].metadata.name') |
|
||||||
|
first
|
||||||
|
}}
|
||||||
|
decom_morefid: >-
|
||||||
|
{{
|
||||||
|
lookup('kubernetes.core.k8s', kind='Node', kubeconfig=(kubeconfig.path)) |
|
||||||
|
json_query('[? metadata.name != `' ~ ansible_facts.nodename ~ '`].metadata.labels."ova.airgappedk8s/moref_id"') |
|
||||||
|
first
|
||||||
|
}}
|
||||||
|
|
||||||
|
- import_tasks: storage.yml
|
||||||
|
- import_tasks: k3s.yml
|
||||||
|
- import_tasks: virtualmachine.yml
|
||||||
@@ -0,0 +1,27 @@
|
|||||||
|
- name: Disable disk scheduling and evict replicas
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
api_version: longhorn.io/v1beta2
|
||||||
|
kind: lhn
|
||||||
|
name: "{{ decom_nodename }}"
|
||||||
|
namespace: longhorn-system
|
||||||
|
state: patched
|
||||||
|
definition: |
|
||||||
|
spec:
|
||||||
|
allowScheduling: false
|
||||||
|
evictionRequested: true
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
|
||||||
|
- name: Reduce replica amount for each volume
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
api_version: longhorn.io/v1beta2
|
||||||
|
kind: volume
|
||||||
|
name: "{{ item.metadata.name }}"
|
||||||
|
namespace: longhorn-system
|
||||||
|
state: patched
|
||||||
|
definition: |
|
||||||
|
spec:
|
||||||
|
numberOfReplicas: {{ (lookup('kubernetes.core.k8s', kind='node', kubeconfig=(kubeconfig.path)) | length | int) - 1 }}
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
loop: "{{ query('kubernetes.core.k8s', api_version='longhorn.io/v1beta2', kind='volume', namespace='longhorn-system', kubeconfig=(kubeconfig.path)) }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.metadata.name }}"
|
||||||
@@ -0,0 +1,26 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Lookup VM name
|
||||||
|
community.vmware.vmware_guest_info:
|
||||||
|
moid: "{{ decom_morefid }}"
|
||||||
|
register: virtualmachine_details
|
||||||
|
|
||||||
|
- name: Power off VM
|
||||||
|
community.vmware.vmware_guest:
|
||||||
|
name: "{{ virtualmachine_details.instance.hw_name }}"
|
||||||
|
folder: "{{ virtualmachine_details.instance.hw_folder }}"
|
||||||
|
state: poweredoff
|
||||||
|
|
||||||
|
# - name: Delete VM
|
||||||
|
# community.vmware.vmware_guest:
|
||||||
|
# name: "{{ virtualmachine_details.hw_name }}"
|
||||||
|
# folder: "{{ virtualmachine_details.hw_folder }}"
|
||||||
|
# state: absent
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
group/vmware:
|
||||||
|
hostname: "{{ vapp['hv.fqdn'] }}"
|
||||||
|
validate_certs: no
|
||||||
|
username: "{{ vapp['hv.username'] }}"
|
||||||
|
password: "{{ vapp['hv.password'] }}"
|
||||||
|
datacenter: "{{ vcenter_info.datacenter }}"
|
||||||
@@ -0,0 +1,52 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Initialize tempfile
|
||||||
|
ansible.builtin.tempfile:
|
||||||
|
state: file
|
||||||
|
register: values_file
|
||||||
|
|
||||||
|
- name: Lookup current chart values
|
||||||
|
kubernetes.core.helm_info:
|
||||||
|
name: step-certificates
|
||||||
|
namespace: step-ca
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
register: stepca_values
|
||||||
|
|
||||||
|
- name: Write chart values w/ password to tempfile
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ values_file.path }}"
|
||||||
|
content: "{{ stepca_values.status | json_query('values') | to_yaml }}"
|
||||||
|
no_log: true
|
||||||
|
|
||||||
|
- name: Upgrade step-ca chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: step-certificates
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/step-certificates
|
||||||
|
release_namespace: step-ca
|
||||||
|
wait: false
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values_files:
|
||||||
|
- "{{ values_file.path }}"
|
||||||
|
|
||||||
|
- name: Cleanup tempfile
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ values_file.path }}"
|
||||||
|
state: absent
|
||||||
|
when: values_file.path is defined
|
||||||
|
|
||||||
|
- name: Ensure step-ca API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://ca.{{ vapp['metacluster.fqdn'] }}/health
|
||||||
|
method: GET
|
||||||
|
register: api_readycheck
|
||||||
|
until:
|
||||||
|
- api_readycheck.json.status is defined
|
||||||
|
- api_readycheck.json.status == 'ok'
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.long | int) }}"
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201]
|
||||||
|
body_format: json
|
||||||
@@ -0,0 +1,50 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Push images to registry
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: >-
|
||||||
|
skopeo copy \
|
||||||
|
--insecure-policy \
|
||||||
|
--dest-tls-verify=false \
|
||||||
|
--dest-creds admin:{{ vapp['metacluster.password'] }} \
|
||||||
|
docker-archive:./{{ item | basename }} \
|
||||||
|
docker://registry.{{ vapp['metacluster.fqdn'] }}/library/$( \
|
||||||
|
skopeo list-tags \
|
||||||
|
--insecure-policy \
|
||||||
|
docker-archive:./{{ item | basename }} | \
|
||||||
|
jq -r '.Tags[0]')
|
||||||
|
chdir: /opt/metacluster/container-images/
|
||||||
|
register: push_result
|
||||||
|
loop: "{{ query('ansible.builtin.fileglob', '/opt/metacluster/container-images/*.tar') | sort }}"
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item | basename }}"
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ ((storage_benchmark | float) * playbook.delay.short) | int }}"
|
||||||
|
until: push_result is not failed
|
||||||
|
|
||||||
|
- name: Get all stored container images (=artifacts)
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://registry.{{ vapp['metacluster.fqdn'] }}/api/v2.0/search?q=library
|
||||||
|
method: GET
|
||||||
|
register: registry_artifacts
|
||||||
|
|
||||||
|
- name: Get source registries of all artifacts
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
source_registries: "{{ (source_registries | default([]) + [(item | split('/'))[1]]) | unique | sort }}"
|
||||||
|
loop: "{{ registry_artifacts.json.repository | json_query('[*].repository_name') }}"
|
||||||
|
|
||||||
|
- name: Configure K3s node for private registry
|
||||||
|
ansible.builtin.template:
|
||||||
|
dest: /etc/rancher/k3s/registries.yaml
|
||||||
|
src: registries.j2
|
||||||
|
vars:
|
||||||
|
_template:
|
||||||
|
data: "{{ source_registries }}"
|
||||||
|
hv:
|
||||||
|
fqdn: "{{ vapp['metacluster.fqdn'] }}"
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201, 401]
|
||||||
|
body_format: json
|
||||||
@@ -0,0 +1,27 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Upgrade gitea chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: gitea
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/gitea
|
||||||
|
release_namespace: gitea
|
||||||
|
wait: false
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: "{{ components['gitea'].chart_values }}"
|
||||||
|
|
||||||
|
- name: Ensure gitea API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://git.{{ vapp['metacluster.fqdn'] }}/api/healthz
|
||||||
|
method: GET
|
||||||
|
register: api_readycheck
|
||||||
|
until:
|
||||||
|
- api_readycheck.json.status is defined
|
||||||
|
- api_readycheck.json.status == 'pass'
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.long | int) }}"
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201]
|
||||||
|
body_format: json
|
||||||
@@ -0,0 +1,26 @@
|
|||||||
|
- block:
|
||||||
|
|
||||||
|
- name: Upgrade argo-cd chart
|
||||||
|
kubernetes.core.helm:
|
||||||
|
name: argo-cd
|
||||||
|
chart_ref: /opt/metacluster/helm-charts/argo-cd
|
||||||
|
release_namespace: argo-cd
|
||||||
|
wait: false
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
values: "{{ components['argo-cd'].chart_values }}"
|
||||||
|
|
||||||
|
- name: Ensure argo-cd API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://gitops.{{ vapp['metacluster.fqdn'] }}/api/version
|
||||||
|
method: GET
|
||||||
|
register: api_readycheck
|
||||||
|
until:
|
||||||
|
- api_readycheck.json.Version is defined
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.long | int) }}"
|
||||||
|
|
||||||
|
module_defaults:
|
||||||
|
ansible.builtin.uri:
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 201]
|
||||||
|
body_format: json
|
||||||
@@ -0,0 +1,35 @@
|
|||||||
|
- name: Configure fallback name resolution
|
||||||
|
ansible.builtin.lineinfile:
|
||||||
|
path: /etc/hosts
|
||||||
|
line: "{{ vapp['metacluster.vip'] }} {{ item ~ '.' ~ vapp['metacluster.fqdn'] }}"
|
||||||
|
state: present
|
||||||
|
loop:
|
||||||
|
# TODO: Make this list dynamic
|
||||||
|
- ca
|
||||||
|
- git
|
||||||
|
- gitops
|
||||||
|
- ingress
|
||||||
|
- registry
|
||||||
|
- storage
|
||||||
|
|
||||||
|
- name: Retrieve root CA certificate
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://ca.{{ vapp['metacluster.fqdn'] }}/roots
|
||||||
|
validate_certs: no
|
||||||
|
method: GET
|
||||||
|
status_code: [200, 201]
|
||||||
|
register: rootca_certificate
|
||||||
|
|
||||||
|
- name: Store root CA certificate
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: /usr/local/share/ca-certificates/root_ca.crt
|
||||||
|
content: "{{ rootca_certificate.json.crts | list | join('\n') }}"
|
||||||
|
|
||||||
|
- name: Update certificate truststore
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: update-ca-certificates
|
||||||
|
|
||||||
|
- name: Remove redundant files
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: /var/lib/rancher/k3s/server/manifests/traefik-config.yaml
|
||||||
|
state: absent
|
||||||
@@ -0,0 +1,80 @@
|
|||||||
|
- name: Store custom configuration files
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ item.filename }}"
|
||||||
|
content: "{{ item.content }}"
|
||||||
|
loop:
|
||||||
|
- filename: /etc/rancher/k3s/config.yaml
|
||||||
|
content: |
|
||||||
|
kubelet-arg:
|
||||||
|
- "config=/etc/rancher/k3s/kubelet.config"
|
||||||
|
- filename: /etc/rancher/k3s/kubelet.config
|
||||||
|
content: |
|
||||||
|
apiVersion: kubelet.config.k8s.io/v1beta1
|
||||||
|
kind: KubeletConfiguration
|
||||||
|
|
||||||
|
shutdownGracePeriod: 180s
|
||||||
|
shtudownGracePeriodCriticalPods: 60s
|
||||||
|
loop_control:
|
||||||
|
label: "{{ item.filename }}"
|
||||||
|
|
||||||
|
- name: Gather service facts
|
||||||
|
ansible.builtin.service_facts:
|
||||||
|
# Module requires no attributes
|
||||||
|
|
||||||
|
- name: Install K3s
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: ./install.sh
|
||||||
|
chdir: /opt/metacluster/k3s
|
||||||
|
environment:
|
||||||
|
INSTALL_K3S_SKIP_DOWNLOAD: 'true'
|
||||||
|
# To prevent from overwriting traefik's existing configuration, "disable" it on this new node
|
||||||
|
INSTALL_K3S_EXEC: "server --token {{ vapp['metacluster.token'] | trim }} --server https://{{ vapp['metacluster.vip'] }}:6443 --disable local-storage,traefik --config /etc/rancher/k3s/config.yaml"
|
||||||
|
when: ansible_facts.services['k3s.service'] is undefined
|
||||||
|
|
||||||
|
- name: Ensure API availability
|
||||||
|
ansible.builtin.uri:
|
||||||
|
url: https://{{ vapp['guestinfo.ipaddress'] }}:6443/livez?verbose
|
||||||
|
method: GET
|
||||||
|
validate_certs: no
|
||||||
|
status_code: [200, 401]
|
||||||
|
register: api_readycheck
|
||||||
|
until: api_readycheck.json.apiVersion is defined
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.medium | int) }}"
|
||||||
|
|
||||||
|
- name: Install kubectl tab-completion
|
||||||
|
ansible.builtin.shell:
|
||||||
|
cmd: kubectl completion bash | tee /etc/bash_completion.d/kubectl
|
||||||
|
|
||||||
|
- name: Initialize tempfile
|
||||||
|
ansible.builtin.tempfile:
|
||||||
|
state: file
|
||||||
|
register: kubeconfig
|
||||||
|
|
||||||
|
- name: Retrieve kubeconfig
|
||||||
|
ansible.builtin.command:
|
||||||
|
cmd: kubectl config view --raw
|
||||||
|
register: kubectl_config
|
||||||
|
|
||||||
|
- name: Store kubeconfig in tempfile
|
||||||
|
ansible.builtin.copy:
|
||||||
|
dest: "{{ kubeconfig.path }}"
|
||||||
|
content: "{{ kubectl_config.stdout }}"
|
||||||
|
mode: 0600
|
||||||
|
no_log: true
|
||||||
|
|
||||||
|
- name: Add label to node object
|
||||||
|
kubernetes.core.k8s:
|
||||||
|
name: "{{ ansible_facts.nodename | lower }}"
|
||||||
|
kind: Node
|
||||||
|
state: patched
|
||||||
|
definition:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
ova.airgappedk8s/moref_id: "{{ moref_id }}"
|
||||||
|
kubeconfig: "{{ kubeconfig.path }}"
|
||||||
|
register: k8snode_patch
|
||||||
|
until:
|
||||||
|
- k8snode_patch.result.metadata.labels['ova.airgappedk8s/moref_id'] is defined
|
||||||
|
retries: "{{ playbook.retries }}"
|
||||||
|
delay: "{{ (storage_benchmark | int) * (playbook.delay.medium | int) }}"
|
||||||
@@ -1,10 +1,9 @@
|
|||||||
- import_tasks: init.yml
|
- import_tasks: init.yml
|
||||||
|
- import_tasks: containerimages.yml
|
||||||
- import_tasks: k3s.yml
|
- import_tasks: k3s.yml
|
||||||
- import_tasks: assets.yml
|
- import_tasks: assets.yml
|
||||||
- import_tasks: ingress.yml
|
|
||||||
- import_tasks: storage.yml
|
- import_tasks: storage.yml
|
||||||
- import_tasks: certauthority.yml
|
|
||||||
- import_tasks: registry.yml
|
- import_tasks: registry.yml
|
||||||
- import_tasks: secrets.yml
|
- import_tasks: certauthority.yml
|
||||||
- import_tasks: git.yml
|
- import_tasks: git.yml
|
||||||
- import_tasks: gitops.yml
|
- import_tasks: gitops.yml
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user