clean up tags (#8880)
This commit is contained in:
parent
14acd124bc
commit
1600fd9082
10 changed files with 0 additions and 42 deletions
|
@ -1,7 +1,6 @@
|
||||||
---
|
---
|
||||||
|
|
||||||
- include: credentials-check.yml
|
- include: credentials-check.yml
|
||||||
tags: oci
|
|
||||||
|
|
||||||
- name: "OCI Cloud Controller | Generate Cloud Provider Configuration"
|
- name: "OCI Cloud Controller | Generate Cloud Provider Configuration"
|
||||||
template:
|
template:
|
||||||
|
@ -9,7 +8,6 @@
|
||||||
dest: "{{ kube_config_dir }}/controller-manager-config.yml"
|
dest: "{{ kube_config_dir }}/controller-manager-config.yml"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: oci
|
|
||||||
|
|
||||||
- name: "OCI Cloud Controller | Slurp Configuration"
|
- name: "OCI Cloud Controller | Slurp Configuration"
|
||||||
slurp:
|
slurp:
|
||||||
|
@ -20,7 +18,6 @@
|
||||||
set_fact:
|
set_fact:
|
||||||
controller_manager_config_base64: "{{ controller_manager_config.content }}"
|
controller_manager_config_base64: "{{ controller_manager_config.content }}"
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: oci
|
|
||||||
|
|
||||||
- name: "OCI Cloud Controller | Generate Manifests"
|
- name: "OCI Cloud Controller | Generate Manifests"
|
||||||
template:
|
template:
|
||||||
|
@ -28,7 +25,6 @@
|
||||||
dest: "{{ kube_config_dir }}/oci-cloud-provider.yml"
|
dest: "{{ kube_config_dir }}/oci-cloud-provider.yml"
|
||||||
mode: 0644
|
mode: 0644
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: oci
|
|
||||||
|
|
||||||
- name: "OCI Cloud Controller | Apply Manifests"
|
- name: "OCI Cloud Controller | Apply Manifests"
|
||||||
kube:
|
kube:
|
||||||
|
@ -36,4 +32,3 @@
|
||||||
filename: "{{ kube_config_dir }}/oci-cloud-provider.yml"
|
filename: "{{ kube_config_dir }}/oci-cloud-provider.yml"
|
||||||
state: latest
|
state: latest
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: oci
|
|
||||||
|
|
|
@ -11,7 +11,6 @@
|
||||||
- {name: aws-ebs-csi-nodeservice, file: aws-ebs-csi-nodeservice.yml}
|
- {name: aws-ebs-csi-nodeservice, file: aws-ebs-csi-nodeservice.yml}
|
||||||
register: aws_csi_manifests
|
register: aws_csi_manifests
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: aws-ebs-csi-driver
|
|
||||||
|
|
||||||
- name: AWS CSI Driver | Apply Manifests
|
- name: AWS CSI Driver | Apply Manifests
|
||||||
kube:
|
kube:
|
||||||
|
@ -25,4 +24,3 @@
|
||||||
- not item is skipped
|
- not item is skipped
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.item.file }}"
|
label: "{{ item.item.file }}"
|
||||||
tags: aws-ebs-csi-driver
|
|
||||||
|
|
|
@ -1,6 +1,5 @@
|
||||||
---
|
---
|
||||||
- include_tasks: azure-credential-check.yml
|
- include_tasks: azure-credential-check.yml
|
||||||
tags: azure-csi-driver
|
|
||||||
|
|
||||||
- name: Azure CSI Driver | Write Azure CSI cloud-config
|
- name: Azure CSI Driver | Write Azure CSI cloud-config
|
||||||
template:
|
template:
|
||||||
|
@ -9,14 +8,12 @@
|
||||||
group: "{{ kube_cert_group }}"
|
group: "{{ kube_cert_group }}"
|
||||||
mode: 0640
|
mode: 0640
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: azure-csi-driver
|
|
||||||
|
|
||||||
- name: Azure CSI Driver | Get base64 cloud-config
|
- name: Azure CSI Driver | Get base64 cloud-config
|
||||||
slurp:
|
slurp:
|
||||||
src: "{{ kube_config_dir }}/azure_csi_cloud_config"
|
src: "{{ kube_config_dir }}/azure_csi_cloud_config"
|
||||||
register: cloud_config_secret
|
register: cloud_config_secret
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: azure-csi-driver
|
|
||||||
|
|
||||||
- name: Azure CSI Driver | Generate Manifests
|
- name: Azure CSI Driver | Generate Manifests
|
||||||
template:
|
template:
|
||||||
|
@ -32,7 +29,6 @@
|
||||||
- {name: azure-csi-node-info-crd.yml.j2, file: azure-csi-node-info-crd.yml}
|
- {name: azure-csi-node-info-crd.yml.j2, file: azure-csi-node-info-crd.yml}
|
||||||
register: azure_csi_manifests
|
register: azure_csi_manifests
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: azure-csi-driver
|
|
||||||
|
|
||||||
- name: Azure CSI Driver | Apply Manifests
|
- name: Azure CSI Driver | Apply Manifests
|
||||||
kube:
|
kube:
|
||||||
|
@ -46,4 +42,3 @@
|
||||||
- not item is skipped
|
- not item is skipped
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.item.file }}"
|
label: "{{ item.item.file }}"
|
||||||
tags: azure-csi-driver
|
|
||||||
|
|
|
@ -8,5 +8,4 @@
|
||||||
dest: "{{ kube_config_dir }}/cinder-cacert.pem"
|
dest: "{{ kube_config_dir }}/cinder-cacert.pem"
|
||||||
group: "{{ kube_cert_group }}"
|
group: "{{ kube_cert_group }}"
|
||||||
mode: 0640
|
mode: 0640
|
||||||
tags: cinder-csi-driver
|
|
||||||
delegate_to: "{{ delegate_host_to_write_cacert }}"
|
delegate_to: "{{ delegate_host_to_write_cacert }}"
|
||||||
|
|
|
@ -1,6 +1,5 @@
|
||||||
---
|
---
|
||||||
- include_tasks: cinder-credential-check.yml
|
- include_tasks: cinder-credential-check.yml
|
||||||
tags: cinder-csi-driver
|
|
||||||
|
|
||||||
- name: Cinder CSI Driver | Write cacert file
|
- name: Cinder CSI Driver | Write cacert file
|
||||||
include_tasks: cinder-write-cacert.yml
|
include_tasks: cinder-write-cacert.yml
|
||||||
|
@ -12,7 +11,6 @@
|
||||||
- inventory_hostname in groups['k8s_cluster']
|
- inventory_hostname in groups['k8s_cluster']
|
||||||
- cinder_cacert is defined
|
- cinder_cacert is defined
|
||||||
- cinder_cacert | length > 0
|
- cinder_cacert | length > 0
|
||||||
tags: cinder-csi-driver
|
|
||||||
|
|
||||||
- name: Cinder CSI Driver | Write Cinder cloud-config
|
- name: Cinder CSI Driver | Write Cinder cloud-config
|
||||||
template:
|
template:
|
||||||
|
@ -21,14 +19,12 @@
|
||||||
group: "{{ kube_cert_group }}"
|
group: "{{ kube_cert_group }}"
|
||||||
mode: 0640
|
mode: 0640
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: cinder-csi-driver
|
|
||||||
|
|
||||||
- name: Cinder CSI Driver | Get base64 cloud-config
|
- name: Cinder CSI Driver | Get base64 cloud-config
|
||||||
slurp:
|
slurp:
|
||||||
src: "{{ kube_config_dir }}/cinder_cloud_config"
|
src: "{{ kube_config_dir }}/cinder_cloud_config"
|
||||||
register: cloud_config_secret
|
register: cloud_config_secret
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: cinder-csi-driver
|
|
||||||
|
|
||||||
- name: Cinder CSI Driver | Generate Manifests
|
- name: Cinder CSI Driver | Generate Manifests
|
||||||
template:
|
template:
|
||||||
|
@ -45,7 +41,6 @@
|
||||||
- {name: cinder-csi-poddisruptionbudget, file: cinder-csi-poddisruptionbudget.yml}
|
- {name: cinder-csi-poddisruptionbudget, file: cinder-csi-poddisruptionbudget.yml}
|
||||||
register: cinder_csi_manifests
|
register: cinder_csi_manifests
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: cinder-csi-driver
|
|
||||||
|
|
||||||
- name: Cinder CSI Driver | Apply Manifests
|
- name: Cinder CSI Driver | Apply Manifests
|
||||||
kube:
|
kube:
|
||||||
|
@ -59,4 +54,3 @@
|
||||||
- not item is skipped
|
- not item is skipped
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.item.file }}"
|
label: "{{ item.item.file }}"
|
||||||
tags: cinder-csi-driver
|
|
||||||
|
|
|
@ -10,7 +10,6 @@
|
||||||
- {name: volumesnapshots, file: volumesnapshots.yml}
|
- {name: volumesnapshots, file: volumesnapshots.yml}
|
||||||
register: csi_crd_manifests
|
register: csi_crd_manifests
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: csi-driver
|
|
||||||
|
|
||||||
- name: CSI CRD | Apply Manifests
|
- name: CSI CRD | Apply Manifests
|
||||||
kube:
|
kube:
|
||||||
|
@ -25,4 +24,3 @@
|
||||||
- not item is skipped
|
- not item is skipped
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.item.file }}"
|
label: "{{ item.item.file }}"
|
||||||
tags: csi-driver
|
|
||||||
|
|
|
@ -3,7 +3,6 @@
|
||||||
fail:
|
fail:
|
||||||
msg: "Credentials file cloud-sa.json is mandatory"
|
msg: "Credentials file cloud-sa.json is mandatory"
|
||||||
when: gcp_pd_csi_sa_cred_file is not defined or not gcp_pd_csi_sa_cred_file
|
when: gcp_pd_csi_sa_cred_file is not defined or not gcp_pd_csi_sa_cred_file
|
||||||
tags: gcp-pd-csi-driver
|
|
||||||
|
|
||||||
- name: GCP PD CSI Driver | Copy GCP credentials file
|
- name: GCP PD CSI Driver | Copy GCP credentials file
|
||||||
copy:
|
copy:
|
||||||
|
@ -12,14 +11,12 @@
|
||||||
group: "{{ kube_cert_group }}"
|
group: "{{ kube_cert_group }}"
|
||||||
mode: 0640
|
mode: 0640
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: gcp-pd-csi-driver
|
|
||||||
|
|
||||||
- name: GCP PD CSI Driver | Get base64 cloud-sa.json
|
- name: GCP PD CSI Driver | Get base64 cloud-sa.json
|
||||||
slurp:
|
slurp:
|
||||||
src: "{{ kube_config_dir }}/cloud-sa.json"
|
src: "{{ kube_config_dir }}/cloud-sa.json"
|
||||||
register: gcp_cred_secret
|
register: gcp_cred_secret
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: gcp-pd-csi-driver
|
|
||||||
|
|
||||||
- name: GCP PD CSI Driver | Generate Manifests
|
- name: GCP PD CSI Driver | Generate Manifests
|
||||||
template:
|
template:
|
||||||
|
@ -33,7 +30,6 @@
|
||||||
- {name: gcp-pd-csi-node, file: gcp-pd-csi-node.yml}
|
- {name: gcp-pd-csi-node, file: gcp-pd-csi-node.yml}
|
||||||
register: gcp_pd_csi_manifests
|
register: gcp_pd_csi_manifests
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: gcp-pd-csi-driver
|
|
||||||
|
|
||||||
- name: GCP PD CSI Driver | Apply Manifests
|
- name: GCP PD CSI Driver | Apply Manifests
|
||||||
kube:
|
kube:
|
||||||
|
@ -47,4 +43,3 @@
|
||||||
- not item is skipped
|
- not item is skipped
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.item.file }}"
|
label: "{{ item.item.file }}"
|
||||||
tags: gcp-pd-csi-driver
|
|
||||||
|
|
|
@ -3,7 +3,6 @@
|
||||||
fail:
|
fail:
|
||||||
msg: "UpCloud username is missing. Env UPCLOUD_USERNAME is mandatory"
|
msg: "UpCloud username is missing. Env UPCLOUD_USERNAME is mandatory"
|
||||||
when: upcloud_username is not defined or not upcloud_username
|
when: upcloud_username is not defined or not upcloud_username
|
||||||
tags: upcloud-csi-driver
|
|
||||||
|
|
||||||
- name: UpCloud CSI Driver | Check if UPCLOUD_PASSWORD exists
|
- name: UpCloud CSI Driver | Check if UPCLOUD_PASSWORD exists
|
||||||
fail:
|
fail:
|
||||||
|
@ -12,7 +11,6 @@
|
||||||
- upcloud_username is defined
|
- upcloud_username is defined
|
||||||
- upcloud_username|length > 0
|
- upcloud_username|length > 0
|
||||||
- upcloud_password is not defined or not upcloud_password
|
- upcloud_password is not defined or not upcloud_password
|
||||||
tags: upcloud-csi-driver
|
|
||||||
|
|
||||||
- name: UpCloud CSI Driver | Generate Manifests
|
- name: UpCloud CSI Driver | Generate Manifests
|
||||||
template:
|
template:
|
||||||
|
@ -27,7 +25,6 @@
|
||||||
- {name: upcloud-csi-driver, file: upcloud-csi-driver.yml}
|
- {name: upcloud-csi-driver, file: upcloud-csi-driver.yml}
|
||||||
register: upcloud_csi_manifests
|
register: upcloud_csi_manifests
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: upcloud-csi-driver
|
|
||||||
|
|
||||||
- name: UpCloud CSI Driver | Apply Manifests
|
- name: UpCloud CSI Driver | Apply Manifests
|
||||||
kube:
|
kube:
|
||||||
|
@ -41,4 +38,3 @@
|
||||||
- not item is skipped
|
- not item is skipped
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.item.file }}"
|
label: "{{ item.item.file }}"
|
||||||
tags: upcloud-csi-driver
|
|
||||||
|
|
|
@ -1,6 +1,5 @@
|
||||||
---
|
---
|
||||||
- include_tasks: vsphere-credentials-check.yml
|
- include_tasks: vsphere-credentials-check.yml
|
||||||
tags: vsphere-csi-driver
|
|
||||||
|
|
||||||
- name: vSphere CSI Driver | Generate CSI cloud-config
|
- name: vSphere CSI Driver | Generate CSI cloud-config
|
||||||
template:
|
template:
|
||||||
|
@ -10,7 +9,6 @@
|
||||||
with_items:
|
with_items:
|
||||||
- vsphere-csi-cloud-config
|
- vsphere-csi-cloud-config
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: vsphere-csi-driver
|
|
||||||
|
|
||||||
- name: vSphere CSI Driver | Generate Manifests
|
- name: vSphere CSI Driver | Generate Manifests
|
||||||
template:
|
template:
|
||||||
|
@ -27,14 +25,12 @@
|
||||||
- vsphere-csi-node.yml
|
- vsphere-csi-node.yml
|
||||||
register: vsphere_csi_manifests
|
register: vsphere_csi_manifests
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: vsphere-csi-driver
|
|
||||||
|
|
||||||
- name: vSphere CSI Driver | Generate a CSI secret manifest
|
- name: vSphere CSI Driver | Generate a CSI secret manifest
|
||||||
command: "{{ kubectl }} create secret generic vsphere-config-secret --from-file=csi-vsphere.conf={{ kube_config_dir }}/vsphere-csi-cloud-config -n kube-system --dry-run --save-config -o yaml"
|
command: "{{ kubectl }} create secret generic vsphere-config-secret --from-file=csi-vsphere.conf={{ kube_config_dir }}/vsphere-csi-cloud-config -n kube-system --dry-run --save-config -o yaml"
|
||||||
register: vsphere_csi_secret_manifest
|
register: vsphere_csi_secret_manifest
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
no_log: true
|
no_log: true
|
||||||
tags: vsphere-csi-driver
|
|
||||||
|
|
||||||
- name: vSphere CSI Driver | Apply a CSI secret manifest
|
- name: vSphere CSI Driver | Apply a CSI secret manifest
|
||||||
command:
|
command:
|
||||||
|
@ -42,7 +38,6 @@
|
||||||
stdin: "{{ vsphere_csi_secret_manifest.stdout }}"
|
stdin: "{{ vsphere_csi_secret_manifest.stdout }}"
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
no_log: true
|
no_log: true
|
||||||
tags: vsphere-csi-driver
|
|
||||||
|
|
||||||
- name: vSphere CSI Driver | Apply Manifests
|
- name: vSphere CSI Driver | Apply Manifests
|
||||||
kube:
|
kube:
|
||||||
|
@ -56,4 +51,3 @@
|
||||||
- not item is skipped
|
- not item is skipped
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.item }}"
|
label: "{{ item.item }}"
|
||||||
tags: vsphere-csi-driver
|
|
||||||
|
|
|
@ -1,6 +1,5 @@
|
||||||
---
|
---
|
||||||
- include_tasks: vsphere-credentials-check.yml
|
- include_tasks: vsphere-credentials-check.yml
|
||||||
tags: external-vsphere
|
|
||||||
|
|
||||||
- name: External vSphere Cloud Controller | Generate CPI cloud-config
|
- name: External vSphere Cloud Controller | Generate CPI cloud-config
|
||||||
template:
|
template:
|
||||||
|
@ -10,7 +9,6 @@
|
||||||
with_items:
|
with_items:
|
||||||
- external-vsphere-cpi-cloud-config
|
- external-vsphere-cpi-cloud-config
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: external-vsphere
|
|
||||||
|
|
||||||
- name: External vSphere Cloud Controller | Generate Manifests
|
- name: External vSphere Cloud Controller | Generate Manifests
|
||||||
template:
|
template:
|
||||||
|
@ -24,20 +22,17 @@
|
||||||
- external-vsphere-cloud-controller-manager-ds.yml
|
- external-vsphere-cloud-controller-manager-ds.yml
|
||||||
register: external_vsphere_manifests
|
register: external_vsphere_manifests
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: external-vsphere
|
|
||||||
|
|
||||||
- name: External vSphere Cloud Provider Interface | Create a CPI configMap manifest
|
- name: External vSphere Cloud Provider Interface | Create a CPI configMap manifest
|
||||||
command: "{{ bin_dir }}/kubectl create configmap cloud-config --from-file=vsphere.conf={{ kube_config_dir }}/external-vsphere-cpi-cloud-config -n kube-system --dry-run --save-config -o yaml"
|
command: "{{ bin_dir }}/kubectl create configmap cloud-config --from-file=vsphere.conf={{ kube_config_dir }}/external-vsphere-cpi-cloud-config -n kube-system --dry-run --save-config -o yaml"
|
||||||
register: external_vsphere_configmap_manifest
|
register: external_vsphere_configmap_manifest
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: external-vsphere
|
|
||||||
|
|
||||||
- name: External vSphere Cloud Provider Interface | Apply a CPI configMap manifest
|
- name: External vSphere Cloud Provider Interface | Apply a CPI configMap manifest
|
||||||
command:
|
command:
|
||||||
cmd: "{{ bin_dir }}/kubectl apply -f -"
|
cmd: "{{ bin_dir }}/kubectl apply -f -"
|
||||||
stdin: "{{ external_vsphere_configmap_manifest.stdout }}"
|
stdin: "{{ external_vsphere_configmap_manifest.stdout }}"
|
||||||
when: inventory_hostname == groups['kube_control_plane'][0]
|
when: inventory_hostname == groups['kube_control_plane'][0]
|
||||||
tags: external-vsphere
|
|
||||||
|
|
||||||
- name: External vSphere Cloud Controller | Apply Manifests
|
- name: External vSphere Cloud Controller | Apply Manifests
|
||||||
kube:
|
kube:
|
||||||
|
@ -51,4 +46,3 @@
|
||||||
- not item is skipped
|
- not item is skipped
|
||||||
loop_control:
|
loop_control:
|
||||||
label: "{{ item.item }}"
|
label: "{{ item.item }}"
|
||||||
tags: external-vsphere
|
|
||||||
|
|
Loading…
Reference in a new issue