From 2c98242d0b2be9918d72057d5cb5c1c681ad2f77 Mon Sep 17 00:00:00 2001 From: Adrien Date: Fri, 19 Jun 2020 00:11:06 +0200 Subject: [PATCH] Refactor in progress (deploy and upgrade to 0.13) --- .drone.yml | 2 +- TODO.txt | 65 +++++++++++++++++++++++ bin/gen_list.sh | 5 +- bin/update_csi.sh | 3 +- tasks/csi.yml | 15 +++--- tasks/main.yml | 49 +++++++++-------- tasks/upgrade.yml | 110 +++++++++++++++++++++++++++++++++++++++ tasks/version_0.11.0.yml | 60 --------------------- tasks/version_0.12.yml | 58 --------------------- tasks/version_0.13.yml | 58 --------------------- tasks/version_0.14.yml | 55 -------------------- tasks/version_0.15.yml | 58 --------------------- vars/files_list_0.12.yml | 41 +++++++++++++++ vars/files_list_0.13.yml | 41 +++++++++++++++ vars/files_list_0.14.yml | 38 ++++++++++++++ vars/files_list_0.15.yml | 40 ++++++++++++++ vars/files_list_csi.yml | 7 +++ vars/main.yml | 1 + 18 files changed, 384 insertions(+), 322 deletions(-) create mode 100644 TODO.txt create mode 100644 tasks/upgrade.yml delete mode 100644 tasks/version_0.11.0.yml delete mode 100644 tasks/version_0.12.yml delete mode 100644 tasks/version_0.13.yml delete mode 100644 tasks/version_0.14.yml delete mode 100644 tasks/version_0.15.yml create mode 100644 vars/files_list_0.12.yml create mode 100644 vars/files_list_0.13.yml create mode 100644 vars/files_list_0.14.yml create mode 100644 vars/files_list_0.15.yml create mode 100644 vars/files_list_csi.yml diff --git a/.drone.yml b/.drone.yml index bafaab3..833f690 100644 --- a/.drone.yml +++ b/.drone.yml @@ -1,6 +1,6 @@ --- kind: pipeline -type: docker +type: kubernetes name: default steps: diff --git a/TODO.txt b/TODO.txt new file mode 100644 index 0000000..a817be6 --- /dev/null +++ b/TODO.txt @@ -0,0 +1,65 @@ + + +TASK [k8s/cert-manager : Install Cert Manager files version 0.12] *************************************************************************************************************************************************** +--- before ++++ after +@@ -1,4 +1,6 @@ + metadata: ++ annotations: ++ kubectl.kubernetes.io/last-applied-configuration: '{"apiVersion":"rbac.authorization.k8s.io/v1beta1","kind":"RoleBinding","metadata":{"name":"cert-manager-webhook:webhook-authentication-reader","namespace":"kube-system","labels":{"app":"webhook","app.kubernetes.io/name":"webhook","app.kubernetes.io/instance":"cert-manager","app.kubernetes.io/managed-by":"Tiller","helm.sh/chart":"cert-manager-v0.12.0"}},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"Role","name":"extension-apiserver-authentication-reader"},"subjects":[{"apiGroup":"","kind":"ServiceAccount","name":"cert-manager-webhook","namespace":"cert-manager"}]}' + labels: +- helm.sh/chart: cert-manager-v0.13.1 +- resourceVersion: '347269' ++ helm.sh/chart: cert-manager-v0.12.0 ++ resourceVersion: '360246' + +changed: [kubeibm] => (item=0.12/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml) + + + + + + + + + + +TASK [k8s/cert-manager : Update Cert Manager files to version 0.14] ************************************************************************************************************************************************* +failed: [kubeibm] (item=0.14/certificates.cert-manager.io-CustomResourceDefinition.yaml) => changed=false + ansible_loop_var: item + error: 422 + item: 0.14/certificates.cert-manager.io-CustomResourceDefinition.yaml + msg: 'Failed to patch object: b''{"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"CustomResourceDefinition.apiextensions.k8s.io \\"certificates.cert-manager.io\\" is invalid: spec.validation: Forbidden: top-level and per-version schemas are mutually exclusive","reason":"Invalid","details":{"name":"certificates.cert-manager.io","group":"apiextensions.k8s.io","kind":"CustomResourceDefinition","causes":[{"reason":"FieldValueForbidden","message":"Forbidden: top-level and per-version schemas are mutually exclusive","field":"spec.validation"}]},"code":422}\n''' + reason: Unprocessable Entity + status: 422 + +failed: [kubeibm] (item=0.15/certificates.cert-manager.io-CustomResourceDefinition.yaml) => changed=false + ansible_loop_var: item + error: 422 + item: 0.15/certificates.cert-manager.io-CustomResourceDefinition.yaml + msg: 'Failed to patch object: b''{"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"CustomResourceDefinition.apiextensions.k8s.io \\"certificates.cert-manager.io\\" is invalid: spec.validation: Forbidden: top-level and per-version schemas are mutually exclusive","reason":"Invalid","details":{"name":"certificates.cert-manager.io","group":"apiextensions.k8s.io","kind":"CustomResourceDefinition","causes":[{"reason":"FieldValueForbidden","message":"Forbidden: top-level and per-version schemas are mutually exclusive","field":"spec.validation"}]},"code":422}\n''' + reason: Unprocessable Entity + status: 422 + + +{ + "kind":"Status", + "apiVersion":"v1", + "metadata":{}, + "status":"Failure", + "message":"CustomResourceDefinition.apiextensions.k8s.io \\"certificates.cert-manager.io\\" is invalid: spec.validation: Forbidden: top-level and per-version schemas are mutually exclusive", + "reason":"Invalid", + "details":{ + "name":"certificates.cert-manager.io", + "group":"apiextensions.k8s.io", + "kind":"CustomResourceDefinition", + "causes":[ + { + "reason":"FieldValueForbidden", + "message":"Forbidden: top-level and per-version schemas are mutually exclusive", + "field":"spec.validation" + } + ] + }, + "code":422 +} \ No newline at end of file diff --git a/bin/gen_list.sh b/bin/gen_list.sh index 6d2f7ee..1436a91 100755 --- a/bin/gen_list.sh +++ b/bin/gen_list.sh @@ -1,5 +1,5 @@ #!/bin/bash -CERTMANAGER_VERSION=0.15.1 +CERTMANAGER_VERSION="$(curl --silent "https://api.github.com/repos/jetstack/cert-manager/releases/latest" | jq {"name"} | sed -e '/^{/d' -e '/^}/d' -e 's|.*v\([0-9\.]*\).*|\1|')" CERTMANAGER_SHORTVERSION="$(echo "${CERTMANAGER_VERSION}" | sed 's/^\(.*\)\.[0-9]$/\1/')" wget https://github.com/jetstack/cert-manager/releases/download/v"${CERTMANAGER_VERSION}"/cert-manager.yaml kubernetes-split-yaml cert-manager.yaml > generated.log @@ -7,7 +7,8 @@ if [ -d templates/"${CERTMANAGER_SHORTVERSION}" ]; then rm -fr templates/"${CERTMANAGER_SHORTVERSION}" fi mv generated templates/"${CERTMANAGER_SHORTVERSION}" -cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "'${CERTMANAGER_SHORTVERSION}'/\2"|' +echo -e "---\ncertmanager_${CERTMANAGER_SHORTVERSION}_list:" > vars/files_list_${CERTMANAGER_SHORTVERSION}.yml +cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "'${CERTMANAGER_SHORTVERSION}'/\2"|' >> vars/files_list_${CERTMANAGER_SHORTVERSION}.yml sed '/args:/ a\ - --dns01-recursive-nameservers=8.8.8.8:53,1.1.1.1:53' -i templates/"${CERTMANAGER_SHORTVERSION}"/cert-manager-Deployment.yaml rm -f generated.log cert-manager.yaml diff --git a/bin/update_csi.sh b/bin/update_csi.sh index f7c4593..a6a2e5e 100755 --- a/bin/update_csi.sh +++ b/bin/update_csi.sh @@ -7,6 +7,7 @@ if [ -d files/csi ]; then rm -fr files/csi fi mv generated files/csi -cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "csi/\2"|' +echo -e "---\ncertmanager_csi_list:" > vars/files_list_csi.yml +cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "csi/\2"|' >> vars/files_list_csi.yml rm -f generated.log cert-manager-csi-driver.yaml diff --git a/tasks/csi.yml b/tasks/csi.yml index 9e8170a..5850203 100644 --- a/tasks/csi.yml +++ b/tasks/csi.yml @@ -1,12 +1,17 @@ --- - name: CSI Cert Manager Setup block: - - set_fact: + - name: Include vars for CSI + include_vars: "files_list_csi.yml" + + - name: Define state to present + set_fact: certmanager_csi_state: "present" when: - certmanager_csi|bool - - set_fact: + - name: Define state to absent + set_fact: certmanager_csi_state: "absent" when: - not certmanager_csi|bool @@ -18,11 +23,7 @@ merge_type: merge resource_definition: "{{ lookup('file', item) | from_yaml }}" with_items: - - "csi/csi.cert-manager.io-CSIDriver.yaml" - - "csi/cert-manager-csi-ServiceAccount.yaml" - - "csi/cert-manager-csi-ClusterRole.yaml" - - "csi/cert-manager-csi-ClusterRoleBinding.yaml" - - "csi/cert-manager-csi-DaemonSet.yaml" + - '{{ certmanager_csi_list }}' tags: - certmanager - storage diff --git a/tasks/main.yml b/tasks/main.yml index 1f7d606..5a73d0c 100644 --- a/tasks/main.yml +++ b/tasks/main.yml @@ -20,34 +20,39 @@ register: certmanager_actual_resources - name: Retreive actual cert-manager version - shell: echo "{{ certmanager_actual_resources.resources }}" | sed -e "s/.*cert-manager-controller:v\([.0-9]*\).*/\1/" -e 's/\([0-9]*\.[0-9]*\)\.[0-9]*/\1/' | uniq + shell: > + echo "{{ certmanager_actual_resources.resources }}" | + sed -e "s/.*cert-manager-controller:v\([.0-9]*\).*/\1/" -e 's/\([0-9]*\.[0-9]*\)\.[0-9]*/\1/' | + uniq register: certmanager_actual_version - - name: install / uninstall version 0.11.0 - include_tasks: "version_0.11.0.yml" - when: - - certmanager_version | regex_search('(0.11)') or certmanager_actual_version.stdout | regex_search('(0.11)') + - name: Use a short variable name + set_fact: + certmanager_actual_version: "{{ certmanager_actual_version.stdout }}" + certmanager_upgraded: false - - name: install / uninstall version 0.12 - include_tasks: "version_0.12.yml" + - name: Include upgrade task + include_tasks: "upgrade.yml" when: - - certmanager_version | regex_search('(0.12)') or certmanager_actual_version.stdout | regex_search('(0.12)') + - not certmanager_actual_version == "[]" + - not certmanager_version == certmanager_actual_version - - name: install / uninstall version 0.13 - include_tasks: "version_0.13.yml" + + - name: Include vars for version {{ certmanager_version }} + include_vars: "files_list_{{ certmanager_version }}.yml" + + - name: Install Cert Manager files version {{ certmanager_version }} + k8s: + state: "present" + context: "{{ my_context }}" +# merge_type: ['strategic-merge', 'merge'] + apply: yes + force: yes + resource_definition: "{{ lookup('template', item) | from_yaml }}" + with_items: + - "{{ lookup('vars', 'certmanager_' + certmanager_version + '_list') }}" when: - - certmanager_version | regex_search('(0.13)') or certmanager_actual_version.stdout | regex_search('(0.13)') - - - name: install / uninstall version 0.14 - include_tasks: "version_0.14.yml" - when: - - certmanager_version | regex_search('(0.14)') or certmanager_actual_version.stdout | regex_search('(0.14)') - - - name: install / uninstall version 0.15 - include_tasks: "version_0.15.yml" - when: - - certmanager_version | regex_search('(0.15)') or certmanager_actual_version.stdout | regex_search('(0.15)') - + - not certmanager_upgraded|bool tags: certmanager diff --git a/tasks/upgrade.yml b/tasks/upgrade.yml new file mode 100644 index 0000000..3ade09c --- /dev/null +++ b/tasks/upgrade.yml @@ -0,0 +1,110 @@ +--- +- name: Enable upgrade mode + set_fact: + certmanager_need_upgrade: true + +- name: Upgrade version from 0.12 to 0.13 + block: + - name: Update upgrade version to 0.13 + set_fact: + certmanager_upgrade_version: "0.13" + - name: Include vars for version 0.13 + include_vars: "files_list_0.13.yml" + - name: Update Cert Manager files to version 0.13 + k8s: + state: "present" + context: "{{ my_context }}" + apply: yes + force: yes + resource_definition: "{{ lookup('template', item) | from_yaml }}" + with_items: + - "{{ lookup('vars', 'certmanager_' + certmanager_upgrade_version + '_list') }}" + - name: Update actual version to 0.13 + set_fact: + certmanager_actual_version: "0.13" + when: + - certmanager_actual_version == "0.12" + - certmanager_need_upgrade|bool + +- name: Disable upgrade mode + set_fact: + certmanager_need_upgrade: false + certmanager_upgraded: true + when: + - certmanager_version == certmanager_actual_version + +- name: Upgrade version from 0.13 to 0.14 + block: + - name: Update upgrade version to 0.14 + set_fact: + certmanager_upgrade_version: "0.14" + - name: Include vars for version 0.14 + include_vars: "files_list_0.14.yml" + - name: Remove old existing object + k8s: + context: "{{ my_context }}" + state: absent + api_version: '{{ item.apiversion }}' + kind: '{{ item.type }}' + namespace: cert-manager + name: '{{ item.name }}' + with_items: + - { type: "Deployment", name: "cert-manager", apiversion: "apps/v1" } + - { type: "Deployment", name: "cert-manager-cainjector", apiversion: "apps/v1" } + - { type: "Deployment", name: "cert-manager-webhook", apiversion: "apps/v1" } +# - { type: "ClusterRoleBinding", name: "cert-manager-webhook:auth-delegator", apiversion: "rbac.authorization.k8s.io/v1" } +# - { type: "RoleBinding", name: "cert-manager-webhook:webhook-authentication-reader", apiversion: "rbac.authorization.k8s.io/v1beta1" } +# - { type: "ClusterRole", name: "cert-manager-webhook:webhook-requester", apiversion: "rbac.authorization.k8s.io/v1" } +## - { type: "CustomResourceDefinition", name: "certificates.cert-manager.io", apiversion: "apiextensions.k8s.io/v1" } + - name: Update Cert Manager files to version 0.14 + k8s: + state: "present" + context: "{{ my_context }}" + apply: yes + force: yes + resource_definition: "{{ lookup('template', item) | from_yaml }}" + with_items: + - "{{ lookup('vars', 'certmanager_' + certmanager_upgrade_version + '_list') }}" + - name: Update actual version to 0.14 + set_fact: + certmanager_actual_version: "0.14" + when: + - certmanager_actual_version == "0.13" + - certmanager_need_upgrade|bool + +- name: Disable upgrade mode + set_fact: + certmanager_upgrade: false + certmanager_upgraded: true + when: + - certmanager_version == certmanager_actual_version + +- name: Upgrade version from 0.14 to 0.15 + block: + - name: Update upgrade version to 0.15 + set_fact: + certmanager_upgrade_version: "0.15" + - name: Include vars for version 0.15 + include_vars: "files_list_0.15.yml" + - name: Update Cert Manager files to version 0.15 + k8s: + state: "present" + context: "{{ my_context }}" + apply: yes + force: yes + resource_definition: "{{ lookup('template', item) | from_yaml }}" + with_items: + - "{{ lookup('vars', 'certmanager_' + certmanager_upgrade_version + '_list') }}" + - name: Update actual version to 0.15 + set_fact: + certmanager_actual_version: "0.15" + when: + - certmanager_actual_version == "0.14" + - certmanager_need_upgrade|bool + +- name: Disable upgrade mode + set_fact: + certmanager_need_upgrade: false + certmanager_upgraded: true + when: + - certmanager_version == certmanager_actual_version diff --git a/tasks/version_0.11.0.yml b/tasks/version_0.11.0.yml deleted file mode 100644 index 4800546..0000000 --- a/tasks/version_0.11.0.yml +++ /dev/null @@ -1,60 +0,0 @@ ---- -- set_fact: - certmanager_0_11_0_state: "present" - when: - - certmanager_version | regex_search('(0.11)') - -- set_fact: - certmanager_0_11_0_state: "absent" - when: - - not certmanager_version | regex_search('(0.11)') - -- name: Cert Manager files - k8s: - state: "{{ certmanager_0_11_0_state }}" - context: "{{ my_context }}" - merge_type: merge - resource_definition: "{{ lookup('template', item) | from_yaml }}" - with_items: - - "0.11.0/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml" - - "0.11.0/orders.acme.cert-manager.io-CustomResourceDefinition.yaml" - - "0.11.0/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml" - - "0.11.0/certificates.cert-manager.io-CustomResourceDefinition.yaml" - - "0.11.0/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml" - - "0.11.0/issuers.cert-manager.io-CustomResourceDefinition.yaml" -# - "0.11.0/cert-manager-Namespace.yaml" - - "0.11.0/cert-manager-cainjector-ServiceAccount.yaml" - - "0.11.0/cert-manager-ServiceAccount.yaml" - - "0.11.0/cert-manager-webhook-ServiceAccount.yaml" - - "0.11.0/cert-manager-cainjector-ClusterRole.yaml" - - "0.11.0/cert-manager-cainjector-ClusterRoleBinding.yaml" - - "0.11.0/cert-manager-cainjector:leaderelection-Role.yaml" - - "0.11.0/cert-manager-cainjector:leaderelection-RoleBinding.yaml" - - "0.11.0/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml" - - "0.11.0/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml" - - "0.11.0/cert-manager-webhook:webhook-requester-ClusterRole.yaml" - - "0.11.0/cert-manager:leaderelection-Role.yaml" - - "0.11.0/cert-manager:leaderelection-RoleBinding.yaml" - - "0.11.0/cert-manager-controller-issuers-ClusterRole.yaml" - - "0.11.0/cert-manager-controller-clusterissuers-ClusterRole.yaml" - - "0.11.0/cert-manager-controller-certificates-ClusterRole.yaml" - - "0.11.0/cert-manager-controller-orders-ClusterRole.yaml" - - "0.11.0/cert-manager-controller-challenges-ClusterRole.yaml" - - "0.11.0/cert-manager-controller-ingress-shim-ClusterRole.yaml" - - "0.11.0/cert-manager-leaderelection-ClusterRoleBinding.yaml" - - "0.11.0/cert-manager-controller-issuers-ClusterRoleBinding.yaml" - - "0.11.0/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml" - - "0.11.0/cert-manager-controller-certificates-ClusterRoleBinding.yaml" - - "0.11.0/cert-manager-controller-orders-ClusterRoleBinding.yaml" - - "0.11.0/cert-manager-controller-challenges-ClusterRoleBinding.yaml" - - "0.11.0/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml" - - "0.11.0/cert-manager-view-ClusterRole.yaml" - - "0.11.0/cert-manager-edit-ClusterRole.yaml" - - "0.11.0/cert-manager-Service.yaml" - - "0.11.0/cert-manager-webhook-Service.yaml" - - "0.11.0/cert-manager-cainjector-Deployment.yaml" - - "0.11.0/cert-manager-Deployment.yaml" - - "0.11.0/cert-manager-webhook-Deployment.yaml" - - "0.11.0/v1beta1.webhook.cert-manager.io-APIService.yaml" - - "0.11.0/cert-manager-webhook-MutatingWebhookConfiguration.yaml" - - "0.11.0/cert-manager-webhook-ValidatingWebhookConfiguration.yaml" diff --git a/tasks/version_0.12.yml b/tasks/version_0.12.yml deleted file mode 100644 index 28eea57..0000000 --- a/tasks/version_0.12.yml +++ /dev/null @@ -1,58 +0,0 @@ ---- -- set_fact: - certmanager_0_12_state: "present" - when: - - certmanager_version | regex_search('(0.12)') - -- set_fact: - certmanager_0_12_state: "absent" - when: - - not certmanager_version | regex_search('(0.12)') - -- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_12_state }} - k8s: - state: "{{ certmanager_0_12_state }}" - context: "{{ my_context }}" - merge_type: merge - resource_definition: "{{ lookup('template', item) | from_yaml }}" - with_items: - - "0.12/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml" - - "0.12/certificates.cert-manager.io-CustomResourceDefinition.yaml" - - "0.12/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml" - - "0.12/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml" - - "0.12/issuers.cert-manager.io-CustomResourceDefinition.yaml" - - "0.12/orders.acme.cert-manager.io-CustomResourceDefinition.yaml" -# - "0.12/cert-manager-Namespace.yaml" - - "0.12/cert-manager-cainjector-ServiceAccount.yaml" - - "0.12/cert-manager-ServiceAccount.yaml" - - "0.12/cert-manager-webhook-ServiceAccount.yaml" - - "0.12/cert-manager-cainjector-ClusterRole.yaml" - - "0.12/cert-manager-cainjector-ClusterRoleBinding.yaml" - - "0.12/cert-manager-cainjector:leaderelection-Role.yaml" - - "0.12/cert-manager-cainjector:leaderelection-RoleBinding.yaml" - - "0.12/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml" - - "0.12/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml" - - "0.12/cert-manager-webhook:webhook-requester-ClusterRole.yaml" - - "0.12/cert-manager:leaderelection-Role.yaml" - - "0.12/cert-manager:leaderelection-RoleBinding.yaml" - - "0.12/cert-manager-controller-issuers-ClusterRole.yaml" - - "0.12/cert-manager-controller-clusterissuers-ClusterRole.yaml" - - "0.12/cert-manager-controller-certificates-ClusterRole.yaml" - - "0.12/cert-manager-controller-orders-ClusterRole.yaml" - - "0.12/cert-manager-controller-challenges-ClusterRole.yaml" - - "0.12/cert-manager-controller-ingress-shim-ClusterRole.yaml" - - "0.12/cert-manager-controller-issuers-ClusterRoleBinding.yaml" - - "0.12/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml" - - "0.12/cert-manager-controller-certificates-ClusterRoleBinding.yaml" - - "0.12/cert-manager-controller-orders-ClusterRoleBinding.yaml" - - "0.12/cert-manager-controller-challenges-ClusterRoleBinding.yaml" - - "0.12/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml" - - "0.12/cert-manager-view-ClusterRole.yaml" - - "0.12/cert-manager-edit-ClusterRole.yaml" - - "0.12/cert-manager-Service.yaml" - - "0.12/cert-manager-webhook-Service.yaml" - - "0.12/cert-manager-cainjector-Deployment.yaml" - - "0.12/cert-manager-Deployment.yaml" - - "0.12/cert-manager-webhook-Deployment.yaml" - - "0.12/cert-manager-webhook-MutatingWebhookConfiguration.yaml" - - "0.12/cert-manager-webhook-ValidatingWebhookConfiguration.yaml" diff --git a/tasks/version_0.13.yml b/tasks/version_0.13.yml deleted file mode 100644 index 95d90eb..0000000 --- a/tasks/version_0.13.yml +++ /dev/null @@ -1,58 +0,0 @@ ---- -- set_fact: - certmanager_0_13_state: "present" - when: - - certmanager_version | regex_search('(0.13)') - -- set_fact: - certmanager_0_13_state: "absent" - when: - - not certmanager_version | regex_search('(0.13)') - -- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_13_state }} - k8s: - state: "{{ certmanager_0_13_state }}" - context: "{{ my_context }}" - merge_type: merge - resource_definition: "{{ lookup('template', item) | from_yaml }}" - with_items: - - "0.13/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml" - - "0.13/certificates.cert-manager.io-CustomResourceDefinition.yaml" - - "0.13/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml" - - "0.13/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml" - - "0.13/issuers.cert-manager.io-CustomResourceDefinition.yaml" - - "0.13/orders.acme.cert-manager.io-CustomResourceDefinition.yaml" -# - "0.13/cert-manager-Namespace.yaml" - - "0.13/cert-manager-cainjector-ServiceAccount.yaml" - - "0.13/cert-manager-ServiceAccount.yaml" - - "0.13/cert-manager-webhook-ServiceAccount.yaml" - - "0.13/cert-manager-cainjector-ClusterRole.yaml" - - "0.13/cert-manager-cainjector-ClusterRoleBinding.yaml" - - "0.13/cert-manager-cainjector:leaderelection-Role.yaml" - - "0.13/cert-manager-cainjector:leaderelection-RoleBinding.yaml" - - "0.13/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml" - - "0.13/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml" - - "0.13/cert-manager-webhook:webhook-requester-ClusterRole.yaml" - - "0.13/cert-manager:leaderelection-Role.yaml" - - "0.13/cert-manager:leaderelection-RoleBinding.yaml" - - "0.13/cert-manager-controller-issuers-ClusterRole.yaml" - - "0.13/cert-manager-controller-clusterissuers-ClusterRole.yaml" - - "0.13/cert-manager-controller-certificates-ClusterRole.yaml" - - "0.13/cert-manager-controller-orders-ClusterRole.yaml" - - "0.13/cert-manager-controller-challenges-ClusterRole.yaml" - - "0.13/cert-manager-controller-ingress-shim-ClusterRole.yaml" - - "0.13/cert-manager-controller-issuers-ClusterRoleBinding.yaml" - - "0.13/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml" - - "0.13/cert-manager-controller-certificates-ClusterRoleBinding.yaml" - - "0.13/cert-manager-controller-orders-ClusterRoleBinding.yaml" - - "0.13/cert-manager-controller-challenges-ClusterRoleBinding.yaml" - - "0.13/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml" - - "0.13/cert-manager-view-ClusterRole.yaml" - - "0.13/cert-manager-edit-ClusterRole.yaml" - - "0.13/cert-manager-Service.yaml" - - "0.13/cert-manager-webhook-Service.yaml" - - "0.13/cert-manager-cainjector-Deployment.yaml" - - "0.13/cert-manager-Deployment.yaml" - - "0.13/cert-manager-webhook-Deployment.yaml" - - "0.13/cert-manager-webhook-MutatingWebhookConfiguration.yaml" - - "0.13/cert-manager-webhook-ValidatingWebhookConfiguration.yaml" diff --git a/tasks/version_0.14.yml b/tasks/version_0.14.yml deleted file mode 100644 index 0e4e40c..0000000 --- a/tasks/version_0.14.yml +++ /dev/null @@ -1,55 +0,0 @@ ---- -- set_fact: - certmanager_0_14_state: "present" - when: - - certmanager_version | regex_search('(0.14)') - -- set_fact: - certmanager_0_14_state: "absent" - when: - - not certmanager_version | regex_search('(0.14)') - -- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_14_state }} - k8s: - state: "{{ certmanager_0_14_state }}" - context: "{{ my_context }}" - merge_type: merge - resource_definition: "{{ lookup('template', item) | from_yaml }}" - with_items: - - "0.14/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml" - - "0.14/certificates.cert-manager.io-CustomResourceDefinition.yaml" - - "0.14/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml" - - "0.14/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml" - - "0.14/issuers.cert-manager.io-CustomResourceDefinition.yaml" - - "0.14/orders.acme.cert-manager.io-CustomResourceDefinition.yaml" - - "0.14/cert-manager-Namespace.yaml" - - "0.14/cert-manager-cainjector-ServiceAccount.yaml" - - "0.14/cert-manager-ServiceAccount.yaml" - - "0.14/cert-manager-webhook-ServiceAccount.yaml" - - "0.14/cert-manager-cainjector-ClusterRole.yaml" - - "0.14/cert-manager-controller-certificates-ClusterRole.yaml" - - "0.14/cert-manager-controller-issuers-ClusterRole.yaml" - - "0.14/cert-manager-view-ClusterRole.yaml" - - "0.14/cert-manager-controller-orders-ClusterRole.yaml" - - "0.14/cert-manager-controller-challenges-ClusterRole.yaml" - - "0.14/cert-manager-controller-ingress-shim-ClusterRole.yaml" - - "0.14/cert-manager-controller-clusterissuers-ClusterRole.yaml" - - "0.14/cert-manager-edit-ClusterRole.yaml" - - "0.14/cert-manager-cainjector-ClusterRoleBinding.yaml" - - "0.14/cert-manager-controller-challenges-ClusterRoleBinding.yaml" - - "0.14/cert-manager-controller-issuers-ClusterRoleBinding.yaml" - - "0.14/cert-manager-controller-certificates-ClusterRoleBinding.yaml" - - "0.14/cert-manager-controller-orders-ClusterRoleBinding.yaml" - - "0.14/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml" - - "0.14/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml" - - "0.14/cert-manager-cainjector:leaderelection-Role.yaml" - - "0.14/cert-manager:leaderelection-Role.yaml" - - "0.14/cert-manager-cainjector:leaderelection-RoleBinding.yaml" - - "0.14/cert-manager:leaderelection-RoleBinding.yaml" - - "0.14/cert-manager-Service.yaml" - - "0.14/cert-manager-webhook-Service.yaml" - - "0.14/cert-manager-cainjector-Deployment.yaml" - - "0.14/cert-manager-Deployment.yaml" - - "0.14/cert-manager-webhook-Deployment.yaml" - - "0.14/cert-manager-webhook-MutatingWebhookConfiguration.yaml" - - "0.14/cert-manager-webhook-ValidatingWebhookConfiguration.yaml" diff --git a/tasks/version_0.15.yml b/tasks/version_0.15.yml deleted file mode 100644 index 0932c3d..0000000 --- a/tasks/version_0.15.yml +++ /dev/null @@ -1,58 +0,0 @@ ---- -- set_fact: - certmanager_0_15_state: "present" - when: - - certmanager_version | regex_search('(0.15)') - -- set_fact: - certmanager_0_15_state: "absent" - when: - - not certmanager_version | regex_search('(0.15)') - -- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_15_state }} - k8s: - state: "{{ certmanager_0_15_state }}" - context: "{{ my_context }}" - merge_type: merge - resource_definition: "{{ lookup('template', item) | from_yaml }}" - with_items: - - "0.15/issuers.cert-manager.io-CustomResourceDefinition.yaml" - - "0.15/orders.acme.cert-manager.io-CustomResourceDefinition.yaml" - - "0.15/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml" - - "0.15/certificates.cert-manager.io-CustomResourceDefinition.yaml" - - "0.15/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml" - - "0.15/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml" - - "0.15/cert-manager-Namespace.yaml" - - "0.15/cert-manager-cainjector-ServiceAccount.yaml" - - "0.15/cert-manager-ServiceAccount.yaml" - - "0.15/cert-manager-webhook-ServiceAccount.yaml" - - "0.15/cert-manager-cainjector-ClusterRole.yaml" - - "0.15/cert-manager-controller-orders-ClusterRole.yaml" - - "0.15/cert-manager-controller-challenges-ClusterRole.yaml" - - "0.15/cert-manager-edit-ClusterRole.yaml" - - "0.15/cert-manager-controller-ingress-shim-ClusterRole.yaml" - - "0.15/cert-manager-view-ClusterRole.yaml" - - "0.15/cert-manager-controller-certificates-ClusterRole.yaml" - - "0.15/cert-manager-controller-issuers-ClusterRole.yaml" - - "0.15/cert-manager-controller-clusterissuers-ClusterRole.yaml" - - "0.15/cert-manager-cainjector-ClusterRoleBinding.yaml" - - "0.15/cert-manager-controller-orders-ClusterRoleBinding.yaml" - - "0.15/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml" - - "0.15/cert-manager-controller-certificates-ClusterRoleBinding.yaml" - - "0.15/cert-manager-controller-challenges-ClusterRoleBinding.yaml" - - "0.15/cert-manager-controller-issuers-ClusterRoleBinding.yaml" - - "0.15/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml" - - "0.15/cert-manager-cainjector:leaderelection-Role.yaml" - - "0.15/cert-manager:leaderelection-Role.yaml" - - "0.15/cert-manager-webhook:dynamic-serving-Role.yaml" - - "0.15/cert-manager-cainjector:leaderelection-RoleBinding.yaml" - - "0.15/cert-manager:leaderelection-RoleBinding.yaml" - - "0.15/cert-manager-webhook:dynamic-serving-RoleBinding.yaml" - - "0.15/cert-manager-Service.yaml" - - "0.15/cert-manager-webhook-Service.yaml" - - "0.15/cert-manager-cainjector-Deployment.yaml" - - "0.15/cert-manager-Deployment.yaml" - - "0.15/cert-manager-webhook-Deployment.yaml" - - "0.15/cert-manager-webhook-MutatingWebhookConfiguration.yaml" - - "0.15/cert-manager-webhook-ValidatingWebhookConfiguration.yaml" - diff --git a/vars/files_list_0.12.yml b/vars/files_list_0.12.yml new file mode 100644 index 0000000..53d741f --- /dev/null +++ b/vars/files_list_0.12.yml @@ -0,0 +1,41 @@ +certmanager_0.12_list: + - "0.12/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml" + - "0.12/certificates.cert-manager.io-CustomResourceDefinition.yaml" + - "0.12/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml" + - "0.12/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml" + - "0.12/issuers.cert-manager.io-CustomResourceDefinition.yaml" + - "0.12/orders.acme.cert-manager.io-CustomResourceDefinition.yaml" +# - "0.12/cert-manager-Namespace.yaml" + - "0.12/cert-manager-cainjector-ServiceAccount.yaml" + - "0.12/cert-manager-ServiceAccount.yaml" + - "0.12/cert-manager-webhook-ServiceAccount.yaml" + - "0.12/cert-manager-cainjector-ClusterRole.yaml" + - "0.12/cert-manager-cainjector-ClusterRoleBinding.yaml" + - "0.12/cert-manager-cainjector:leaderelection-Role.yaml" + - "0.12/cert-manager-cainjector:leaderelection-RoleBinding.yaml" + - "0.12/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml" + - "0.12/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml" + - "0.12/cert-manager-webhook:webhook-requester-ClusterRole.yaml" + - "0.12/cert-manager:leaderelection-Role.yaml" + - "0.12/cert-manager:leaderelection-RoleBinding.yaml" + - "0.12/cert-manager-controller-issuers-ClusterRole.yaml" + - "0.12/cert-manager-controller-clusterissuers-ClusterRole.yaml" + - "0.12/cert-manager-controller-certificates-ClusterRole.yaml" + - "0.12/cert-manager-controller-orders-ClusterRole.yaml" + - "0.12/cert-manager-controller-challenges-ClusterRole.yaml" + - "0.12/cert-manager-controller-ingress-shim-ClusterRole.yaml" + - "0.12/cert-manager-controller-issuers-ClusterRoleBinding.yaml" + - "0.12/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml" + - "0.12/cert-manager-controller-certificates-ClusterRoleBinding.yaml" + - "0.12/cert-manager-controller-orders-ClusterRoleBinding.yaml" + - "0.12/cert-manager-controller-challenges-ClusterRoleBinding.yaml" + - "0.12/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml" + - "0.12/cert-manager-view-ClusterRole.yaml" + - "0.12/cert-manager-edit-ClusterRole.yaml" + - "0.12/cert-manager-Service.yaml" + - "0.12/cert-manager-webhook-Service.yaml" + - "0.12/cert-manager-cainjector-Deployment.yaml" + - "0.12/cert-manager-Deployment.yaml" + - "0.12/cert-manager-webhook-Deployment.yaml" + - "0.12/cert-manager-webhook-MutatingWebhookConfiguration.yaml" + - "0.12/cert-manager-webhook-ValidatingWebhookConfiguration.yaml" \ No newline at end of file diff --git a/vars/files_list_0.13.yml b/vars/files_list_0.13.yml new file mode 100644 index 0000000..8bfea3f --- /dev/null +++ b/vars/files_list_0.13.yml @@ -0,0 +1,41 @@ +certmanager_0.13_list: + - "0.13/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml" + - "0.13/certificates.cert-manager.io-CustomResourceDefinition.yaml" + - "0.13/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml" + - "0.13/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml" + - "0.13/issuers.cert-manager.io-CustomResourceDefinition.yaml" + - "0.13/orders.acme.cert-manager.io-CustomResourceDefinition.yaml" +# - "0.13/cert-manager-Namespace.yaml" + - "0.13/cert-manager-cainjector-ServiceAccount.yaml" + - "0.13/cert-manager-ServiceAccount.yaml" + - "0.13/cert-manager-webhook-ServiceAccount.yaml" + - "0.13/cert-manager-cainjector-ClusterRole.yaml" + - "0.13/cert-manager-cainjector-ClusterRoleBinding.yaml" + - "0.13/cert-manager-cainjector:leaderelection-Role.yaml" + - "0.13/cert-manager-cainjector:leaderelection-RoleBinding.yaml" + - "0.13/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml" + - "0.13/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml" + - "0.13/cert-manager-webhook:webhook-requester-ClusterRole.yaml" + - "0.13/cert-manager:leaderelection-Role.yaml" + - "0.13/cert-manager:leaderelection-RoleBinding.yaml" + - "0.13/cert-manager-controller-issuers-ClusterRole.yaml" + - "0.13/cert-manager-controller-clusterissuers-ClusterRole.yaml" + - "0.13/cert-manager-controller-certificates-ClusterRole.yaml" + - "0.13/cert-manager-controller-orders-ClusterRole.yaml" + - "0.13/cert-manager-controller-challenges-ClusterRole.yaml" + - "0.13/cert-manager-controller-ingress-shim-ClusterRole.yaml" + - "0.13/cert-manager-controller-issuers-ClusterRoleBinding.yaml" + - "0.13/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml" + - "0.13/cert-manager-controller-certificates-ClusterRoleBinding.yaml" + - "0.13/cert-manager-controller-orders-ClusterRoleBinding.yaml" + - "0.13/cert-manager-controller-challenges-ClusterRoleBinding.yaml" + - "0.13/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml" + - "0.13/cert-manager-view-ClusterRole.yaml" + - "0.13/cert-manager-edit-ClusterRole.yaml" + - "0.13/cert-manager-Service.yaml" + - "0.13/cert-manager-webhook-Service.yaml" + - "0.13/cert-manager-cainjector-Deployment.yaml" + - "0.13/cert-manager-Deployment.yaml" + - "0.13/cert-manager-webhook-Deployment.yaml" + - "0.13/cert-manager-webhook-MutatingWebhookConfiguration.yaml" + - "0.13/cert-manager-webhook-ValidatingWebhookConfiguration.yaml" diff --git a/vars/files_list_0.14.yml b/vars/files_list_0.14.yml new file mode 100644 index 0000000..1897334 --- /dev/null +++ b/vars/files_list_0.14.yml @@ -0,0 +1,38 @@ +certmanager_0.14_list: + - "0.14/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml" + - "0.14/certificates.cert-manager.io-CustomResourceDefinition.yaml" + - "0.14/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml" + - "0.14/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml" + - "0.14/issuers.cert-manager.io-CustomResourceDefinition.yaml" + - "0.14/orders.acme.cert-manager.io-CustomResourceDefinition.yaml" + - "0.14/cert-manager-Namespace.yaml" + - "0.14/cert-manager-cainjector-ServiceAccount.yaml" + - "0.14/cert-manager-ServiceAccount.yaml" + - "0.14/cert-manager-webhook-ServiceAccount.yaml" + - "0.14/cert-manager-cainjector-ClusterRole.yaml" + - "0.14/cert-manager-controller-certificates-ClusterRole.yaml" + - "0.14/cert-manager-controller-issuers-ClusterRole.yaml" + - "0.14/cert-manager-view-ClusterRole.yaml" + - "0.14/cert-manager-controller-orders-ClusterRole.yaml" + - "0.14/cert-manager-controller-challenges-ClusterRole.yaml" + - "0.14/cert-manager-controller-ingress-shim-ClusterRole.yaml" + - "0.14/cert-manager-controller-clusterissuers-ClusterRole.yaml" + - "0.14/cert-manager-edit-ClusterRole.yaml" + - "0.14/cert-manager-cainjector-ClusterRoleBinding.yaml" + - "0.14/cert-manager-controller-challenges-ClusterRoleBinding.yaml" + - "0.14/cert-manager-controller-issuers-ClusterRoleBinding.yaml" + - "0.14/cert-manager-controller-certificates-ClusterRoleBinding.yaml" + - "0.14/cert-manager-controller-orders-ClusterRoleBinding.yaml" + - "0.14/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml" + - "0.14/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml" + - "0.14/cert-manager-cainjector:leaderelection-Role.yaml" + - "0.14/cert-manager:leaderelection-Role.yaml" + - "0.14/cert-manager-cainjector:leaderelection-RoleBinding.yaml" + - "0.14/cert-manager:leaderelection-RoleBinding.yaml" + - "0.14/cert-manager-Service.yaml" + - "0.14/cert-manager-webhook-Service.yaml" + - "0.14/cert-manager-cainjector-Deployment.yaml" + - "0.14/cert-manager-Deployment.yaml" + - "0.14/cert-manager-webhook-Deployment.yaml" + - "0.14/cert-manager-webhook-MutatingWebhookConfiguration.yaml" + - "0.14/cert-manager-webhook-ValidatingWebhookConfiguration.yaml" diff --git a/vars/files_list_0.15.yml b/vars/files_list_0.15.yml new file mode 100644 index 0000000..2e33fbb --- /dev/null +++ b/vars/files_list_0.15.yml @@ -0,0 +1,40 @@ +certmanager_0.15_list: + - "0.15/issuers.cert-manager.io-CustomResourceDefinition.yaml" + - "0.15/orders.acme.cert-manager.io-CustomResourceDefinition.yaml" + - "0.15/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml" + - "0.15/certificates.cert-manager.io-CustomResourceDefinition.yaml" + - "0.15/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml" + - "0.15/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml" + - "0.15/cert-manager-Namespace.yaml" + - "0.15/cert-manager-cainjector-ServiceAccount.yaml" + - "0.15/cert-manager-ServiceAccount.yaml" + - "0.15/cert-manager-webhook-ServiceAccount.yaml" + - "0.15/cert-manager-cainjector-ClusterRole.yaml" + - "0.15/cert-manager-controller-orders-ClusterRole.yaml" + - "0.15/cert-manager-controller-challenges-ClusterRole.yaml" + - "0.15/cert-manager-edit-ClusterRole.yaml" + - "0.15/cert-manager-controller-ingress-shim-ClusterRole.yaml" + - "0.15/cert-manager-view-ClusterRole.yaml" + - "0.15/cert-manager-controller-certificates-ClusterRole.yaml" + - "0.15/cert-manager-controller-issuers-ClusterRole.yaml" + - "0.15/cert-manager-controller-clusterissuers-ClusterRole.yaml" + - "0.15/cert-manager-cainjector-ClusterRoleBinding.yaml" + - "0.15/cert-manager-controller-orders-ClusterRoleBinding.yaml" + - "0.15/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml" + - "0.15/cert-manager-controller-certificates-ClusterRoleBinding.yaml" + - "0.15/cert-manager-controller-challenges-ClusterRoleBinding.yaml" + - "0.15/cert-manager-controller-issuers-ClusterRoleBinding.yaml" + - "0.15/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml" + - "0.15/cert-manager-cainjector:leaderelection-Role.yaml" + - "0.15/cert-manager:leaderelection-Role.yaml" + - "0.15/cert-manager-webhook:dynamic-serving-Role.yaml" + - "0.15/cert-manager-cainjector:leaderelection-RoleBinding.yaml" + - "0.15/cert-manager:leaderelection-RoleBinding.yaml" + - "0.15/cert-manager-webhook:dynamic-serving-RoleBinding.yaml" + - "0.15/cert-manager-Service.yaml" + - "0.15/cert-manager-webhook-Service.yaml" + - "0.15/cert-manager-cainjector-Deployment.yaml" + - "0.15/cert-manager-Deployment.yaml" + - "0.15/cert-manager-webhook-Deployment.yaml" + - "0.15/cert-manager-webhook-MutatingWebhookConfiguration.yaml" + - "0.15/cert-manager-webhook-ValidatingWebhookConfiguration.yaml" diff --git a/vars/files_list_csi.yml b/vars/files_list_csi.yml new file mode 100644 index 0000000..8c9acb8 --- /dev/null +++ b/vars/files_list_csi.yml @@ -0,0 +1,7 @@ +--- +certmanager_csi_list: + - "csi/csi.cert-manager.io-CSIDriver.yaml" + - "csi/cert-manager-csi-ServiceAccount.yaml" + - "csi/cert-manager-csi-ClusterRole.yaml" + - "csi/cert-manager-csi-ClusterRoleBinding.yaml" + - "csi/cert-manager-csi-DaemonSet.yaml" diff --git a/vars/main.yml b/vars/main.yml index aabd18d..99d3d43 100644 --- a/vars/main.yml +++ b/vars/main.yml @@ -1 +1,2 @@ user: "{{ ansible_user_id }}" +certmanager_upgrade: false