2016-11-30 13:06:11 +00:00
|
|
|
---
|
2019-05-16 07:27:43 +00:00
|
|
|
- name: set architecture_groups
|
|
|
|
set_fact:
|
2018-08-20 14:07:27 +00:00
|
|
|
architecture_groups:
|
|
|
|
x86_64: amd64
|
|
|
|
aarch64: arm64
|
2019-06-05 07:05:55 +00:00
|
|
|
armv7l: arm
|
2018-08-20 14:07:27 +00:00
|
|
|
|
|
|
|
- name: ansible_architecture_rename
|
|
|
|
set_fact:
|
|
|
|
host_architecture: >-
|
|
|
|
{%- if ansible_architecture in architecture_groups -%}
|
2019-05-02 21:24:21 +00:00
|
|
|
{{ architecture_groups[ansible_architecture] }}
|
2018-08-20 14:07:27 +00:00
|
|
|
{%- else -%}
|
2019-05-02 21:24:21 +00:00
|
|
|
{{ ansible_architecture }}
|
2018-08-20 14:07:27 +00:00
|
|
|
{% endif %}
|
|
|
|
|
2018-08-23 14:51:52 +00:00
|
|
|
- name: Force binaries directory for Container Linux by CoreOS
|
|
|
|
set_fact:
|
|
|
|
bin_dir: "/opt/bin"
|
|
|
|
when: ansible_os_family in ["CoreOS", "Container Linux by CoreOS"]
|
|
|
|
tags:
|
|
|
|
- facts
|
|
|
|
|
|
|
|
- name: check if atomic host
|
|
|
|
stat:
|
|
|
|
path: /run/ostree-booted
|
|
|
|
register: ostree
|
|
|
|
|
2019-05-16 07:27:43 +00:00
|
|
|
- name: set is_atomic
|
|
|
|
set_fact:
|
2018-08-23 14:51:52 +00:00
|
|
|
is_atomic: "{{ ostree.stat.exists }}"
|
|
|
|
|
2019-05-16 07:27:43 +00:00
|
|
|
- name: set kube_cert_group on atomic hosts
|
|
|
|
set_fact:
|
2018-08-23 14:51:52 +00:00
|
|
|
kube_cert_group: "kube"
|
|
|
|
when: is_atomic
|
|
|
|
|
2016-11-30 13:06:11 +00:00
|
|
|
- name: check resolvconf
|
|
|
|
shell: which resolvconf
|
|
|
|
register: resolvconf
|
2016-12-27 11:38:54 +00:00
|
|
|
failed_when: false
|
2016-11-30 13:06:11 +00:00
|
|
|
changed_when: false
|
2017-02-06 18:13:21 +00:00
|
|
|
check_mode: no
|
2016-11-30 13:06:11 +00:00
|
|
|
|
2019-11-06 11:33:52 +00:00
|
|
|
- name: check systemd-resolved
|
|
|
|
command: systemctl is-active systemd-resolved
|
|
|
|
register: systemd_resolved_enabled
|
|
|
|
failed_when: false
|
|
|
|
changed_when: false
|
|
|
|
check_mode: no
|
|
|
|
|
2019-05-16 07:27:43 +00:00
|
|
|
- name: set dns facts
|
|
|
|
set_fact:
|
2016-11-30 13:06:11 +00:00
|
|
|
resolvconf: >-
|
|
|
|
{%- if resolvconf.rc == 0 -%}true{%- else -%}false{%- endif -%}
|
2016-11-30 13:06:11 +00:00
|
|
|
bogus_domains: |-
|
2016-11-30 13:06:11 +00:00
|
|
|
{% for d in [ 'default.svc.' + dns_domain, 'svc.' + dns_domain ] + searchdomains|default([]) -%}
|
2019-05-02 21:24:21 +00:00
|
|
|
{{ dns_domain }}.{{ d }}./{{ d }}.{{ d }}./com.{{ d }}./
|
2016-11-30 13:06:11 +00:00
|
|
|
{%- endfor %}
|
2018-01-30 21:26:07 +00:00
|
|
|
cloud_resolver: >-
|
2017-04-20 13:53:01 +00:00
|
|
|
{%- if cloud_provider is defined and cloud_provider == 'gce' -%}
|
2018-01-30 21:26:07 +00:00
|
|
|
['169.254.169.254']
|
2017-04-20 13:53:01 +00:00
|
|
|
{%- elif cloud_provider is defined and cloud_provider == 'aws' -%}
|
2018-01-30 21:26:07 +00:00
|
|
|
['169.254.169.253']
|
2017-04-20 13:53:01 +00:00
|
|
|
{%- else -%}
|
2018-01-30 21:26:07 +00:00
|
|
|
[]
|
2017-04-20 13:53:01 +00:00
|
|
|
{%- endif -%}
|
2016-11-30 13:06:11 +00:00
|
|
|
|
2017-01-18 16:18:47 +00:00
|
|
|
- name: check if kubelet is configured
|
2016-11-30 13:06:11 +00:00
|
|
|
stat:
|
2017-01-18 16:18:47 +00:00
|
|
|
path: "{{ kube_config_dir }}/kubelet.env"
|
|
|
|
register: kubelet_configured
|
2016-11-30 13:06:11 +00:00
|
|
|
changed_when: false
|
|
|
|
|
|
|
|
- name: check if early DNS configuration stage
|
|
|
|
set_fact:
|
|
|
|
dns_early: >-
|
2017-01-18 16:18:47 +00:00
|
|
|
{%- if kubelet_configured.stat.exists -%}false{%- else -%}true{%- endif -%}
|
2016-11-30 13:06:11 +00:00
|
|
|
|
|
|
|
- name: target resolv.conf files
|
|
|
|
set_fact:
|
|
|
|
resolvconffile: /etc/resolv.conf
|
|
|
|
base: >-
|
|
|
|
{%- if resolvconf|bool -%}/etc/resolvconf/resolv.conf.d/base{%- endif -%}
|
|
|
|
head: >-
|
|
|
|
{%- if resolvconf|bool -%}/etc/resolvconf/resolv.conf.d/head{%- endif -%}
|
2017-01-05 15:32:08 +00:00
|
|
|
when: not ansible_os_family in ["CoreOS", "Container Linux by CoreOS"]
|
2016-11-30 13:06:11 +00:00
|
|
|
|
2017-01-05 10:35:16 +00:00
|
|
|
- name: target temporary resolvconf cloud init file (Container Linux by CoreOS)
|
2017-02-17 21:22:34 +00:00
|
|
|
set_fact:
|
|
|
|
resolvconffile: /tmp/resolveconf_cloud_init_conf
|
2017-01-05 15:32:08 +00:00
|
|
|
when: ansible_os_family in ["CoreOS", "Container Linux by CoreOS"]
|
2016-11-30 13:06:11 +00:00
|
|
|
|
2016-12-21 11:54:25 +00:00
|
|
|
- name: check if /etc/dhclient.conf exists
|
2017-02-17 21:22:34 +00:00
|
|
|
stat:
|
|
|
|
path: /etc/dhclient.conf
|
2016-12-21 11:54:25 +00:00
|
|
|
register: dhclient_stat
|
|
|
|
|
|
|
|
- name: target dhclient conf file for /etc/dhclient.conf
|
2016-11-30 13:06:11 +00:00
|
|
|
set_fact:
|
2016-12-16 13:49:26 +00:00
|
|
|
dhclientconffile: /etc/dhclient.conf
|
2016-12-21 11:54:25 +00:00
|
|
|
when: dhclient_stat.stat.exists
|
|
|
|
|
2017-01-13 16:14:57 +00:00
|
|
|
- name: check if /etc/dhcp/dhclient.conf exists
|
2017-02-17 21:22:34 +00:00
|
|
|
stat:
|
|
|
|
path: /etc/dhcp/dhclient.conf
|
2017-01-13 16:14:57 +00:00
|
|
|
register: dhcp_dhclient_stat
|
|
|
|
|
2016-12-21 11:54:25 +00:00
|
|
|
- name: target dhclient conf file for /etc/dhcp/dhclient.conf
|
|
|
|
set_fact:
|
|
|
|
dhclientconffile: /etc/dhcp/dhclient.conf
|
2017-01-13 16:14:57 +00:00
|
|
|
when: dhcp_dhclient_stat.stat.exists
|
2016-12-21 11:54:25 +00:00
|
|
|
|
|
|
|
- name: target dhclient hook file for Red Hat family
|
|
|
|
set_fact:
|
2016-11-30 13:06:11 +00:00
|
|
|
dhclienthookfile: /etc/dhcp/dhclient.d/zdnsupdate.sh
|
|
|
|
when: ansible_os_family == "RedHat"
|
|
|
|
|
2016-12-21 11:54:25 +00:00
|
|
|
- name: target dhclient hook file for Debian family
|
2016-11-30 13:06:11 +00:00
|
|
|
set_fact:
|
|
|
|
dhclienthookfile: /etc/dhcp/dhclient-exit-hooks.d/zdnsupdate
|
|
|
|
when: ansible_os_family == "Debian"
|
|
|
|
|
|
|
|
- name: generate search domains to resolvconf
|
|
|
|
set_fact:
|
|
|
|
searchentries:
|
|
|
|
search {{ ([ 'default.svc.' + dns_domain, 'svc.' + dns_domain ] + searchdomains|default([])) | join(' ') }}
|
|
|
|
domainentry:
|
|
|
|
domain {{ dns_domain }}
|
|
|
|
supersede_search:
|
|
|
|
supersede domain-search "{{ ([ 'default.svc.' + dns_domain, 'svc.' + dns_domain ] + searchdomains|default([])) | join('", "') }}";
|
|
|
|
supersede_domain:
|
|
|
|
supersede domain-name "{{ dns_domain }}";
|
|
|
|
|
2019-04-01 19:32:34 +00:00
|
|
|
- name: pick coredns cluster IP or default resolver
|
2016-11-30 13:06:11 +00:00
|
|
|
set_fact:
|
2019-04-01 19:32:34 +00:00
|
|
|
coredns_server: |-
|
|
|
|
{%- if dns_mode == 'coredns' and not dns_early|bool -%}
|
2016-11-30 13:06:11 +00:00
|
|
|
{{ [ skydns_server ] + upstream_dns_servers|default([]) }}
|
2018-03-13 11:00:05 +00:00
|
|
|
{%- elif dns_mode == 'coredns_dual' and not dns_early|bool -%}
|
|
|
|
{{ [ skydns_server ] + [ skydns_server_secondary ] + upstream_dns_servers|default([]) }}
|
2018-01-23 13:28:42 +00:00
|
|
|
{%- elif dns_mode == 'manual' and not dns_early|bool -%}
|
2018-08-23 14:17:18 +00:00
|
|
|
{{ ( manual_dns_server.split(',') | list) + upstream_dns_servers|default([]) }}
|
2016-11-30 13:06:11 +00:00
|
|
|
{%- elif dns_early|bool -%}
|
2016-12-16 10:29:08 +00:00
|
|
|
{{ upstream_dns_servers|default([]) }}
|
2016-11-30 13:06:11 +00:00
|
|
|
{%- endif -%}
|
|
|
|
|
|
|
|
- name: generate nameservers to resolvconf
|
|
|
|
set_fact:
|
|
|
|
nameserverentries:
|
2019-06-04 07:13:02 +00:00
|
|
|
nameserver {{ ( coredns_server + nameservers|d([]) + cloud_resolver|d([])) | unique | join(',nameserver ') }}
|
2016-12-13 14:43:05 +00:00
|
|
|
supersede_nameserver:
|
2019-06-04 07:13:02 +00:00
|
|
|
supersede domain-name-servers {{ ( coredns_server + nameservers|d([]) + cloud_resolver|d([])) | unique | join(', ') }};
|
2018-08-23 14:51:52 +00:00
|
|
|
|
|
|
|
- name: gather os specific variables
|
|
|
|
include_vars: "{{ item }}"
|
|
|
|
with_first_found:
|
|
|
|
- files:
|
|
|
|
- "{{ ansible_distribution|lower }}-{{ ansible_distribution_version|lower|replace('/', '_') }}.yml"
|
|
|
|
- "{{ ansible_distribution|lower }}-{{ ansible_distribution_release }}.yml"
|
|
|
|
- "{{ ansible_distribution|lower }}-{{ ansible_distribution_major_version|lower|replace('/', '_') }}.yml"
|
|
|
|
- "{{ ansible_distribution|lower }}.yml"
|
|
|
|
- "{{ ansible_os_family|lower }}.yml"
|
|
|
|
- defaults.yml
|
|
|
|
paths:
|
|
|
|
- ../vars
|
|
|
|
skip: true
|
2018-10-16 14:15:05 +00:00
|
|
|
|
|
|
|
- name: override kube_proxy_mode to ipvs if kube_proxy_remove is set, as ipvs won't require kube-proxy cleanup when kube-proxy daemonset gets deleted
|
|
|
|
set_fact:
|
|
|
|
kube_proxy_mode: 'ipvs'
|
|
|
|
when:
|
|
|
|
- kube_proxy_remove
|
|
|
|
tags:
|
|
|
|
- facts
|
|
|
|
- kube-proxy
|
2019-06-20 18:12:51 +00:00
|
|
|
|
|
|
|
- name: set etcd vars if using kubeadm mode
|
|
|
|
set_fact:
|
|
|
|
etcd_cert_dir: "{{ kube_cert_dir }}"
|
|
|
|
kube_etcd_cacert_file: "etcd/ca.crt"
|
|
|
|
kube_etcd_cert_file: "apiserver-etcd-client.crt"
|
|
|
|
kube_etcd_key_file: "apiserver-etcd-client.key"
|
|
|
|
etcd_deployment_type: host
|
|
|
|
when:
|
|
|
|
- etcd_kubeadm_enabled
|
2019-07-30 19:00:10 +00:00
|
|
|
|
|
|
|
- name: check /usr readonly
|
|
|
|
stat:
|
|
|
|
path: "/usr"
|
|
|
|
register: usr
|
|
|
|
|
|
|
|
- name: set alternate flexvolume path
|
|
|
|
set_fact:
|
|
|
|
kubelet_flexvolumes_plugins_dir: /var/lib/kubelet/volumeplugins
|
|
|
|
when: not usr.stat.writeable
|