You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

807 lines
30 KiB

Added file and container image caching (#4828) * File and container image downloads are now cached localy, so that repeated vagrant up/down runs do not trigger downloading of those files. This is especially useful on laptops with kubernetes runnig locally on vm's. The total size of the cache, after an ansible run, is currently around 800MB, so bandwidth (=time) savings can be quite significant. * When download_run_once is false, the default is still not to cache, but setting download_force_cache will still enable caching. * The local cache location can be set with download_cache_dir and defaults to /tmp/kubernetes_cache * A local docker instance is no longer required to cache docker images; Images are cached to file. A local docker instance is still required, though, if you wish to download images on localhost. * Fixed a FIXME, wher the argument was that delegate_to doesn't play nice with omit. That is a correct observation and the fix is to use default(inventory_host) instead of default(omit). See ansible/ansible#26009 * Removed "Register docker images info" task from download_container and set_docker_image_facts because it was faulty and unused. * Removed redundant when:download.{container,enabled,run_once} conditions from {sync,download}_container.yml * All features of commit d6fd0d2acaec9f53e75d82db30411f96a5bf2cc9 by Timoses <timosesu@gmail.com>, merged May 1st 2019, are included in this patch. Not all code was included verbatim, but each feature of that commit was checked to be working in this patch. One notable change: The actual downloading of the kubeadm images was moved to {download,sync)_container, to enable caching. Note 1: I considered splitting this patch, but most changes that are not directly related to caching, are a pleasant by-product of implementing the caching code, so splitting would be impractical. Note 2: I have my doubts about the usefulness of the upload, download and upgrade tags in the download role. Must they remain or can they be removed? If anybody knows, then please speak up.
5 years ago
6 years ago
7 years ago
6 years ago
6 years ago
contiv network support (#1914) * Add Contiv support Contiv is a network plugin for Kubernetes and Docker. It supports vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies, multiple networks and bridging pods onto physical networks. * Update contiv version to 1.1.4 Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config. * Load openvswitch module to workaround on CentOS7.4 * Set contiv cni version to 0.1.0 Correct contiv CNI version to 0.1.0. * Use kube_apiserver_endpoint for K8S_API_SERVER Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks to a available endpoint no matter if there's a loadbalancer or not. * Make contiv use its own etcd Before this commit, contiv is using a etcd proxy mode to k8s etcd, this work fine when the etcd hosts are co-located with contiv etcd proxy, however the k8s peering certs are only in etcd group, as a result the etcd-proxy is not able to peering with the k8s etcd on etcd group, plus the netplugin is always trying to find the etcd endpoint on localhost, this will cause problem for all netplugins not runnign on etcd group nodes. This commit make contiv uses its own etcd, separate from k8s one. on kube-master nodes (where net-master runs), it will run as leader mode and on all rest nodes it will run as proxy mode. * Use cp instead of rsync to copy cni binaries Since rsync has been removed from hyperkube, this commit changes it to use cp instead. * Make contiv-etcd able to run on master nodes * Add rbac_enabled flag for contiv pods * Add contiv into CNI network plugin lists * migrate contiv test to tests/files Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com> * Add required rules for contiv netplugin * Better handling json return of fwdMode * Make contiv etcd port configurable * Use default var instead of templating * roles/download/defaults/main.yml: use contiv 1.1.7 Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
6 years ago
6 years ago
contiv network support (#1914) * Add Contiv support Contiv is a network plugin for Kubernetes and Docker. It supports vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies, multiple networks and bridging pods onto physical networks. * Update contiv version to 1.1.4 Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config. * Load openvswitch module to workaround on CentOS7.4 * Set contiv cni version to 0.1.0 Correct contiv CNI version to 0.1.0. * Use kube_apiserver_endpoint for K8S_API_SERVER Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks to a available endpoint no matter if there's a loadbalancer or not. * Make contiv use its own etcd Before this commit, contiv is using a etcd proxy mode to k8s etcd, this work fine when the etcd hosts are co-located with contiv etcd proxy, however the k8s peering certs are only in etcd group, as a result the etcd-proxy is not able to peering with the k8s etcd on etcd group, plus the netplugin is always trying to find the etcd endpoint on localhost, this will cause problem for all netplugins not runnign on etcd group nodes. This commit make contiv uses its own etcd, separate from k8s one. on kube-master nodes (where net-master runs), it will run as leader mode and on all rest nodes it will run as proxy mode. * Use cp instead of rsync to copy cni binaries Since rsync has been removed from hyperkube, this commit changes it to use cp instead. * Make contiv-etcd able to run on master nodes * Add rbac_enabled flag for contiv pods * Add contiv into CNI network plugin lists * migrate contiv test to tests/files Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com> * Add required rules for contiv netplugin * Better handling json return of fwdMode * Make contiv etcd port configurable * Use default var instead of templating * roles/download/defaults/main.yml: use contiv 1.1.7 Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
6 years ago
6 years ago
contiv network support (#1914) * Add Contiv support Contiv is a network plugin for Kubernetes and Docker. It supports vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies, multiple networks and bridging pods onto physical networks. * Update contiv version to 1.1.4 Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config. * Load openvswitch module to workaround on CentOS7.4 * Set contiv cni version to 0.1.0 Correct contiv CNI version to 0.1.0. * Use kube_apiserver_endpoint for K8S_API_SERVER Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks to a available endpoint no matter if there's a loadbalancer or not. * Make contiv use its own etcd Before this commit, contiv is using a etcd proxy mode to k8s etcd, this work fine when the etcd hosts are co-located with contiv etcd proxy, however the k8s peering certs are only in etcd group, as a result the etcd-proxy is not able to peering with the k8s etcd on etcd group, plus the netplugin is always trying to find the etcd endpoint on localhost, this will cause problem for all netplugins not runnign on etcd group nodes. This commit make contiv uses its own etcd, separate from k8s one. on kube-master nodes (where net-master runs), it will run as leader mode and on all rest nodes it will run as proxy mode. * Use cp instead of rsync to copy cni binaries Since rsync has been removed from hyperkube, this commit changes it to use cp instead. * Make contiv-etcd able to run on master nodes * Add rbac_enabled flag for contiv pods * Add contiv into CNI network plugin lists * migrate contiv test to tests/files Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com> * Add required rules for contiv netplugin * Better handling json return of fwdMode * Make contiv etcd port configurable * Use default var instead of templating * roles/download/defaults/main.yml: use contiv 1.1.7 Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
6 years ago
contiv network support (#1914) * Add Contiv support Contiv is a network plugin for Kubernetes and Docker. It supports vlan/vxlan/BGP/Cisco ACI technologies. It support firewall policies, multiple networks and bridging pods onto physical networks. * Update contiv version to 1.1.4 Update contiv version to 1.1.4 and added SVC_SUBNET in contiv-config. * Load openvswitch module to workaround on CentOS7.4 * Set contiv cni version to 0.1.0 Correct contiv CNI version to 0.1.0. * Use kube_apiserver_endpoint for K8S_API_SERVER Use kube_apiserver_endpoint as K8S_API_SERVER to make contiv talks to a available endpoint no matter if there's a loadbalancer or not. * Make contiv use its own etcd Before this commit, contiv is using a etcd proxy mode to k8s etcd, this work fine when the etcd hosts are co-located with contiv etcd proxy, however the k8s peering certs are only in etcd group, as a result the etcd-proxy is not able to peering with the k8s etcd on etcd group, plus the netplugin is always trying to find the etcd endpoint on localhost, this will cause problem for all netplugins not runnign on etcd group nodes. This commit make contiv uses its own etcd, separate from k8s one. on kube-master nodes (where net-master runs), it will run as leader mode and on all rest nodes it will run as proxy mode. * Use cp instead of rsync to copy cni binaries Since rsync has been removed from hyperkube, this commit changes it to use cp instead. * Make contiv-etcd able to run on master nodes * Add rbac_enabled flag for contiv pods * Add contiv into CNI network plugin lists * migrate contiv test to tests/files Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com> * Add required rules for contiv netplugin * Better handling json return of fwdMode * Make contiv etcd port configurable * Use default var instead of templating * roles/download/defaults/main.yml: use contiv 1.1.7 Signed-off-by: Cristian Staretu <cristian.staretu@gmail.com>
6 years ago
  1. ---
  2. local_release_dir: /tmp/releases
  3. download_cache_dir: /tmp/kubespray_cache
  4. # do not delete remote cache files after using them
  5. # NOTE: Setting this parameter to TRUE is only really useful when developing kubespray
  6. download_keep_remote_cache: false
  7. # Only useful when download_run_once is false: Localy cached files and images are
  8. # uploaded to kubernetes nodes. Also, images downloaded on those nodes are copied
  9. # back to the ansible runner's cache, if they are not yet preset.
  10. download_force_cache: false
  11. # Used to only evaluate vars from download role
  12. skip_downloads: false
  13. # Optionally skip kubeadm images download
  14. skip_kubeadm_images: false
  15. kubeadm_images: {}
  16. # if this is set to true will only download files once. Doesn't work
  17. # on Container Linux by CoreOS unless the download_localhost is true and localhost
  18. # is running another OS type. Default compress level is 1 (fastest).
  19. download_run_once: False
  20. download_compress: 1
  21. # if this is set to true will download container
  22. download_container: True
  23. # if this is set to true, uses the localhost for download_run_once mode
  24. # (requires docker and sudo to access docker). You may want this option for
  25. # local caching of docker images or for Container Linux by CoreOS cluster nodes.
  26. # Otherwise, uses the first node in the kube-master group to store images
  27. # in the download_run_once mode.
  28. download_localhost: False
  29. # Always pull images if set to True. Otherwise check by the repo's tag/digest.
  30. download_always_pull: False
  31. # Some problems may occur when downloading files over https proxy due to ansible bug
  32. # https://github.com/ansible/ansible/issues/32750. Set this variable to False to disable
  33. # SSL validation of get_url module. Note that kubespray will still be performing checksum validation.
  34. download_validate_certs: True
  35. # Use the first kube-master if download_localhost is not set
  36. download_delegate: "{% if download_localhost %}localhost{% else %}{{ groups['kube-master'][0] }}{% endif %}"
  37. # Arch of Docker images and needed packages
  38. image_arch: "{{host_architecture | default('amd64')}}"
  39. # Versions
  40. kube_version: v1.16.0
  41. kubeadm_version: "{{ kube_version }}"
  42. etcd_version: v3.3.10
  43. # gcr and kubernetes image repo define
  44. gcr_image_repo: "gcr.io"
  45. kube_image_repo: "{{ gcr_image_repo }}/google-containers"
  46. # docker image repo define
  47. docker_image_repo: "docker.io"
  48. # quay image repo define
  49. quay_image_repo: "quay.io"
  50. # TODO(mattymo): Move calico versions to roles/network_plugins/calico/defaults
  51. # after migration to container download
  52. calico_version: "v3.7.3"
  53. calico_ctl_version: "v3.7.3"
  54. calico_cni_version: "v3.7.3"
  55. calico_policy_version: "v3.7.3"
  56. calico_rr_version: "v0.6.1"
  57. calico_typha_version: "v3.7.3"
  58. flannel_version: "v0.11.0"
  59. flannel_cni_version: "v0.3.0"
  60. cni_version: "v0.8.1"
  61. weave_version: 2.5.2
  62. pod_infra_version: 3.1
  63. contiv_version: 1.2.1
  64. cilium_version: "v1.5.5"
  65. kube_ovn_version: "v0.6.0"
  66. kube_router_version: "v0.2.5"
  67. multus_version: "v3.2.1"
  68. crictl_version: "v1.16.0"
  69. # Download URLs
  70. kubeadm_download_url: "https://storage.googleapis.com/kubernetes-release/release/{{ kubeadm_version }}/bin/linux/{{ image_arch }}/kubeadm"
  71. hyperkube_download_url: "https://storage.googleapis.com/kubernetes-release/release/{{ kube_version }}/bin/linux/{{ image_arch }}/hyperkube"
  72. etcd_download_url: "https://github.com/coreos/etcd/releases/download/{{ etcd_version }}/etcd-{{ etcd_version }}-linux-{{ image_arch }}.tar.gz"
  73. cni_download_url: "https://github.com/containernetworking/plugins/releases/download/{{ cni_version }}/cni-plugins-linux-{{ image_arch }}-{{ cni_version }}.tgz"
  74. calicoctl_download_url: "https://github.com/projectcalico/calicoctl/releases/download/{{ calico_ctl_version }}/calicoctl-linux-{{ image_arch }}"
  75. crictl_download_url: "https://github.com/kubernetes-sigs/cri-tools/releases/download/{{ crictl_version }}/crictl-{{ crictl_version }}-{{ ansible_system | lower }}-{{ image_arch }}.tar.gz"
  76. crictl_checksums:
  77. arm:
  78. v1.16.0: 331c49bd9196009b8230f7a36ec272924a7bcf4c1614ecddf0eb9598c787da0e
  79. v1.15.0: f31f8c3b4791608a48d030d1aa1a694a73849ae057b23a90ce4ef17e5afde9e8
  80. v1.14.0: 9910cecfd6558239ba015323066c7233d8371af359b9ddd0b2a35d5223bcf945
  81. arm64:
  82. v1.16.0: aa118c31d6f6fd2d24bb2de4a33598a14a5952e1d01f93d5c3267c2b5334743b
  83. v1.15.0: 785c3da7e058f6fd00b0a48de24b9199eb6bae940d13f509c44ea6dd7ad9ffcd
  84. v1.14.0: f76b3d00a272c8d210e9a45f77d07d3770bee310d99c4fd9a72d6f55278882e5
  85. amd64:
  86. v1.16.0: a3eefa10a483c643ad85aee3d7832a720976ef7e80dde46b212eaaacd7d09512
  87. v1.15.0: c3b71be1f363e16078b51334967348aab4f72f46ef64a61fe7754e029779d45a
  88. v1.14.0: 483c90a9fe679590df4332ba807991c49232e8cd326c307c575ecef7fe22327b
  89. # Checksums
  90. hyperkube_checksums:
  91. arm:
  92. v1.16.0: 4f2e4ffcf7b7f40c70c637c7be9dd51cd1ee29763696011149f315e90339330b
  93. v1.15.3: 100d8bddb29e77397b90e6dfbcf0af2d901a90ea4bde90b83b5a39f394c3900b
  94. v1.15.2: eeaa8e071541c7bcaa186ff1d2919d076b27ef70c9e9df70f910756eba55dc99
  95. v1.15.1: fc5af96fd9341776d84c38675be7b8045dee20af327af9331972c422a4109918
  96. v1.15.0: d923c781031bfd97d0fbe50311e4d7c3616aa5b6d466b99049931f09d73d07b9
  97. arm64:
  98. v1.16.0: 0431fff5b32042369a3f233afb7b3adcda7ae5446f31700819ed986f3624bc69
  99. v1.15.3: 1e3e70b8d1e8ebc642f2801d9c7938a27764dfb2f5aea432ab4326d43c04a1f5
  100. v1.15.2: c4cf69f52c7013faee9d54e0f376e0732a4a7b0f7ffc7241e9b7e28bad0ac77f
  101. v1.15.1: 80ed372c5f6c5178df88616175310057c06bdc9d0905953814a1927eb3aaa657
  102. v1.15.0: 824af7d925b87a5ade63575b98b59ee81005fc76eac1dc399602308d7a60bc3c
  103. amd64:
  104. v1.16.0: 00b54ca779db1749ed714b19bb2b9a0333b39048af134f9199e4a5441c1b8324
  105. v1.15.3: 3685c65b4fb85d552f77346900affc2e9a1bc997b4cd3dde0e705fd8c1d9be7a
  106. v1.15.2: ab885606438748eb89a7738e219f5353d94c40c63a4935a539ce89760280f065
  107. v1.15.1: 22b7b1e7f5f2a452d62e0ca4c2cba67119c51e04219aaeaf8452825f9177069e
  108. v1.15.0: 3cc72cc58517b97c608c7a59a20255675bc70f07217c9e11e58cac7746139283
  109. kubeadm_checksums:
  110. arm:
  111. v1.16.0: 6c666958e11b7d4513adecb3107c885c98bdc79f38d369c9f80eaaeae4ddfe66
  112. v1.15.3: 6c6fa56810908b5be83882094ea199844edc94b7e969160623c86512d9251c06
  113. v1.15.2: 4b35ad0031c08a83de7c8d9f9bbed6a30d93a5c74e16ea9e6211ad2e0e12bdd1
  114. v1.15.1: 855abd520291dcef0577a1a2ef87a70f522fd2b22603a12abcd86c2f7ec9c022
  115. v1.15.0: 9464030a1d4e101de5f47348f3514d5a9eb95cbce2e5e31f53ada1ca485cf75e
  116. arm64:
  117. v1.16.0: 9a1d21bfb6bd15697ac010665e5917a5364b340d5b60f2f0302c179d75da0f3f
  118. v1.15.3: 6f472bc8ab1ba3d76448bd45b200edef96741e5affde8dc1429300af3a4904d8
  119. v1.15.2: d3b6ee2048b366726ca366d2db4c46b2cacc38e8ec09cc35781d16593753d930
  120. v1.15.1: 44fbfad0f1026d249fc4f365f1e9562cd52d75360d4d1032731122ba5a4d57dc
  121. v1.15.0: fe3c79070814fe847a23209b1027672fe5c5e7e5c9611e329225058926836f96
  122. amd64:
  123. v1.16.0: 18f30d65fb05148c73cc07c77a83f4a2427379af493ca9f60eda42239409e7ef
  124. v1.15.3: ec56a00bc8d9ec4ac2b081a3b2127d8593daf3b2c86560cf9e6cba5ada2d5a80
  125. v1.15.2: fe2a13a1dea73249560ea44ab54c0359a9722e9c66832f6bcad86798438cba2f
  126. v1.15.1: 3d42441ae177826f1181e559cd2a729464ca8efadef196cfa0e8053a615333b5
  127. v1.15.0: fc4aa44b96dc143d7c3062124e25fed671cab884ebb8b2446edd10abb45e88c2
  128. etcd_binary_checksums:
  129. # Etcd does not have arm32 builds at the moment, having some dummy value is
  130. # required to avoid "no attribute" error
  131. arm: 0
  132. arm64: 5ec97b0b872adce275b8130d19db314f7f2b803aeb24c4aae17a19e2d66853c4
  133. amd64: 1620a59150ec0a0124a65540e23891243feb2d9a628092fb1edcc23974724a45
  134. cni_binary_checksums:
  135. arm: ae6ddbd87c05a79aceb92e1c8c32d11e302f6fc55045f87f6a3ea7e0268b2fda
  136. arm64: acde854e3def3c776c532ae521c19d8784534918cc56449ff16945a2909bff6d
  137. amd64: e9bfc78acd3ae71be77eb8f3e890cc9078a33cc3797703b8ff2fc3077a232252
  138. calicoctl_binary_checksums:
  139. arm:
  140. v3.6.1: 0
  141. v3.5.4: 0
  142. v3.4.4: 0
  143. v3.7.3: 0
  144. amd64:
  145. v3.6.1: 3b01336de37550e020343d62a38c96c4605d33a3ed7ddba2fe38bc172a5b42b5
  146. v3.5.4: 197194b838cc2a9a7455c2ebd5505a5e24f8f3d994eb75c17f5dd568944100b8
  147. v3.4.4: 93bd084e053cf1bf3b7fef369677bd6767c30fe7135e2c7e044e31693422ef61
  148. v3.7.3: 932f68e893e80e95e10f064f1e7745e438d456f41a6ff12d11bb16ca0cab735c
  149. arm64:
  150. v3.6.1: 60fbaeb257061647bdf12b5ede7a0d4298a5ee216f6472e5a92bb14ef5c2a5d3
  151. v3.5.4: a4481178665658658a73e4ceca9a1dff5cccded4179615c91d1c3e49fd96f237
  152. v3.4.4: ff35d9e8b5c00e9fe47d05e8f5123ec98fd641370f8cd93f4fbb3d913da77ab6
  153. v3.7.3: 7cfaab25c287f7ef93b2682d060b55bf39f76b668540de50376b5ed174209832
  154. etcd_binary_checksum: "{{ etcd_binary_checksums[image_arch] }}"
  155. cni_binary_checksum: "{{ cni_binary_checksums[image_arch] }}"
  156. hyperkube_binary_checksum: "{{ hyperkube_checksums[image_arch][kube_version] }}"
  157. kubeadm_binary_checksum: "{{ kubeadm_checksums[image_arch][kubeadm_version] }}"
  158. calicoctl_binary_checksum: "{{ calicoctl_binary_checksums[image_arch][calico_ctl_version] }}"
  159. crictl_binary_checksum: "{{ crictl_checksums[image_arch][crictl_version] }}"
  160. # Containers
  161. # In some cases, we need a way to set --registry-mirror or --insecure-registry for docker,
  162. # it helps a lot for local private development or bare metal environment.
  163. # So you need define --registry-mirror or --insecure-registry, and modify the following url address.
  164. # example:
  165. # You need to deploy kubernetes cluster on local private development.
  166. # Also provide the address of your own private registry.
  167. # And use --insecure-registry options for docker
  168. etcd_image_repo: "{{ quay_image_repo }}/coreos/etcd"
  169. etcd_image_tag: "{{ etcd_version }}{%- if image_arch != 'amd64' -%}-{{ image_arch }}{%- endif -%}"
  170. flannel_image_repo: "{{ quay_image_repo }}/coreos/flannel"
  171. flannel_image_tag: "{{ flannel_version }}"
  172. flannel_cni_image_repo: "{{ quay_image_repo }}/coreos/flannel-cni"
  173. flannel_cni_image_tag: "{{ flannel_cni_version }}"
  174. calico_node_image_repo: "{{ docker_image_repo }}/calico/node"
  175. calico_node_image_tag: "{{ calico_version }}"
  176. calico_cni_image_repo: "{{ docker_image_repo }}/calico/cni"
  177. calico_cni_image_tag: "{{ calico_cni_version }}"
  178. calico_policy_image_repo: "{{ docker_image_repo }}/calico/kube-controllers"
  179. calico_policy_image_tag: "{{ calico_policy_version }}"
  180. calico_rr_image_repo: "{{ docker_image_repo }}/calico/routereflector"
  181. calico_rr_image_tag: "{{ calico_rr_version }}"
  182. calico_typha_image_repo: "{{ docker_image_repo }}/calico/typha"
  183. calico_typha_image_tag: "{{ calico_typha_version }}"
  184. pod_infra_image_repo: "{{ gcr_image_repo }}/google_containers/pause-{{ image_arch }}"
  185. pod_infra_image_tag: "{{ pod_infra_version }}"
  186. install_socat_image_repo: "{{ docker_image_repo }}/xueshanf/install-socat"
  187. install_socat_image_tag: "latest"
  188. netcheck_version: "v1.0"
  189. netcheck_agent_image_repo: "{{ quay_image_repo }}/l23network/k8s-netchecker-agent"
  190. netcheck_agent_image_tag: "{{ netcheck_version }}"
  191. netcheck_server_image_repo: "{{ quay_image_repo }}/l23network/k8s-netchecker-server"
  192. netcheck_server_image_tag: "{{ netcheck_version }}"
  193. weave_kube_image_repo: "{{ docker_image_repo }}/weaveworks/weave-kube"
  194. weave_kube_image_tag: "{{ weave_version }}"
  195. weave_npc_image_repo: "{{ docker_image_repo }}/weaveworks/weave-npc"
  196. weave_npc_image_tag: "{{ weave_version }}"
  197. contiv_image_repo: "{{ docker_image_repo }}/contiv/netplugin"
  198. contiv_image_tag: "{{ contiv_version }}"
  199. contiv_init_image_repo: "{{ docker_image_repo }}/contiv/netplugin-init"
  200. contiv_init_image_tag: "latest"
  201. contiv_auth_proxy_image_repo: "{{ docker_image_repo }}/contiv/auth_proxy"
  202. contiv_auth_proxy_image_tag: "{{ contiv_version }}"
  203. contiv_etcd_init_image_repo: "{{ docker_image_repo }}/ferest/etcd-initer"
  204. contiv_etcd_init_image_tag: latest
  205. contiv_ovs_image_repo: "{{ docker_image_repo }}/contiv/ovs"
  206. contiv_ovs_image_tag: "latest"
  207. cilium_image_repo: "{{ docker_image_repo }}/cilium/cilium"
  208. cilium_image_tag: "{{ cilium_version }}"
  209. cilium_init_image_repo: "{{ docker_image_repo }}/cilium/cilium-init"
  210. cilium_init_image_tag: "2019-04-05"
  211. cilium_operator_image_repo: "{{ docker_image_repo }}/cilium/operator"
  212. cilium_operator_image_tag: "{{ cilium_version }}"
  213. kube_ovn_db_image_repo: "{{ docker_image_repo }}/kubeovn/kube-ovn-db"
  214. kube_ovn_node_image_repo: "{{ docker_image_repo }}/kubeovn/kube-ovn-node"
  215. kube_ovn_cni_image_repo: "{{ docker_image_repo }}/kubeovn/kube-ovn-cni"
  216. kube_ovn_controller_image_repo: "{{ docker_image_repo }}/kubeovn/kube-ovn-controller"
  217. kube_ovn_db_image_tag: "{{ kube_ovn_version }}"
  218. kube_ovn_node_image_tag: "{{ kube_ovn_version }}"
  219. kube_ovn_controller_image_tag: "{{ kube_ovn_version }}"
  220. kube_ovn_cni_image_tag: "{{ kube_ovn_version }}"
  221. kube_router_image_repo: "{{ docker_image_repo }}/cloudnativelabs/kube-router"
  222. kube_router_image_tag: "{{ kube_router_version }}"
  223. multus_image_repo: "{{ docker_image_repo }}/nfvpe/multus"
  224. multus_image_tag: "{{ multus_version }}"
  225. nginx_image_repo: "{{ docker_image_repo }}/library/nginx"
  226. nginx_image_tag: 1.15
  227. haproxy_image_repo: "{{ docker_image_repo }}/library/haproxy"
  228. haproxy_image_tag: 1.9
  229. coredns_version: "1.6.0"
  230. coredns_image_repo: "{{ docker_image_repo }}/coredns/coredns"
  231. coredns_image_tag: "{{ coredns_version }}"
  232. nodelocaldns_version: "1.15.5"
  233. nodelocaldns_image_repo: "{{ kube_image_repo }}/k8s-dns-node-cache"
  234. nodelocaldns_image_tag: "{{ nodelocaldns_version }}"
  235. dnsautoscaler_version: 1.6.0
  236. dnsautoscaler_image_repo: "{{ kube_image_repo }}/cluster-proportional-autoscaler-{{ image_arch }}"
  237. dnsautoscaler_image_tag: "{{ dnsautoscaler_version }}"
  238. test_image_repo: "{{ docker_image_repo }}/library/busybox"
  239. test_image_tag: latest
  240. busybox_image_repo: "{{ docker_image_repo }}/library/busybox"
  241. busybox_image_tag: 1.29.2
  242. helm_version: "v2.14.3"
  243. helm_image_repo: "{{ docker_image_repo }}/lachlanevenson/k8s-helm"
  244. helm_image_tag: "{{ helm_version }}"
  245. tiller_image_repo: "{{ gcr_image_repo }}/kubernetes-helm/tiller"
  246. tiller_image_tag: "{{ helm_version }}"
  247. registry_image_repo: "{{ docker_image_repo }}/library/registry"
  248. registry_image_tag: "2.6"
  249. registry_proxy_image_repo: "{{ gcr_image_repo }}/google_containers/kube-registry-proxy"
  250. registry_proxy_image_tag: "0.4"
  251. metrics_server_version: "v0.3.3"
  252. metrics_server_image_repo: "{{ gcr_image_repo }}/google_containers/metrics-server-amd64"
  253. metrics_server_image_tag: "{{ metrics_server_version }}"
  254. local_volume_provisioner_image_repo: "{{ quay_image_repo }}/external_storage/local-volume-provisioner"
  255. local_volume_provisioner_image_tag: "v2.3.2"
  256. cephfs_provisioner_image_repo: "{{ quay_image_repo }}/external_storage/cephfs-provisioner"
  257. cephfs_provisioner_image_tag: "v2.1.0-k8s1.11"
  258. rbd_provisioner_image_repo: "{{ quay_image_repo }}/external_storage/rbd-provisioner"
  259. rbd_provisioner_image_tag: "v2.1.1-k8s1.11"
  260. local_path_provisioner_image_repo: "{{ docker_image_repo }}/rancher/local-path-provisioner"
  261. local_path_provisioner_image_tag: "v0.0.2"
  262. ingress_nginx_controller_image_repo: "{{ quay_image_repo }}/kubernetes-ingress-controller/nginx-ingress-controller"
  263. ingress_nginx_controller_image_tag: "0.25.1"
  264. cert_manager_version: "v0.5.2"
  265. cert_manager_controller_image_repo: "{{ quay_image_repo }}/jetstack/cert-manager-controller"
  266. cert_manager_controller_image_tag: "{{ cert_manager_version }}"
  267. addon_resizer_version: "1.8.3"
  268. addon_resizer_image_repo: "{{ kube_image_repo }}/addon-resizer"
  269. addon_resizer_image_tag: "{{ addon_resizer_version }}"
  270. dashboard_image_repo: "{{ gcr_image_repo }}/google_containers/kubernetes-dashboard-{{ image_arch }}"
  271. dashboard_image_tag: "v1.10.1"
  272. image_pull_command: "{{ docker_bin_dir }}/docker pull"
  273. image_info_command: "{{ docker_bin_dir }}/docker images -q | xargs {{ docker_bin_dir }}/docker inspect -f \"{{ '{{' }} if .RepoTags {{ '}}' }}{{ '{{' }} (index .RepoTags 0) {{ '}}' }}{{ '{{' }} end {{ '}}' }}{{ '{{' }} if .RepoDigests {{ '}}' }},{{ '{{' }} (index .RepoDigests 0) {{ '}}' }}{{ '{{' }} end {{ '}}' }}\" | tr '\n' ','"
  274. downloads:
  275. netcheck_server:
  276. enabled: "{{ deploy_netchecker }}"
  277. container: true
  278. repo: "{{ netcheck_server_image_repo }}"
  279. tag: "{{ netcheck_server_image_tag }}"
  280. sha256: "{{ netcheck_server_digest_checksum|default(None) }}"
  281. groups:
  282. - k8s-cluster
  283. netcheck_agent:
  284. enabled: "{{ deploy_netchecker }}"
  285. container: true
  286. repo: "{{ netcheck_agent_image_repo }}"
  287. tag: "{{ netcheck_agent_image_tag }}"
  288. sha256: "{{ netcheck_agent_digest_checksum|default(None) }}"
  289. groups:
  290. - k8s-cluster
  291. etcd:
  292. container: "{{ etcd_deployment_type != 'host' }}"
  293. file: "{{ etcd_deployment_type == 'host' or etcd_kubeadm_enabled }}"
  294. enabled: true
  295. version: "{{ etcd_version }}"
  296. dest: "{{local_release_dir}}/etcd-{{ etcd_version }}-linux-amd64.tar.gz"
  297. repo: "{{ etcd_image_repo }}"
  298. tag: "{{ etcd_image_tag }}"
  299. sha256: >-
  300. {{ etcd_binary_checksum if (etcd_deployment_type == 'host' or etcd_kubeadm_enabled)
  301. else etcd_digest_checksum|d(None) }}
  302. url: "{{ etcd_download_url }}"
  303. unarchive: true
  304. owner: "root"
  305. mode: "0755"
  306. groups:
  307. - etcd
  308. cni:
  309. enabled: true
  310. file: true
  311. version: "{{ cni_version }}"
  312. dest: "{{local_release_dir}}/cni-plugins-linux-{{ image_arch }}-{{ cni_version }}.tgz"
  313. sha256: "{{ cni_binary_checksum }}"
  314. url: "{{ cni_download_url }}"
  315. unarchive: false
  316. owner: "root"
  317. mode: "0755"
  318. groups:
  319. - k8s-cluster
  320. kubeadm:
  321. enabled: true
  322. file: true
  323. version: "{{ kubeadm_version }}"
  324. dest: "{{ local_release_dir }}/kubeadm-{{ kubeadm_version }}-{{ image_arch }}"
  325. sha256: "{{ kubeadm_binary_checksum }}"
  326. url: "{{ kubeadm_download_url }}"
  327. unarchive: false
  328. owner: "root"
  329. mode: "0755"
  330. groups:
  331. - k8s-cluster
  332. hyperkube_file:
  333. enabled: true
  334. file: true
  335. version: "{{ kube_version }}"
  336. dest: "{{ local_release_dir }}/hyperkube-{{ kube_version }}-{{ image_arch }}"
  337. sha256: "{{ hyperkube_binary_checksum }}"
  338. url: "{{ hyperkube_download_url }}"
  339. unarchive: false
  340. owner: "root"
  341. mode: "0755"
  342. groups:
  343. - k8s-cluster
  344. crictl:
  345. file: true
  346. enabled: "{{ container_manager in ['crio', 'cri', 'containerd'] }}"
  347. version: "{{ crictl_version }}"
  348. dest: "{{local_release_dir}}/crictl-{{ crictl_version }}-linux-{{ image_arch }}.tar.gz"
  349. sha256: "{{ crictl_binary_checksum }}"
  350. url: "{{ crictl_download_url }}"
  351. unarchive: true
  352. owner: "root"
  353. mode: "0755"
  354. groups:
  355. - k8s-cluster
  356. cilium:
  357. enabled: "{{ kube_network_plugin == 'cilium' }}"
  358. container: true
  359. repo: "{{ cilium_image_repo }}"
  360. tag: "{{ cilium_image_tag }}"
  361. sha256: "{{ cilium_digest_checksum|default(None) }}"
  362. groups:
  363. - k8s-cluster
  364. cilium_init:
  365. enabled: "{{ kube_network_plugin == 'cilium' }}"
  366. container: true
  367. repo: "{{ cilium_init_image_repo }}"
  368. tag: "{{ cilium_init_image_tag }}"
  369. sha256: "{{ cilium_init_digest_checksum|default(None) }}"
  370. groups:
  371. - k8s-cluster
  372. cilium_operator:
  373. enabled: "{{ kube_network_plugin == 'cilium' }}"
  374. container: true
  375. repo: "{{ cilium_operator_image_repo }}"
  376. tag: "{{ cilium_operator_image_tag }}"
  377. sha256: "{{ cilium_operator_digest_checksum|default(None) }}"
  378. groups:
  379. - k8s-cluster
  380. multus:
  381. enabled: "{{ kube_network_plugin_multus }}"
  382. container: true
  383. repo: "{{ multus_image_repo }}"
  384. tag: "{{ multus_image_tag }}"
  385. sha256: "{{ multus_digest_checksum|default(None) }}"
  386. groups:
  387. - k8s-cluster
  388. flannel:
  389. enabled: "{{ kube_network_plugin == 'flannel' or kube_network_plugin == 'canal' }}"
  390. container: true
  391. repo: "{{ flannel_image_repo }}"
  392. tag: "{{ flannel_image_tag }}"
  393. sha256: "{{ flannel_digest_checksum|default(None) }}"
  394. groups:
  395. - k8s-cluster
  396. flannel_cni:
  397. enabled: "{{ kube_network_plugin == 'flannel' }}"
  398. container: true
  399. repo: "{{ flannel_cni_image_repo }}"
  400. tag: "{{ flannel_cni_image_tag }}"
  401. sha256: "{{ flannel_cni_digest_checksum|default(None) }}"
  402. groups:
  403. - k8s-cluster
  404. calicoctl:
  405. enabled: "{{ kube_network_plugin == 'calico' or kube_network_plugin == 'canal' }}"
  406. file: true
  407. version: "{{ calico_ctl_version }}"
  408. dest: "{{local_release_dir}}/calicoctl"
  409. sha256: "{{ calicoctl_binary_checksum }}"
  410. url: "{{ calicoctl_download_url }}"
  411. unarchive: false
  412. owner: "root"
  413. mode: "0755"
  414. groups:
  415. - k8s-cluster
  416. calico_node:
  417. enabled: "{{ kube_network_plugin == 'calico' or kube_network_plugin == 'canal' }}"
  418. container: true
  419. repo: "{{ calico_node_image_repo }}"
  420. tag: "{{ calico_node_image_tag }}"
  421. sha256: "{{ calico_node_digest_checksum|default(None) }}"
  422. groups:
  423. - k8s-cluster
  424. calico_cni:
  425. enabled: "{{ kube_network_plugin == 'calico' or kube_network_plugin == 'canal' }}"
  426. container: true
  427. repo: "{{ calico_cni_image_repo }}"
  428. tag: "{{ calico_cni_image_tag }}"
  429. sha256: "{{ calico_cni_digest_checksum|default(None) }}"
  430. groups:
  431. - k8s-cluster
  432. calico_policy:
  433. enabled: "{{ enable_network_policy or kube_network_plugin == 'canal' }}"
  434. container: true
  435. repo: "{{ calico_policy_image_repo }}"
  436. tag: "{{ calico_policy_image_tag }}"
  437. sha256: "{{ calico_policy_digest_checksum|default(None) }}"
  438. groups:
  439. - k8s-cluster
  440. calico_rr:
  441. enabled: "{{ peer_with_calico_rr is defined and peer_with_calico_rr and kube_network_plugin == 'calico' }}"
  442. container: true
  443. repo: "{{ calico_rr_image_repo }}"
  444. tag: "{{ calico_rr_image_tag }}"
  445. sha256: "{{ calico_rr_digest_checksum|default(None) }}"
  446. groups:
  447. - calico-rr
  448. calico_typha:
  449. enabled: "{{ typha_enabled == 'calico' }}"
  450. container: true
  451. repo: "{{ calico_typha_image_repo }}"
  452. tag: "{{ calico_typha_image_tag }}"
  453. sha256: "{{ calico_typha_digest_checksum|default(None) }}"
  454. groups:
  455. - k8s-cluster
  456. weave_kube:
  457. enabled: "{{ kube_network_plugin == 'weave' }}"
  458. container: true
  459. repo: "{{ weave_kube_image_repo }}"
  460. tag: "{{ weave_kube_image_tag }}"
  461. sha256: "{{ weave_kube_digest_checksum|default(None) }}"
  462. groups:
  463. - k8s-cluster
  464. weave_npc:
  465. enabled: "{{ kube_network_plugin == 'weave' }}"
  466. container: true
  467. repo: "{{ weave_npc_image_repo }}"
  468. tag: "{{ weave_npc_image_tag }}"
  469. sha256: "{{ weave_npc_digest_checksum|default(None) }}"
  470. groups:
  471. - k8s-cluster
  472. contiv:
  473. enabled: "{{ kube_network_plugin == 'contiv' }}"
  474. container: true
  475. repo: "{{ contiv_image_repo }}"
  476. tag: "{{ contiv_image_tag }}"
  477. sha256: "{{ contiv_digest_checksum|default(None) }}"
  478. groups:
  479. - k8s-cluster
  480. contiv_auth_proxy:
  481. enabled: "{{ kube_network_plugin == 'contiv' }}"
  482. container: true
  483. repo: "{{ contiv_auth_proxy_image_repo }}"
  484. tag: "{{ contiv_auth_proxy_image_tag }}"
  485. sha256: "{{ contiv_auth_proxy_digest_checksum|default(None) }}"
  486. groups:
  487. - k8s-cluster
  488. contiv_etcd_init:
  489. enabled: "{{ kube_network_plugin == 'contiv' }}"
  490. container: true
  491. repo: "{{ contiv_etcd_init_image_repo }}"
  492. tag: "{{ contiv_etcd_init_image_tag }}"
  493. sha256: "{{ contiv_etcd_init_digest_checksum|default(None) }}"
  494. groups:
  495. - k8s-cluster
  496. kube_ovn_db:
  497. enabled: "{{ kube_network_plugin == 'kube-ovn' }}"
  498. container: true
  499. repo: "{{ kube_ovn_db_image_repo }}"
  500. tag: "{{ kube_ovn_db_image_tag }}"
  501. sha256: "{{ kube_ovn_digest_checksum|default(None) }}"
  502. groups:
  503. - k8s-cluster
  504. kube_ovn_node:
  505. enabled: "{{ kube_network_plugin == 'kube-ovn' }}"
  506. container: true
  507. repo: "{{ kube_ovn_node_image_repo }}"
  508. tag: "{{ kube_ovn_node_image_tag }}"
  509. sha256: "{{ kube_ovn_digest_checksum|default(None) }}"
  510. groups:
  511. - k8s-cluster
  512. kube_ovn_controller:
  513. enabled: "{{ kube_network_plugin == 'kube-ovn' }}"
  514. container: true
  515. repo: "{{ kube_ovn_controller_image_repo }}"
  516. tag: "{{ kube_ovn_controller_image_tag }}"
  517. sha256: "{{ kube_ovn_digest_checksum|default(None) }}"
  518. groups:
  519. - k8s-cluster
  520. kube_ovn_cni:
  521. enabled: "{{ kube_network_plugin == 'kube-ovn' }}"
  522. container: true
  523. repo: "{{ kube_ovn_cni_image_repo }}"
  524. tag: "{{ kube_ovn_cni_image_tag }}"
  525. sha256: "{{ kube_ovn_digest_checksum|default(None) }}"
  526. groups:
  527. - k8s-cluster
  528. kube_router:
  529. enabled: "{{ kube_network_plugin == 'kube-router' }}"
  530. container: true
  531. repo: "{{ kube_router_image_repo }}"
  532. tag: "{{ kube_router_image_tag }}"
  533. sha256: "{{ kube_router_digest_checksum|default(None) }}"
  534. groups:
  535. - k8s-cluster
  536. pod_infra:
  537. enabled: true
  538. container: true
  539. repo: "{{ pod_infra_image_repo }}"
  540. tag: "{{ pod_infra_image_tag }}"
  541. sha256: "{{ pod_infra_digest_checksum|default(None) }}"
  542. groups:
  543. - k8s-cluster
  544. install_socat:
  545. enabled: "{{ ansible_os_family in ['CoreOS', 'Container Linux by CoreOS'] }}"
  546. container: true
  547. repo: "{{ install_socat_image_repo }}"
  548. tag: "{{ install_socat_image_tag }}"
  549. sha256: "{{ install_socat_digest_checksum|default(None) }}"
  550. groups:
  551. - k8s-cluster
  552. nginx:
  553. enabled: "{{ loadbalancer_apiserver_localhost and loadbalancer_apiserver_type == 'nginx' }}"
  554. container: true
  555. repo: "{{ nginx_image_repo }}"
  556. tag: "{{ nginx_image_tag }}"
  557. sha256: "{{ nginx_digest_checksum|default(None) }}"
  558. groups:
  559. - kube-node
  560. haproxy:
  561. enabled: "{{ loadbalancer_apiserver_localhost and loadbalancer_apiserver_type == 'haproxy' }}"
  562. container: true
  563. repo: "{{ haproxy_image_repo }}"
  564. tag: "{{ haproxy_image_tag }}"
  565. sha256: "{{ haproxy_digest_checksum|default(None) }}"
  566. groups:
  567. - kube-node
  568. coredns:
  569. enabled: "{{ dns_mode in ['coredns', 'coredns_dual'] }}"
  570. container: true
  571. repo: "{{ coredns_image_repo }}"
  572. tag: "{{ coredns_image_tag }}"
  573. sha256: "{{ coredns_digest_checksum|default(None) }}"
  574. groups:
  575. - kube-master
  576. nodelocaldns:
  577. enabled: "{{ enable_nodelocaldns }}"
  578. container: true
  579. repo: "{{ nodelocaldns_image_repo }}"
  580. tag: "{{ nodelocaldns_image_tag }}"
  581. sha256: "{{ nodelocaldns_digest_checksum|default(None) }}"
  582. groups:
  583. - k8s-cluster
  584. dnsautoscaler:
  585. enabled: "{{ dns_mode in ['coredns', 'coredns_dual'] }}"
  586. container: true
  587. repo: "{{ dnsautoscaler_image_repo }}"
  588. tag: "{{ dnsautoscaler_image_tag }}"
  589. sha256: "{{ dnsautoscaler_digest_checksum|default(None) }}"
  590. groups:
  591. - kube-master
  592. busybox:
  593. enabled: "{{ kube_network_plugin in ['kube-router'] }}"
  594. container: true
  595. repo: "{{ busybox_image_repo }}"
  596. tag: "{{ busybox_image_tag }}"
  597. sha256: "{{ busybox_digest_checksum|default(None) }}"
  598. groups:
  599. - k8s-cluster
  600. testbox:
  601. enabled: false
  602. container: true
  603. repo: "{{ test_image_repo }}"
  604. tag: "{{ test_image_tag }}"
  605. sha256: "{{ testbox_digest_checksum|default(None) }}"
  606. helm:
  607. enabled: "{{ helm_enabled }}"
  608. container: true
  609. repo: "{{ helm_image_repo }}"
  610. tag: "{{ helm_image_tag }}"
  611. sha256: "{{ helm_digest_checksum|default(None) }}"
  612. groups:
  613. - kube-node
  614. tiller:
  615. enabled: "{{ helm_enabled }}"
  616. container: true
  617. repo: "{{ tiller_image_repo }}"
  618. tag: "{{ tiller_image_tag }}"
  619. sha256: "{{ tiller_digest_checksum|default(None) }}"
  620. groups:
  621. - kube-node
  622. registry:
  623. enabled: "{{ registry_enabled }}"
  624. container: true
  625. repo: "{{ registry_image_repo }}"
  626. tag: "{{ registry_image_tag }}"
  627. sha256: "{{ registry_digest_checksum|default(None) }}"
  628. groups:
  629. - kube-node
  630. registry_proxy:
  631. enabled: "{{ registry_enabled }}"
  632. container: true
  633. repo: "{{ registry_proxy_image_repo }}"
  634. tag: "{{ registry_proxy_image_tag }}"
  635. sha256: "{{ registry_proxy_digest_checksum|default(None) }}"
  636. groups:
  637. - kube-node
  638. metrics_server:
  639. enabled: "{{ metrics_server_enabled }}"
  640. container: true
  641. repo: "{{ metrics_server_image_repo }}"
  642. tag: "{{ metrics_server_image_tag }}"
  643. sha256: "{{ metrics_server_digest_checksum|default(None) }}"
  644. groups:
  645. - kube-master
  646. addon_resizer:
  647. # Currently addon_resizer is only used by metrics server
  648. enabled: "{{ metrics_server_enabled }}"
  649. container: true
  650. repo: "{{ addon_resizer_image_repo }}"
  651. tag: "{{ addon_resizer_image_tag }}"
  652. sha256: "{{ addon_resizer_digest_checksum|default(None) }}"
  653. groups:
  654. - kube-master
  655. local_volume_provisioner:
  656. enabled: "{{ local_volume_provisioner_enabled }}"
  657. container: true
  658. repo: "{{ local_volume_provisioner_image_repo }}"
  659. tag: "{{ local_volume_provisioner_image_tag }}"
  660. sha256: "{{ local_volume_provisioner_digest_checksum|default(None) }}"
  661. groups:
  662. - kube-node
  663. cephfs_provisioner:
  664. enabled: "{{ cephfs_provisioner_enabled }}"
  665. container: true
  666. repo: "{{ cephfs_provisioner_image_repo }}"
  667. tag: "{{ cephfs_provisioner_image_tag }}"
  668. sha256: "{{ cephfs_provisioner_digest_checksum|default(None) }}"
  669. groups:
  670. - kube-node
  671. rbd_provisioner:
  672. enabled: "{{ rbd_provisioner_enabled }}"
  673. container: true
  674. repo: "{{ rbd_provisioner_image_repo }}"
  675. tag: "{{ rbd_provisioner_image_tag }}"
  676. sha256: "{{ rbd_provisioner_digest_checksum|default(None) }}"
  677. groups:
  678. - kube-node
  679. local_path_provisioner:
  680. enabled: "{{ local_volume_provisioner_enabled }}"
  681. container: true
  682. repo: "{{ local_path_provisioner_image_repo }}"
  683. tag: "{{ local_path_provisioner_image_tag }}"
  684. sha256: "{{ local_path_provisioner_digest_checksum|default(None) }}"
  685. groups:
  686. - kube-node
  687. ingress_nginx_controller:
  688. enabled: "{{ ingress_nginx_enabled }}"
  689. container: true
  690. repo: "{{ ingress_nginx_controller_image_repo }}"
  691. tag: "{{ ingress_nginx_controller_image_tag }}"
  692. sha256: "{{ ingress_nginx_controller_digest_checksum|default(None) }}"
  693. groups:
  694. - kube-node
  695. cert_manager_controller:
  696. enabled: "{{ cert_manager_enabled }}"
  697. container: true
  698. repo: "{{ cert_manager_controller_image_repo }}"
  699. tag: "{{ cert_manager_controller_image_tag }}"
  700. sha256: "{{ cert_manager_controller_digest_checksum|default(None) }}"
  701. groups:
  702. - kube-node
  703. dashboard:
  704. enabled: "{{ dashboard_enabled }}"
  705. container: true
  706. repo: "{{ dashboard_image_repo }}"
  707. tag: "{{ dashboard_image_tag }}"
  708. sha256: "{{ dashboard_digest_checksum|default(None) }}"
  709. groups:
  710. - kube-master
  711. download_defaults:
  712. container: false
  713. file: false
  714. repo: None
  715. tag: None
  716. enabled: false
  717. dest: None
  718. version: None
  719. url: None
  720. unarchive: false
  721. owner: kube
  722. mode: None