-
Notifications
You must be signed in to change notification settings - Fork 5
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fix: add custom registry patches (#545)
- Loading branch information
1 parent
043ab65
commit 543bd09
Showing
3 changed files
with
510 additions
and
0 deletions.
There are no files selected for viewing
170 changes: 170 additions & 0 deletions
170
configs/patches/v1.27.9/templates/kubernetes/onpremises/hosts.yaml.tpl
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,170 @@ | ||
{{- $dnsZone := .spec.kubernetes.dnsZone -}} | ||
{{- $controlPlaneAddress := .spec.kubernetes.controlPlaneAddress -}} | ||
|
||
all: | ||
children: | ||
{{- if .spec.kubernetes.loadBalancers.enabled }} | ||
haproxy: | ||
hosts: | ||
{{- range $h := .spec.kubernetes.loadBalancers.hosts }} | ||
{{ $h.name }}: | ||
ansible_host: "{{ $h.ip }}" | ||
kubernetes_hostname: "{{ $h.name }}.{{ $dnsZone }}" | ||
{{- end }} | ||
vars: | ||
keepalived_cluster: {{ .spec.kubernetes.loadBalancers.keepalived.enabled }} | ||
keepalived_interface: "{{ .spec.kubernetes.loadBalancers.keepalived.interface }}" | ||
keepalived_ip: "{{ .spec.kubernetes.loadBalancers.keepalived.ip }}" | ||
keepalived_virtual_router_id: "{{ .spec.kubernetes.loadBalancers.keepalived.virtualRouterId }}" | ||
keepalived_passphrase: "{{ .spec.kubernetes.loadBalancers.keepalived.passphrase }}" | ||
{{- end }} | ||
master: | ||
hosts: | ||
{{- $etcdInitialCluster := list }} | ||
{{- range $h := .spec.kubernetes.masters.hosts }} | ||
{{- $etcdUri := print $h.name "=https://" $h.name "." $dnsZone ":2380" }} | ||
{{- $etcdInitialCluster = append $etcdInitialCluster $etcdUri }} | ||
{{ $h.name }}: | ||
ansible_host: "{{ $h.ip }}" | ||
kubernetes_apiserver_advertise_address: "{{ $h.ip }}" | ||
kubernetes_hostname: "{{ $h.name }}.{{ $dnsZone }}" | ||
{{- end }} | ||
vars: | ||
dns_zone: "{{ $dnsZone }}" | ||
etcd_initial_cluster: "{{ $etcdInitialCluster | join "," }}" | ||
kubernetes_cluster_name: "{{ .metadata.name }}" | ||
kubernetes_control_plane_address: "{{ $controlPlaneAddress }}" | ||
kubernetes_pod_cidr: "{{ .spec.kubernetes.podCidr }}" | ||
kubernetes_svc_cidr: "{{ .spec.kubernetes.svcCidr }}" | ||
{{- if and (index .spec.kubernetes "advanced") (index .spec.kubernetes.advanced "cloud") }} | ||
{{- if index .spec.kubernetes.advanced.cloud "provider" }} | ||
kubernetes_cloud_provider: "{{ .spec.kubernetes.advanced.cloud.provider }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.cloud "config" }} | ||
kubernetes_cloud_config: "{{ .spec.kubernetes.advanced.cloud.config }}" | ||
{{- end }} | ||
{{- end }} | ||
|
||
{{- if and (index .spec.kubernetes "advanced") (index .spec.kubernetes.advanced "users") }} | ||
{{- if index .spec.kubernetes.advanced.users "names" }} | ||
kubernetes_users_names: | ||
{{ .spec.kubernetes.advanced.users.names | toYaml | indent 10 }} | ||
{{- end }} | ||
{{- end }} | ||
|
||
{{- if and (index .spec.kubernetes "advanced") (index .spec.kubernetes.advanced "oidc") }} | ||
{{- if index .spec.kubernetes.advanced.oidc "issuer_url" }} | ||
oidc_issuer_url: "{{ .spec.kubernetes.advanced.oidc.issuer_url }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.oidc "client_id" }} | ||
oidc_client_id: "{{ .spec.kubernetes.advanced.oidc.client_id }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.oidc "ca_file" }} | ||
oidc_ca_file: "{{ .spec.kubernetes.advanced.oidc.ca_file }}" | ||
{{- end }} | ||
|
||
{{- if index .spec.kubernetes.advanced.oidc "username_claim" }} | ||
oidc_username_claim: "{{ .spec.kubernetes.advanced.oidc.username_claim }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.oidc "username_prefix" }} | ||
oidc_username_prefix: "{{ .spec.kubernetes.advanced.oidc.username_prefix }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.oidc "groups_claim" }} | ||
oidc_groups_claim: "{{ .spec.kubernetes.advanced.oidc.groups_claim }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.oidc "group_prefix" }} | ||
oidc_group_prefix: "{{ .spec.kubernetes.advanced.oidc.group_prefix }}" | ||
{{- end }} | ||
{{- end }} | ||
|
||
{{- if index .spec.kubernetes "advanced" }} | ||
{{- if and (index .spec.kubernetes.advanced "registry") (ne .spec.kubernetes.advanced.registry "") }} | ||
kubernetes_image_registry: "{{ .spec.kubernetes.advanced.registry }}" | ||
{{- end }} | ||
{{- end }} | ||
nodes: | ||
children: | ||
{{- range $n := .spec.kubernetes.nodes }} | ||
{{ $n.name }}: | ||
hosts: | ||
{{- range $h := $n.hosts }} | ||
{{ $h.name }}: | ||
ansible_host: "{{ $h.ip }}" | ||
kubernetes_hostname: "{{ $h.name }}.{{ $dnsZone }}" | ||
{{- end }} | ||
vars: | ||
kubernetes_role: "{{ $n.name }}" | ||
kubernetes_control_plane_address: "{{ $controlPlaneAddress }}" | ||
{{- if index $n "taints" }} | ||
kubernetes_taints: | ||
{{ $n.taints | toYaml | indent 14 | trim }} | ||
{{- end }} | ||
{{- end }} | ||
ungrouped: {} | ||
vars: | ||
{{- if and (index .spec.kubernetes "advancedAnsible") (index .spec.kubernetes.advancedAnsible "pythonInterpreter") }} | ||
ansible_python_interpreter: "{{ .spec.kubernetes.advancedAnsible.pythonInterpreter }}" | ||
{{- else }} | ||
ansible_python_interpreter: python3 | ||
{{- end }} | ||
ansible_ssh_private_key_file: "{{ .spec.kubernetes.ssh.keyPath }}" | ||
ansible_user: "{{ .spec.kubernetes.ssh.username }}" | ||
kubernetes_kubeconfig_path: ./ | ||
kubernetes_version: "{{ .kubernetes.version }}" | ||
{{- if (index .spec.kubernetes "proxy") }} | ||
http_proxy: "{{ .spec.kubernetes.proxy.http }}" | ||
https_proxy: "{{ .spec.kubernetes.proxy.https }}" | ||
no_proxy: "{{ .spec.kubernetes.proxy.noProxy }}" | ||
{{- end }} | ||
{{- if (index .spec.kubernetes "advanced") }} | ||
{{- if (index .spec.kubernetes.advanced "containerd") }} | ||
{{- if (index .spec.kubernetes.advanced.containerd "registryConfigs") }} | ||
containerd_registry_configs: | ||
{{- range $rc := .spec.kubernetes.advanced.containerd.registryConfigs }} | ||
- registry: {{ $rc.registry }} | ||
{{- if index $rc "username" }} | ||
username: {{ $rc.username }} | ||
{{- end }} | ||
{{- if index $rc "password" }} | ||
password: {{ $rc.password }} | ||
{{- end }} | ||
{{- if index $rc "insecureSkipVerify" }} | ||
insecure_skip_verify: {{ $rc.insecureSkipVerify }} | ||
{{- end }} | ||
{{- if index $rc "mirrorEndpoint" }} | ||
mirror_endpoint: | ||
{{ $rc.mirrorEndpoint | toYaml | indent 10 }} | ||
{{- end }} | ||
{{- end }} | ||
{{- end }} | ||
{{- end }} | ||
{{- if (index .spec.kubernetes.advanced "encryption") }} | ||
{{- if (index .spec.kubernetes.advanced.encryption "tlsCipherSuites") }} | ||
tls_cipher_suites: | ||
{{- toYaml .spec.kubernetes.advanced.encryption.tlsCipherSuites | nindent 6 }} | ||
{{- end }} | ||
{{- if (index .spec.kubernetes.advanced.encryption "configuration") }} | ||
kubernetes_encryption_config: "./encryption-config.yaml" | ||
{{- end }} | ||
{{- end }} | ||
|
||
{{- if index .spec.kubernetes.advanced "airGap" }} | ||
{{- if index .spec.kubernetes.advanced.airGap "containerdDownloadUrl" }} | ||
containerd_download_url: "{{ .spec.kubernetes.advanced.airGap.containerdDownloadUrl }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.airGap "runcDownloadUrl" }} | ||
runc_download_url: "{{ .spec.kubernetes.advanced.airGap.runcDownloadUrl }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.airGap "runcChecksum" }} | ||
runc_checksum: "{{ .spec.kubernetes.advanced.airGap.runcChecksum }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.airGap "dependenciesOverride" }} | ||
dependencies_override: | ||
{{- .spec.kubernetes.advanced.airGap.dependenciesOverride | toYaml | nindent 6 }} | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.airGap "etcdDownloadUrl" }} | ||
etcd_download_url: "{{ .spec.kubernetes.advanced.airGap.etcdDownloadUrl }}" | ||
{{- end }} | ||
{{- end }} | ||
|
||
{{- end }} |
170 changes: 170 additions & 0 deletions
170
configs/patches/v1.28.4/templates/kubernetes/onpremises/hosts.yaml.tpl
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,170 @@ | ||
{{- $dnsZone := .spec.kubernetes.dnsZone -}} | ||
{{- $controlPlaneAddress := .spec.kubernetes.controlPlaneAddress -}} | ||
|
||
all: | ||
children: | ||
{{- if .spec.kubernetes.loadBalancers.enabled }} | ||
haproxy: | ||
hosts: | ||
{{- range $h := .spec.kubernetes.loadBalancers.hosts }} | ||
{{ $h.name }}: | ||
ansible_host: "{{ $h.ip }}" | ||
kubernetes_hostname: "{{ $h.name }}.{{ $dnsZone }}" | ||
{{- end }} | ||
vars: | ||
keepalived_cluster: {{ .spec.kubernetes.loadBalancers.keepalived.enabled }} | ||
keepalived_interface: "{{ .spec.kubernetes.loadBalancers.keepalived.interface }}" | ||
keepalived_ip: "{{ .spec.kubernetes.loadBalancers.keepalived.ip }}" | ||
keepalived_virtual_router_id: "{{ .spec.kubernetes.loadBalancers.keepalived.virtualRouterId }}" | ||
keepalived_passphrase: "{{ .spec.kubernetes.loadBalancers.keepalived.passphrase }}" | ||
{{- end }} | ||
master: | ||
hosts: | ||
{{- $etcdInitialCluster := list }} | ||
{{- range $h := .spec.kubernetes.masters.hosts }} | ||
{{- $etcdUri := print $h.name "=https://" $h.name "." $dnsZone ":2380" }} | ||
{{- $etcdInitialCluster = append $etcdInitialCluster $etcdUri }} | ||
{{ $h.name }}: | ||
ansible_host: "{{ $h.ip }}" | ||
kubernetes_apiserver_advertise_address: "{{ $h.ip }}" | ||
kubernetes_hostname: "{{ $h.name }}.{{ $dnsZone }}" | ||
{{- end }} | ||
vars: | ||
dns_zone: "{{ $dnsZone }}" | ||
etcd_initial_cluster: "{{ $etcdInitialCluster | join "," }}" | ||
kubernetes_cluster_name: "{{ .metadata.name }}" | ||
kubernetes_control_plane_address: "{{ $controlPlaneAddress }}" | ||
kubernetes_pod_cidr: "{{ .spec.kubernetes.podCidr }}" | ||
kubernetes_svc_cidr: "{{ .spec.kubernetes.svcCidr }}" | ||
{{- if and (index .spec.kubernetes "advanced") (index .spec.kubernetes.advanced "cloud") }} | ||
{{- if index .spec.kubernetes.advanced.cloud "provider" }} | ||
kubernetes_cloud_provider: "{{ .spec.kubernetes.advanced.cloud.provider }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.cloud "config" }} | ||
kubernetes_cloud_config: "{{ .spec.kubernetes.advanced.cloud.config }}" | ||
{{- end }} | ||
{{- end }} | ||
|
||
{{- if and (index .spec.kubernetes "advanced") (index .spec.kubernetes.advanced "users") }} | ||
{{- if index .spec.kubernetes.advanced.users "names" }} | ||
kubernetes_users_names: | ||
{{ .spec.kubernetes.advanced.users.names | toYaml | indent 10 }} | ||
{{- end }} | ||
{{- end }} | ||
|
||
{{- if and (index .spec.kubernetes "advanced") (index .spec.kubernetes.advanced "oidc") }} | ||
{{- if index .spec.kubernetes.advanced.oidc "issuer_url" }} | ||
oidc_issuer_url: "{{ .spec.kubernetes.advanced.oidc.issuer_url }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.oidc "client_id" }} | ||
oidc_client_id: "{{ .spec.kubernetes.advanced.oidc.client_id }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.oidc "ca_file" }} | ||
oidc_ca_file: "{{ .spec.kubernetes.advanced.oidc.ca_file }}" | ||
{{- end }} | ||
|
||
{{- if index .spec.kubernetes.advanced.oidc "username_claim" }} | ||
oidc_username_claim: "{{ .spec.kubernetes.advanced.oidc.username_claim }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.oidc "username_prefix" }} | ||
oidc_username_prefix: "{{ .spec.kubernetes.advanced.oidc.username_prefix }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.oidc "groups_claim" }} | ||
oidc_groups_claim: "{{ .spec.kubernetes.advanced.oidc.groups_claim }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.oidc "group_prefix" }} | ||
oidc_group_prefix: "{{ .spec.kubernetes.advanced.oidc.group_prefix }}" | ||
{{- end }} | ||
{{- end }} | ||
|
||
{{- if index .spec.kubernetes "advanced" }} | ||
{{- if and (index .spec.kubernetes.advanced "registry") (ne .spec.kubernetes.advanced.registry "") }} | ||
kubernetes_image_registry: "{{ .spec.kubernetes.advanced.registry }}" | ||
{{- end }} | ||
{{- end }} | ||
nodes: | ||
children: | ||
{{- range $n := .spec.kubernetes.nodes }} | ||
{{ $n.name }}: | ||
hosts: | ||
{{- range $h := $n.hosts }} | ||
{{ $h.name }}: | ||
ansible_host: "{{ $h.ip }}" | ||
kubernetes_hostname: "{{ $h.name }}.{{ $dnsZone }}" | ||
{{- end }} | ||
vars: | ||
kubernetes_role: "{{ $n.name }}" | ||
kubernetes_control_plane_address: "{{ $controlPlaneAddress }}" | ||
{{- if index $n "taints" }} | ||
kubernetes_taints: | ||
{{ $n.taints | toYaml | indent 14 | trim }} | ||
{{- end }} | ||
{{- end }} | ||
ungrouped: {} | ||
vars: | ||
{{- if and (index .spec.kubernetes "advancedAnsible") (index .spec.kubernetes.advancedAnsible "pythonInterpreter") }} | ||
ansible_python_interpreter: "{{ .spec.kubernetes.advancedAnsible.pythonInterpreter }}" | ||
{{- else }} | ||
ansible_python_interpreter: python3 | ||
{{- end }} | ||
ansible_ssh_private_key_file: "{{ .spec.kubernetes.ssh.keyPath }}" | ||
ansible_user: "{{ .spec.kubernetes.ssh.username }}" | ||
kubernetes_kubeconfig_path: ./ | ||
kubernetes_version: "{{ .kubernetes.version }}" | ||
{{- if (index .spec.kubernetes "proxy") }} | ||
http_proxy: "{{ .spec.kubernetes.proxy.http }}" | ||
https_proxy: "{{ .spec.kubernetes.proxy.https }}" | ||
no_proxy: "{{ .spec.kubernetes.proxy.noProxy }}" | ||
{{- end }} | ||
{{- if (index .spec.kubernetes "advanced") }} | ||
{{- if (index .spec.kubernetes.advanced "containerd") }} | ||
{{- if (index .spec.kubernetes.advanced.containerd "registryConfigs") }} | ||
containerd_registry_configs: | ||
{{- range $rc := .spec.kubernetes.advanced.containerd.registryConfigs }} | ||
- registry: {{ $rc.registry }} | ||
{{- if index $rc "username" }} | ||
username: {{ $rc.username }} | ||
{{- end }} | ||
{{- if index $rc "password" }} | ||
password: {{ $rc.password }} | ||
{{- end }} | ||
{{- if index $rc "insecureSkipVerify" }} | ||
insecure_skip_verify: {{ $rc.insecureSkipVerify }} | ||
{{- end }} | ||
{{- if index $rc "mirrorEndpoint" }} | ||
mirror_endpoint: | ||
{{ $rc.mirrorEndpoint | toYaml | indent 10 }} | ||
{{- end }} | ||
{{- end }} | ||
{{- end }} | ||
{{- end }} | ||
{{- if (index .spec.kubernetes.advanced "encryption") }} | ||
{{- if (index .spec.kubernetes.advanced.encryption "tlsCipherSuites") }} | ||
tls_cipher_suites: | ||
{{- toYaml .spec.kubernetes.advanced.encryption.tlsCipherSuites | nindent 6 }} | ||
{{- end }} | ||
{{- if (index .spec.kubernetes.advanced.encryption "configuration") }} | ||
kubernetes_encryption_config: "./encryption-config.yaml" | ||
{{- end }} | ||
{{- end }} | ||
|
||
{{- if index .spec.kubernetes.advanced "airGap" }} | ||
{{- if index .spec.kubernetes.advanced.airGap "containerdDownloadUrl" }} | ||
containerd_download_url: "{{ .spec.kubernetes.advanced.airGap.containerdDownloadUrl }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.airGap "runcDownloadUrl" }} | ||
runc_download_url: "{{ .spec.kubernetes.advanced.airGap.runcDownloadUrl }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.airGap "runcChecksum" }} | ||
runc_checksum: "{{ .spec.kubernetes.advanced.airGap.runcChecksum }}" | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.airGap "dependenciesOverride" }} | ||
dependencies_override: | ||
{{- .spec.kubernetes.advanced.airGap.dependenciesOverride | toYaml | nindent 6 }} | ||
{{- end }} | ||
{{- if index .spec.kubernetes.advanced.airGap "etcdDownloadUrl" }} | ||
etcd_download_url: "{{ .spec.kubernetes.advanced.airGap.etcdDownloadUrl }}" | ||
{{- end }} | ||
{{- end }} | ||
|
||
{{- end }} |
Oops, something went wrong.