80379f6cab
- Creates and defaults an ansible variable for every configuration option in the `kubeproxy.config.k8s.io/v1alpha1` type spec - Fixes vars that were orphaned by removing non-kubeadm - Fixes previously harcoded kubeadm values - Introduces a `main` directory for role default files per component (requires ansible 2.6.0+) - Split out just `kube-proxy.yml` in this first effort - Removes the kube-proxy server field patch task We should continue to pull out other components from `main.yml` into their own defaults files as I did here for `defaults/main/kube-proxy.yml`. I hope for and will need others to join me in this refactoring across the project until each component config template has a matching role defaults file, with shared defaults in `kubespray-defaults` or `downloads`
190 lines
7.3 KiB
Django/Jinja
190 lines
7.3 KiB
Django/Jinja
apiVersion: kubeadm.k8s.io/v1alpha1
|
|
kind: MasterConfiguration
|
|
api:
|
|
{% if kubeadm_config_api_fqdn is defined %}
|
|
controlPlaneEndpoint: {{ kubeadm_config_api_fqdn }}
|
|
bindPort: {{ loadbalancer_apiserver.port | default(kube_apiserver_port) }}
|
|
{% else %}
|
|
advertiseAddress: {{ ip | default(ansible_default_ipv4.address) }}
|
|
bindPort: {{ kube_apiserver_port }}
|
|
{% endif %}
|
|
etcd:
|
|
endpoints:
|
|
{% for endpoint in etcd_access_addresses.split(',') %}
|
|
- {{ endpoint }}
|
|
{% endfor %}
|
|
caFile: {{ etcd_cert_dir }}/ca.pem
|
|
certFile: {{ etcd_cert_dir }}/node-{{ inventory_hostname }}.pem
|
|
keyFile: {{ etcd_cert_dir }}/node-{{ inventory_hostname }}-key.pem
|
|
networking:
|
|
dnsDomain: {{ dns_domain }}
|
|
serviceSubnet: {{ kube_service_addresses }}
|
|
podSubnet: {{ kube_pods_subnet }}
|
|
kubernetesVersion: {{ kube_version }}
|
|
{% if cloud_provider is defined and cloud_provider in ["openstack", "azure", "vsphere", "aws"] %}
|
|
cloudProvider: {{cloud_provider}}
|
|
cloudConfig: {{ kube_config_dir }}/cloud_config
|
|
{% elif cloud_provider is defined and cloud_provider in ["external"] %}
|
|
cloudConfig: {{ kube_config_dir }}/cloud_config
|
|
{% endif %}
|
|
{% if kube_proxy_mode == 'ipvs' %}
|
|
kubeProxy:
|
|
config:
|
|
{% if kube_version is version('v1.10', '<') %}
|
|
featureGates: SupportIPVSProxyMode=true
|
|
{% endif %}
|
|
{% if kube_version is version('v1.10', '>=') %}
|
|
featureGates:
|
|
SupportIPVSProxyMode: true
|
|
{% endif %}
|
|
mode: ipvs
|
|
{% endif %}
|
|
{% if kube_proxy_nodeport_addresses %}
|
|
nodePortAddresses: {{ kube_proxy_nodeport_addresses }}
|
|
{% endif %}
|
|
resourceContainer: ""
|
|
authorizationModes:
|
|
{% for mode in authorization_modes %}
|
|
- {{ mode }}
|
|
{% endfor %}
|
|
selfHosted: false
|
|
apiServerExtraArgs:
|
|
bind-address: {{ kube_apiserver_bind_address }}
|
|
{% if kube_apiserver_insecure_port|string != "0" %}
|
|
insecure-bind-address: {{ kube_apiserver_insecure_bind_address }}
|
|
{% endif %}
|
|
insecure-port: "{{ kube_apiserver_insecure_port }}"
|
|
{% if kube_version is version('v1.10', '<') %}
|
|
admission-control: {{ kube_apiserver_admission_control | join(',') }}
|
|
{% else %}
|
|
{% if kube_apiserver_enable_admission_plugins|length > 0 %}
|
|
enable-admission-plugins: {{ kube_apiserver_enable_admission_plugins | join(',') }}
|
|
{% endif %}
|
|
{% if kube_apiserver_disable_admission_plugins|length > 0 %}
|
|
disable-admission-plugins: {{ kube_apiserver_disable_admission_plugins | join(',') }}
|
|
{% endif %}
|
|
{% endif %}
|
|
apiserver-count: "{{ kube_apiserver_count }}"
|
|
{% if kube_version is version('v1.9', '>=') %}
|
|
endpoint-reconciler-type: lease
|
|
{% endif %}
|
|
{% if etcd_events_cluster_enabled %}
|
|
etcd-servers-overrides: "/events#{{ etcd_events_access_addresses }}"
|
|
{% endif %}
|
|
service-node-port-range: {{ kube_apiserver_node_port_range }}
|
|
kubelet-preferred-address-types: "{{ kubelet_preferred_address_types }}"
|
|
profiling: "{{ kube_profiling }}"
|
|
request-timeout: "{{ kube_apiserver_request_timeout }}"
|
|
repair-malformed-updates: "false"
|
|
enable-aggregator-routing: "{{ kube_api_aggregator_routing }}"
|
|
{% if kube_api_anonymous_auth is defined and kube_version is version('v1.5', '>=') %}
|
|
anonymous-auth: "{{ kube_api_anonymous_auth }}"
|
|
{% endif %}
|
|
{% if kube_basic_auth|default(true) %}
|
|
basic-auth-file: {{ kube_users_dir }}/known_users.csv
|
|
{% endif %}
|
|
{% if kube_token_auth|default(true) %}
|
|
token-auth-file: {{ kube_token_dir }}/known_tokens.csv
|
|
{% endif %}
|
|
{% if kube_oidc_auth|default(false) and kube_oidc_url is defined and kube_oidc_client_id is defined %}
|
|
oidc-issuer-url: {{ kube_oidc_url }}
|
|
oidc-client-id: {{ kube_oidc_client_id }}
|
|
{% if kube_oidc_ca_file is defined %}
|
|
oidc-ca-file: {{ kube_oidc_ca_file }}
|
|
{% endif %}
|
|
{% if kube_oidc_username_claim is defined %}
|
|
oidc-username-claim: {{ kube_oidc_username_claim }}
|
|
{% endif %}
|
|
{% if kube_oidc_groups_claim is defined %}
|
|
oidc-groups-claim: {{ kube_oidc_groups_claim }}
|
|
{% endif %}
|
|
{% endif %}
|
|
{% if kube_webhook_token_auth|default(false) %}
|
|
authentication-token-webhook-config-file: {{ kube_config_dir }}/webhook-token-auth-config.yaml
|
|
{% endif %}
|
|
{% if kube_encrypt_secret_data %}
|
|
experimental-encryption-provider-config: {{ kube_cert_dir }}/secrets_encryption.yaml
|
|
{% endif %}
|
|
storage-backend: {{ kube_apiserver_storage_backend }}
|
|
{% if kube_api_runtime_config is defined %}
|
|
runtime-config: {{ kube_api_runtime_config | join(',') }}
|
|
{% endif %}
|
|
allow-privileged: "true"
|
|
{% for key in kube_kubeadm_apiserver_extra_args %}
|
|
{{ key }}: "{{ kube_kubeadm_apiserver_extra_args[key] }}"
|
|
{% endfor %}
|
|
{% if kube_feature_gates %}
|
|
feature-gates: {{ kube_feature_gates|join(',') }}
|
|
{% endif %}
|
|
{% if kube_network_plugin is defined and kube_network_plugin == 'cloud' %}
|
|
configure-cloud-routes: "true"
|
|
{% endif %}
|
|
controllerManagerExtraArgs:
|
|
node-monitor-grace-period: {{ kube_controller_node_monitor_grace_period }}
|
|
node-monitor-period: {{ kube_controller_node_monitor_period }}
|
|
pod-eviction-timeout: {{ kube_controller_pod_eviction_timeout }}
|
|
node-cidr-mask-size: "{{ kube_network_node_prefix }}"
|
|
profiling: "{{ kube_profiling }}"
|
|
terminated-pod-gc-threshold: "{{ kube_controller_terminated_pod_gc_threshold }}"
|
|
{% if kube_feature_gates %}
|
|
feature-gates: {{ kube_feature_gates|join(',') }}
|
|
{% endif %}
|
|
{% for key in kube_kubeadm_controller_extra_args %}
|
|
{{ key }}: "{{ kube_kubeadm_controller_extra_args[key] }}"
|
|
{% endfor %}
|
|
{% if cloud_provider is defined and cloud_provider in ["openstack", "azure", "vsphere", "aws", "external"] %}
|
|
controllerManagerExtraVolumes:
|
|
{% if cloud_provider is defined and cloud_provider in ["openstack"] and openstack_cacert is defined and openstack_cacert != "" %}
|
|
- name: openstackcacert
|
|
hostPath: "{{ kube_config_dir }}/openstack-cacert.pem"
|
|
mountPath: "{{ kube_config_dir }}/openstack-cacert.pem"
|
|
{% endif %}
|
|
{% if cloud_provider is defined and cloud_provider in ["openstack", "azure", "vsphere", "aws", "external"] %}
|
|
- name: cloud-config
|
|
hostPath: {{ kube_config_dir }}/cloud_config
|
|
mountPath: {{ kube_config_dir }}/cloud_config
|
|
{% endif %}
|
|
{% endif %}
|
|
schedulerExtraArgs:
|
|
profiling: "{{ kube_profiling }}"
|
|
{% if kube_feature_gates %}
|
|
feature-gates: {{ kube_feature_gates|join(',') }}
|
|
{% endif %}
|
|
{% if kube_kubeadm_scheduler_extra_args|length > 0 %}
|
|
{% for key in kube_kubeadm_scheduler_extra_args %}
|
|
{{ key }}: "{{ kube_kubeadm_scheduler_extra_args[key] }}"
|
|
{% endfor %}
|
|
{% endif %}
|
|
{% if kube_basic_auth|default(true) or kube_token_auth|default(true) or kube_webhook_token_auth|default(false) %}
|
|
apiServerExtraVolumes:
|
|
{% if cloud_provider is defined and cloud_provider in ["openstack", "azure", "vsphere", "aws", "external"] %}
|
|
- name: cloud-config
|
|
hostPath: {{ kube_config_dir }}/cloud_config
|
|
mountPath: {{ kube_config_dir }}/cloud_config
|
|
{% endif %}
|
|
{% if kube_basic_auth|default(true) %}
|
|
- name: basic-auth-config
|
|
hostPath: {{ kube_users_dir }}
|
|
mountPath: {{ kube_users_dir }}
|
|
{% endif %}
|
|
{% if kube_token_auth|default(true) %}
|
|
- name: token-auth-config
|
|
hostPath: {{ kube_token_dir }}
|
|
mountPath: {{ kube_token_dir }}
|
|
{% endif %}
|
|
{% if kube_webhook_token_auth|default(false) %}
|
|
- name: webhook-token-auth-config
|
|
hostPath: {{ kube_config_dir }}/webhook-token-auth-config.yaml
|
|
mountPath: {{ kube_config_dir }}/webhook-token-auth-config.yaml
|
|
{% endif %}
|
|
{% endif %}
|
|
apiServerCertSANs:
|
|
{% for san in apiserver_sans.split() | unique %}
|
|
- {{ san }}
|
|
{% endfor %}
|
|
certificatesDir: {{ kube_cert_dir }}
|
|
imageRepository: {{ kube_image_repo }}
|
|
unifiedControlPlaneImage: ""
|
|
{% if kube_override_hostname|default('') %}
|
|
nodeName: {{ kube_override_hostname }}
|
|
{% endif %}
|