committed by
Kubernetes Prow Robot
30 changed files with 160 additions and 70 deletions
Split View
Diff Options
-
1.ansible-lint
-
3contrib/azurerm/roles/generate-inventory/tasks/main.yml
-
3contrib/azurerm/roles/generate-inventory_2/tasks/main.yml
-
9contrib/azurerm/roles/generate-templates/tasks/main.yml
-
9contrib/network-storage/heketi/roles/provision/tasks/bootstrap.yml
-
14contrib/network-storage/heketi/roles/provision/tasks/glusterfs/label.yml
-
13contrib/network-storage/heketi/roles/provision/tasks/heketi.yml
-
25contrib/network-storage/heketi/roles/provision/tasks/secret.yml
-
6roles/bastion-ssh-config/tasks/main.yml
-
3roles/container-engine/docker/tasks/main.yml
-
6roles/download/tasks/kubeadm_images.yml
-
3roles/download/tasks/main.yml
-
9roles/download/tasks/set_docker_image_facts.yml
-
4roles/download/tasks/sync_container.yml
-
3roles/etcd/tasks/gen_certs_script.yml
-
3roles/etcd/tasks/main.yml
-
3roles/kubernetes-apps/helm/tasks/gen_helm_tiller_certs.yml
-
3roles/kubernetes-apps/network_plugin/contiv/tasks/configure.yml
-
3roles/kubernetes/node/tasks/facts.yml
-
14roles/kubernetes/preinstall/tasks/0040-set_facts.yml
-
3roles/network_plugin/contiv/tasks/main.yml
-
3roles/upgrade/pre-upgrade/tasks/main.yml
-
3scripts/collect-info.yaml
-
3tests/cloud_playbooks/create-do.yml
-
3tests/cloud_playbooks/create-gce.yml
-
3tests/cloud_playbooks/delete-gce.yml
-
3tests/cloud_playbooks/upload-logs-gcs.yml
-
9tests/testcases/015_check-pods-running.yml
-
24tests/testcases/030_check-network.yml
-
39tests/testcases/040_check-network-adv.yml
@ -1,11 +1,19 @@ |
|||
--- |
|||
- register: "label_present" |
|||
- name: Get storage nodes |
|||
register: "label_present" |
|||
command: "{{ bin_dir }}/kubectl get node --selector=storagenode=glusterfs,kubernetes.io/hostname={{ node }} --ignore-not-found=true" |
|||
changed_when: false |
|||
|
|||
- name: "Assign storage label" |
|||
when: "label_present.stdout_lines|length == 0" |
|||
command: "{{ bin_dir }}/kubectl label node {{ node }} storagenode=glusterfs" |
|||
- register: "label_present" |
|||
|
|||
- name: Get storage nodes again |
|||
register: "label_present" |
|||
command: "{{ bin_dir }}/kubectl get node --selector=storagenode=glusterfs,kubernetes.io/hostname={{ node }} --ignore-not-found=true" |
|||
changed_when: false |
|||
- assert: { that: "label_present|length > 0", msg: "Node {{ node }} has not been assigned with label storagenode=glusterfs." } |
|||
|
|||
- name: Ensure the label has been set |
|||
assert: |
|||
that: "label_present|length > 0" |
|||
msg: "Node {{ node }} has not been assigned with label storagenode=glusterfs." |
@ -1,31 +1,44 @@ |
|||
--- |
|||
- register: "clusterrolebinding_state" |
|||
- name: Get clusterrolebindings |
|||
register: "clusterrolebinding_state" |
|||
command: "{{ bin_dir }}/kubectl get clusterrolebinding heketi-gluster-admin -o=name --ignore-not-found=true" |
|||
changed_when: false |
|||
|
|||
- name: "Kubernetes Apps | Deploy cluster role binding." |
|||
when: "clusterrolebinding_state.stdout == \"\"" |
|||
command: "{{ bin_dir }}/kubectl create clusterrolebinding heketi-gluster-admin --clusterrole=edit --serviceaccount=default:heketi-service-account" |
|||
- register: "clusterrolebinding_state" |
|||
|
|||
- name: Get clusterrolebindings again |
|||
register: "clusterrolebinding_state" |
|||
command: "{{ bin_dir }}/kubectl get clusterrolebinding heketi-gluster-admin -o=name --ignore-not-found=true" |
|||
changed_when: false |
|||
- assert: |
|||
|
|||
- name: Make sure that clusterrolebindings are present now |
|||
assert: |
|||
that: "clusterrolebinding_state.stdout != \"\"" |
|||
msg: "Cluster role binding is not present." |
|||
|
|||
- register: "secret_state" |
|||
- name: Get the heketi-config-secret secret |
|||
register: "secret_state" |
|||
command: "{{ bin_dir }}/kubectl get secret heketi-config-secret -o=name --ignore-not-found=true" |
|||
changed_when: false |
|||
|
|||
- name: "Render Heketi secret configuration." |
|||
become: true |
|||
template: |
|||
src: "heketi.json.j2" |
|||
dest: "{{ kube_config_dir }}/heketi.json" |
|||
|
|||
- name: "Deploy Heketi config secret" |
|||
when: "secret_state.stdout == \"\"" |
|||
command: "{{ bin_dir }}/kubectl create secret generic heketi-config-secret --from-file={{ kube_config_dir }}/heketi.json" |
|||
- register: "secret_state" |
|||
|
|||
- name: Get the heketi-config-secret secret again |
|||
register: "secret_state" |
|||
command: "{{ bin_dir }}/kubectl get secret heketi-config-secret -o=name --ignore-not-found=true" |
|||
changed_when: false |
|||
- assert: |
|||
|
|||
- name: Make sure the heketi-config-secret secret exists now |
|||
assert: |
|||
that: "secret_state.stdout != \"\"" |
|||
msg: "Heketi config secret is not present." |
Write
Preview
Loading…
Cancel
Save