Refactor in progress (deploy and upgrade to 0.13)
Some checks failed
continuous-integration/drone/push Build is failing

This commit is contained in:
Adrien Reslinger 2020-06-19 00:11:06 +02:00
parent acbd41024a
commit 2c98242d0b
18 changed files with 384 additions and 322 deletions

View file

@ -1,6 +1,6 @@
---
kind: pipeline
type: docker
type: kubernetes
name: default
steps:

65
TODO.txt Normal file
View file

@ -0,0 +1,65 @@
TASK [k8s/cert-manager : Install Cert Manager files version 0.12] ***************************************************************************************************************************************************
--- before
+++ after
@@ -1,4 +1,6 @@
metadata:
+ annotations:
+ kubectl.kubernetes.io/last-applied-configuration: '{"apiVersion":"rbac.authorization.k8s.io/v1beta1","kind":"RoleBinding","metadata":{"name":"cert-manager-webhook:webhook-authentication-reader","namespace":"kube-system","labels":{"app":"webhook","app.kubernetes.io/name":"webhook","app.kubernetes.io/instance":"cert-manager","app.kubernetes.io/managed-by":"Tiller","helm.sh/chart":"cert-manager-v0.12.0"}},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"Role","name":"extension-apiserver-authentication-reader"},"subjects":[{"apiGroup":"","kind":"ServiceAccount","name":"cert-manager-webhook","namespace":"cert-manager"}]}'
labels:
- helm.sh/chart: cert-manager-v0.13.1
- resourceVersion: '347269'
+ helm.sh/chart: cert-manager-v0.12.0
+ resourceVersion: '360246'
changed: [kubeibm] => (item=0.12/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml)
TASK [k8s/cert-manager : Update Cert Manager files to version 0.14] *************************************************************************************************************************************************
failed: [kubeibm] (item=0.14/certificates.cert-manager.io-CustomResourceDefinition.yaml) => changed=false
ansible_loop_var: item
error: 422
item: 0.14/certificates.cert-manager.io-CustomResourceDefinition.yaml
msg: 'Failed to patch object: b''{"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"CustomResourceDefinition.apiextensions.k8s.io \\"certificates.cert-manager.io\\" is invalid: spec.validation: Forbidden: top-level and per-version schemas are mutually exclusive","reason":"Invalid","details":{"name":"certificates.cert-manager.io","group":"apiextensions.k8s.io","kind":"CustomResourceDefinition","causes":[{"reason":"FieldValueForbidden","message":"Forbidden: top-level and per-version schemas are mutually exclusive","field":"spec.validation"}]},"code":422}\n'''
reason: Unprocessable Entity
status: 422
failed: [kubeibm] (item=0.15/certificates.cert-manager.io-CustomResourceDefinition.yaml) => changed=false
ansible_loop_var: item
error: 422
item: 0.15/certificates.cert-manager.io-CustomResourceDefinition.yaml
msg: 'Failed to patch object: b''{"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"CustomResourceDefinition.apiextensions.k8s.io \\"certificates.cert-manager.io\\" is invalid: spec.validation: Forbidden: top-level and per-version schemas are mutually exclusive","reason":"Invalid","details":{"name":"certificates.cert-manager.io","group":"apiextensions.k8s.io","kind":"CustomResourceDefinition","causes":[{"reason":"FieldValueForbidden","message":"Forbidden: top-level and per-version schemas are mutually exclusive","field":"spec.validation"}]},"code":422}\n'''
reason: Unprocessable Entity
status: 422
{
"kind":"Status",
"apiVersion":"v1",
"metadata":{},
"status":"Failure",
"message":"CustomResourceDefinition.apiextensions.k8s.io \\"certificates.cert-manager.io\\" is invalid: spec.validation: Forbidden: top-level and per-version schemas are mutually exclusive",
"reason":"Invalid",
"details":{
"name":"certificates.cert-manager.io",
"group":"apiextensions.k8s.io",
"kind":"CustomResourceDefinition",
"causes":[
{
"reason":"FieldValueForbidden",
"message":"Forbidden: top-level and per-version schemas are mutually exclusive",
"field":"spec.validation"
}
]
},
"code":422
}

View file

@ -1,5 +1,5 @@
#!/bin/bash
CERTMANAGER_VERSION=0.15.1
CERTMANAGER_VERSION="$(curl --silent "https://api.github.com/repos/jetstack/cert-manager/releases/latest" | jq {"name"} | sed -e '/^{/d' -e '/^}/d' -e 's|.*v\([0-9\.]*\).*|\1|')"
CERTMANAGER_SHORTVERSION="$(echo "${CERTMANAGER_VERSION}" | sed 's/^\(.*\)\.[0-9]$/\1/')"
wget https://github.com/jetstack/cert-manager/releases/download/v"${CERTMANAGER_VERSION}"/cert-manager.yaml
kubernetes-split-yaml cert-manager.yaml > generated.log
@ -7,7 +7,8 @@ if [ -d templates/"${CERTMANAGER_SHORTVERSION}" ]; then
rm -fr templates/"${CERTMANAGER_SHORTVERSION}"
fi
mv generated templates/"${CERTMANAGER_SHORTVERSION}"
cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "'${CERTMANAGER_SHORTVERSION}'/\2"|'
echo -e "---\ncertmanager_${CERTMANAGER_SHORTVERSION}_list:" > vars/files_list_${CERTMANAGER_SHORTVERSION}.yml
cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "'${CERTMANAGER_SHORTVERSION}'/\2"|' >> vars/files_list_${CERTMANAGER_SHORTVERSION}.yml
sed '/args:/ a\ - --dns01-recursive-nameservers=8.8.8.8:53,1.1.1.1:53' -i templates/"${CERTMANAGER_SHORTVERSION}"/cert-manager-Deployment.yaml
rm -f generated.log cert-manager.yaml

View file

@ -7,6 +7,7 @@ if [ -d files/csi ]; then
rm -fr files/csi
fi
mv generated files/csi
cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "csi/\2"|'
echo -e "---\ncertmanager_csi_list:" > vars/files_list_csi.yml
cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "csi/\2"|' >> vars/files_list_csi.yml
rm -f generated.log cert-manager-csi-driver.yaml

View file

@ -1,12 +1,17 @@
---
- name: CSI Cert Manager Setup
block:
- set_fact:
- name: Include vars for CSI
include_vars: "files_list_csi.yml"
- name: Define state to present
set_fact:
certmanager_csi_state: "present"
when:
- certmanager_csi|bool
- set_fact:
- name: Define state to absent
set_fact:
certmanager_csi_state: "absent"
when:
- not certmanager_csi|bool
@ -18,11 +23,7 @@
merge_type: merge
resource_definition: "{{ lookup('file', item) | from_yaml }}"
with_items:
- "csi/csi.cert-manager.io-CSIDriver.yaml"
- "csi/cert-manager-csi-ServiceAccount.yaml"
- "csi/cert-manager-csi-ClusterRole.yaml"
- "csi/cert-manager-csi-ClusterRoleBinding.yaml"
- "csi/cert-manager-csi-DaemonSet.yaml"
- '{{ certmanager_csi_list }}'
tags:
- certmanager
- storage

View file

@ -20,34 +20,39 @@
register: certmanager_actual_resources
- name: Retreive actual cert-manager version
shell: echo "{{ certmanager_actual_resources.resources }}" | sed -e "s/.*cert-manager-controller:v\([.0-9]*\).*/\1/" -e 's/\([0-9]*\.[0-9]*\)\.[0-9]*/\1/' | uniq
shell: >
echo "{{ certmanager_actual_resources.resources }}" |
sed -e "s/.*cert-manager-controller:v\([.0-9]*\).*/\1/" -e 's/\([0-9]*\.[0-9]*\)\.[0-9]*/\1/' |
uniq
register: certmanager_actual_version
- name: install / uninstall version 0.11.0
include_tasks: "version_0.11.0.yml"
when:
- certmanager_version | regex_search('(0.11)') or certmanager_actual_version.stdout | regex_search('(0.11)')
- name: Use a short variable name
set_fact:
certmanager_actual_version: "{{ certmanager_actual_version.stdout }}"
certmanager_upgraded: false
- name: install / uninstall version 0.12
include_tasks: "version_0.12.yml"
- name: Include upgrade task
include_tasks: "upgrade.yml"
when:
- certmanager_version | regex_search('(0.12)') or certmanager_actual_version.stdout | regex_search('(0.12)')
- not certmanager_actual_version == "[]"
- not certmanager_version == certmanager_actual_version
- name: install / uninstall version 0.13
include_tasks: "version_0.13.yml"
- name: Include vars for version {{ certmanager_version }}
include_vars: "files_list_{{ certmanager_version }}.yml"
- name: Install Cert Manager files version {{ certmanager_version }}
k8s:
state: "present"
context: "{{ my_context }}"
# merge_type: ['strategic-merge', 'merge']
apply: yes
force: yes
resource_definition: "{{ lookup('template', item) | from_yaml }}"
with_items:
- "{{ lookup('vars', 'certmanager_' + certmanager_version + '_list') }}"
when:
- certmanager_version | regex_search('(0.13)') or certmanager_actual_version.stdout | regex_search('(0.13)')
- name: install / uninstall version 0.14
include_tasks: "version_0.14.yml"
when:
- certmanager_version | regex_search('(0.14)') or certmanager_actual_version.stdout | regex_search('(0.14)')
- name: install / uninstall version 0.15
include_tasks: "version_0.15.yml"
when:
- certmanager_version | regex_search('(0.15)') or certmanager_actual_version.stdout | regex_search('(0.15)')
- not certmanager_upgraded|bool
tags: certmanager

110
tasks/upgrade.yml Normal file
View file

@ -0,0 +1,110 @@
---
- name: Enable upgrade mode
set_fact:
certmanager_need_upgrade: true
- name: Upgrade version from 0.12 to 0.13
block:
- name: Update upgrade version to 0.13
set_fact:
certmanager_upgrade_version: "0.13"
- name: Include vars for version 0.13
include_vars: "files_list_0.13.yml"
- name: Update Cert Manager files to version 0.13
k8s:
state: "present"
context: "{{ my_context }}"
apply: yes
force: yes
resource_definition: "{{ lookup('template', item) | from_yaml }}"
with_items:
- "{{ lookup('vars', 'certmanager_' + certmanager_upgrade_version + '_list') }}"
- name: Update actual version to 0.13
set_fact:
certmanager_actual_version: "0.13"
when:
- certmanager_actual_version == "0.12"
- certmanager_need_upgrade|bool
- name: Disable upgrade mode
set_fact:
certmanager_need_upgrade: false
certmanager_upgraded: true
when:
- certmanager_version == certmanager_actual_version
- name: Upgrade version from 0.13 to 0.14
block:
- name: Update upgrade version to 0.14
set_fact:
certmanager_upgrade_version: "0.14"
- name: Include vars for version 0.14
include_vars: "files_list_0.14.yml"
- name: Remove old existing object
k8s:
context: "{{ my_context }}"
state: absent
api_version: '{{ item.apiversion }}'
kind: '{{ item.type }}'
namespace: cert-manager
name: '{{ item.name }}'
with_items:
- { type: "Deployment", name: "cert-manager", apiversion: "apps/v1" }
- { type: "Deployment", name: "cert-manager-cainjector", apiversion: "apps/v1" }
- { type: "Deployment", name: "cert-manager-webhook", apiversion: "apps/v1" }
# - { type: "ClusterRoleBinding", name: "cert-manager-webhook:auth-delegator", apiversion: "rbac.authorization.k8s.io/v1" }
# - { type: "RoleBinding", name: "cert-manager-webhook:webhook-authentication-reader", apiversion: "rbac.authorization.k8s.io/v1beta1" }
# - { type: "ClusterRole", name: "cert-manager-webhook:webhook-requester", apiversion: "rbac.authorization.k8s.io/v1" }
## - { type: "CustomResourceDefinition", name: "certificates.cert-manager.io", apiversion: "apiextensions.k8s.io/v1" }
- name: Update Cert Manager files to version 0.14
k8s:
state: "present"
context: "{{ my_context }}"
apply: yes
force: yes
resource_definition: "{{ lookup('template', item) | from_yaml }}"
with_items:
- "{{ lookup('vars', 'certmanager_' + certmanager_upgrade_version + '_list') }}"
- name: Update actual version to 0.14
set_fact:
certmanager_actual_version: "0.14"
when:
- certmanager_actual_version == "0.13"
- certmanager_need_upgrade|bool
- name: Disable upgrade mode
set_fact:
certmanager_upgrade: false
certmanager_upgraded: true
when:
- certmanager_version == certmanager_actual_version
- name: Upgrade version from 0.14 to 0.15
block:
- name: Update upgrade version to 0.15
set_fact:
certmanager_upgrade_version: "0.15"
- name: Include vars for version 0.15
include_vars: "files_list_0.15.yml"
- name: Update Cert Manager files to version 0.15
k8s:
state: "present"
context: "{{ my_context }}"
apply: yes
force: yes
resource_definition: "{{ lookup('template', item) | from_yaml }}"
with_items:
- "{{ lookup('vars', 'certmanager_' + certmanager_upgrade_version + '_list') }}"
- name: Update actual version to 0.15
set_fact:
certmanager_actual_version: "0.15"
when:
- certmanager_actual_version == "0.14"
- certmanager_need_upgrade|bool
- name: Disable upgrade mode
set_fact:
certmanager_need_upgrade: false
certmanager_upgraded: true
when:
- certmanager_version == certmanager_actual_version

View file

@ -1,60 +0,0 @@
---
- set_fact:
certmanager_0_11_0_state: "present"
when:
- certmanager_version | regex_search('(0.11)')
- set_fact:
certmanager_0_11_0_state: "absent"
when:
- not certmanager_version | regex_search('(0.11)')
- name: Cert Manager files
k8s:
state: "{{ certmanager_0_11_0_state }}"
context: "{{ my_context }}"
merge_type: merge
resource_definition: "{{ lookup('template', item) | from_yaml }}"
with_items:
- "0.11.0/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.11.0/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.11.0/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
- "0.11.0/certificates.cert-manager.io-CustomResourceDefinition.yaml"
- "0.11.0/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.11.0/issuers.cert-manager.io-CustomResourceDefinition.yaml"
# - "0.11.0/cert-manager-Namespace.yaml"
- "0.11.0/cert-manager-cainjector-ServiceAccount.yaml"
- "0.11.0/cert-manager-ServiceAccount.yaml"
- "0.11.0/cert-manager-webhook-ServiceAccount.yaml"
- "0.11.0/cert-manager-cainjector-ClusterRole.yaml"
- "0.11.0/cert-manager-cainjector-ClusterRoleBinding.yaml"
- "0.11.0/cert-manager-cainjector:leaderelection-Role.yaml"
- "0.11.0/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
- "0.11.0/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml"
- "0.11.0/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml"
- "0.11.0/cert-manager-webhook:webhook-requester-ClusterRole.yaml"
- "0.11.0/cert-manager:leaderelection-Role.yaml"
- "0.11.0/cert-manager:leaderelection-RoleBinding.yaml"
- "0.11.0/cert-manager-controller-issuers-ClusterRole.yaml"
- "0.11.0/cert-manager-controller-clusterissuers-ClusterRole.yaml"
- "0.11.0/cert-manager-controller-certificates-ClusterRole.yaml"
- "0.11.0/cert-manager-controller-orders-ClusterRole.yaml"
- "0.11.0/cert-manager-controller-challenges-ClusterRole.yaml"
- "0.11.0/cert-manager-controller-ingress-shim-ClusterRole.yaml"
- "0.11.0/cert-manager-leaderelection-ClusterRoleBinding.yaml"
- "0.11.0/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
- "0.11.0/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
- "0.11.0/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
- "0.11.0/cert-manager-controller-orders-ClusterRoleBinding.yaml"
- "0.11.0/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
- "0.11.0/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
- "0.11.0/cert-manager-view-ClusterRole.yaml"
- "0.11.0/cert-manager-edit-ClusterRole.yaml"
- "0.11.0/cert-manager-Service.yaml"
- "0.11.0/cert-manager-webhook-Service.yaml"
- "0.11.0/cert-manager-cainjector-Deployment.yaml"
- "0.11.0/cert-manager-Deployment.yaml"
- "0.11.0/cert-manager-webhook-Deployment.yaml"
- "0.11.0/v1beta1.webhook.cert-manager.io-APIService.yaml"
- "0.11.0/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
- "0.11.0/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"

View file

@ -1,58 +0,0 @@
---
- set_fact:
certmanager_0_12_state: "present"
when:
- certmanager_version | regex_search('(0.12)')
- set_fact:
certmanager_0_12_state: "absent"
when:
- not certmanager_version | regex_search('(0.12)')
- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_12_state }}
k8s:
state: "{{ certmanager_0_12_state }}"
context: "{{ my_context }}"
merge_type: merge
resource_definition: "{{ lookup('template', item) | from_yaml }}"
with_items:
- "0.12/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/certificates.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/issuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
# - "0.12/cert-manager-Namespace.yaml"
- "0.12/cert-manager-cainjector-ServiceAccount.yaml"
- "0.12/cert-manager-ServiceAccount.yaml"
- "0.12/cert-manager-webhook-ServiceAccount.yaml"
- "0.12/cert-manager-cainjector-ClusterRole.yaml"
- "0.12/cert-manager-cainjector-ClusterRoleBinding.yaml"
- "0.12/cert-manager-cainjector:leaderelection-Role.yaml"
- "0.12/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
- "0.12/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml"
- "0.12/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml"
- "0.12/cert-manager-webhook:webhook-requester-ClusterRole.yaml"
- "0.12/cert-manager:leaderelection-Role.yaml"
- "0.12/cert-manager:leaderelection-RoleBinding.yaml"
- "0.12/cert-manager-controller-issuers-ClusterRole.yaml"
- "0.12/cert-manager-controller-clusterissuers-ClusterRole.yaml"
- "0.12/cert-manager-controller-certificates-ClusterRole.yaml"
- "0.12/cert-manager-controller-orders-ClusterRole.yaml"
- "0.12/cert-manager-controller-challenges-ClusterRole.yaml"
- "0.12/cert-manager-controller-ingress-shim-ClusterRole.yaml"
- "0.12/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-orders-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
- "0.12/cert-manager-view-ClusterRole.yaml"
- "0.12/cert-manager-edit-ClusterRole.yaml"
- "0.12/cert-manager-Service.yaml"
- "0.12/cert-manager-webhook-Service.yaml"
- "0.12/cert-manager-cainjector-Deployment.yaml"
- "0.12/cert-manager-Deployment.yaml"
- "0.12/cert-manager-webhook-Deployment.yaml"
- "0.12/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
- "0.12/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"

View file

@ -1,58 +0,0 @@
---
- set_fact:
certmanager_0_13_state: "present"
when:
- certmanager_version | regex_search('(0.13)')
- set_fact:
certmanager_0_13_state: "absent"
when:
- not certmanager_version | regex_search('(0.13)')
- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_13_state }}
k8s:
state: "{{ certmanager_0_13_state }}"
context: "{{ my_context }}"
merge_type: merge
resource_definition: "{{ lookup('template', item) | from_yaml }}"
with_items:
- "0.13/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/certificates.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/issuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
# - "0.13/cert-manager-Namespace.yaml"
- "0.13/cert-manager-cainjector-ServiceAccount.yaml"
- "0.13/cert-manager-ServiceAccount.yaml"
- "0.13/cert-manager-webhook-ServiceAccount.yaml"
- "0.13/cert-manager-cainjector-ClusterRole.yaml"
- "0.13/cert-manager-cainjector-ClusterRoleBinding.yaml"
- "0.13/cert-manager-cainjector:leaderelection-Role.yaml"
- "0.13/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
- "0.13/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml"
- "0.13/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml"
- "0.13/cert-manager-webhook:webhook-requester-ClusterRole.yaml"
- "0.13/cert-manager:leaderelection-Role.yaml"
- "0.13/cert-manager:leaderelection-RoleBinding.yaml"
- "0.13/cert-manager-controller-issuers-ClusterRole.yaml"
- "0.13/cert-manager-controller-clusterissuers-ClusterRole.yaml"
- "0.13/cert-manager-controller-certificates-ClusterRole.yaml"
- "0.13/cert-manager-controller-orders-ClusterRole.yaml"
- "0.13/cert-manager-controller-challenges-ClusterRole.yaml"
- "0.13/cert-manager-controller-ingress-shim-ClusterRole.yaml"
- "0.13/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-orders-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
- "0.13/cert-manager-view-ClusterRole.yaml"
- "0.13/cert-manager-edit-ClusterRole.yaml"
- "0.13/cert-manager-Service.yaml"
- "0.13/cert-manager-webhook-Service.yaml"
- "0.13/cert-manager-cainjector-Deployment.yaml"
- "0.13/cert-manager-Deployment.yaml"
- "0.13/cert-manager-webhook-Deployment.yaml"
- "0.13/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
- "0.13/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"

View file

@ -1,55 +0,0 @@
---
- set_fact:
certmanager_0_14_state: "present"
when:
- certmanager_version | regex_search('(0.14)')
- set_fact:
certmanager_0_14_state: "absent"
when:
- not certmanager_version | regex_search('(0.14)')
- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_14_state }}
k8s:
state: "{{ certmanager_0_14_state }}"
context: "{{ my_context }}"
merge_type: merge
resource_definition: "{{ lookup('template', item) | from_yaml }}"
with_items:
- "0.14/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
- "0.14/certificates.cert-manager.io-CustomResourceDefinition.yaml"
- "0.14/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.14/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.14/issuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.14/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.14/cert-manager-Namespace.yaml"
- "0.14/cert-manager-cainjector-ServiceAccount.yaml"
- "0.14/cert-manager-ServiceAccount.yaml"
- "0.14/cert-manager-webhook-ServiceAccount.yaml"
- "0.14/cert-manager-cainjector-ClusterRole.yaml"
- "0.14/cert-manager-controller-certificates-ClusterRole.yaml"
- "0.14/cert-manager-controller-issuers-ClusterRole.yaml"
- "0.14/cert-manager-view-ClusterRole.yaml"
- "0.14/cert-manager-controller-orders-ClusterRole.yaml"
- "0.14/cert-manager-controller-challenges-ClusterRole.yaml"
- "0.14/cert-manager-controller-ingress-shim-ClusterRole.yaml"
- "0.14/cert-manager-controller-clusterissuers-ClusterRole.yaml"
- "0.14/cert-manager-edit-ClusterRole.yaml"
- "0.14/cert-manager-cainjector-ClusterRoleBinding.yaml"
- "0.14/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
- "0.14/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
- "0.14/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
- "0.14/cert-manager-controller-orders-ClusterRoleBinding.yaml"
- "0.14/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
- "0.14/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
- "0.14/cert-manager-cainjector:leaderelection-Role.yaml"
- "0.14/cert-manager:leaderelection-Role.yaml"
- "0.14/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
- "0.14/cert-manager:leaderelection-RoleBinding.yaml"
- "0.14/cert-manager-Service.yaml"
- "0.14/cert-manager-webhook-Service.yaml"
- "0.14/cert-manager-cainjector-Deployment.yaml"
- "0.14/cert-manager-Deployment.yaml"
- "0.14/cert-manager-webhook-Deployment.yaml"
- "0.14/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
- "0.14/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"

View file

@ -1,58 +0,0 @@
---
- set_fact:
certmanager_0_15_state: "present"
when:
- certmanager_version | regex_search('(0.15)')
- set_fact:
certmanager_0_15_state: "absent"
when:
- not certmanager_version | regex_search('(0.15)')
- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_15_state }}
k8s:
state: "{{ certmanager_0_15_state }}"
context: "{{ my_context }}"
merge_type: merge
resource_definition: "{{ lookup('template', item) | from_yaml }}"
with_items:
- "0.15/issuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.15/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.15/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
- "0.15/certificates.cert-manager.io-CustomResourceDefinition.yaml"
- "0.15/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.15/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.15/cert-manager-Namespace.yaml"
- "0.15/cert-manager-cainjector-ServiceAccount.yaml"
- "0.15/cert-manager-ServiceAccount.yaml"
- "0.15/cert-manager-webhook-ServiceAccount.yaml"
- "0.15/cert-manager-cainjector-ClusterRole.yaml"
- "0.15/cert-manager-controller-orders-ClusterRole.yaml"
- "0.15/cert-manager-controller-challenges-ClusterRole.yaml"
- "0.15/cert-manager-edit-ClusterRole.yaml"
- "0.15/cert-manager-controller-ingress-shim-ClusterRole.yaml"
- "0.15/cert-manager-view-ClusterRole.yaml"
- "0.15/cert-manager-controller-certificates-ClusterRole.yaml"
- "0.15/cert-manager-controller-issuers-ClusterRole.yaml"
- "0.15/cert-manager-controller-clusterissuers-ClusterRole.yaml"
- "0.15/cert-manager-cainjector-ClusterRoleBinding.yaml"
- "0.15/cert-manager-controller-orders-ClusterRoleBinding.yaml"
- "0.15/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
- "0.15/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
- "0.15/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
- "0.15/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
- "0.15/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
- "0.15/cert-manager-cainjector:leaderelection-Role.yaml"
- "0.15/cert-manager:leaderelection-Role.yaml"
- "0.15/cert-manager-webhook:dynamic-serving-Role.yaml"
- "0.15/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
- "0.15/cert-manager:leaderelection-RoleBinding.yaml"
- "0.15/cert-manager-webhook:dynamic-serving-RoleBinding.yaml"
- "0.15/cert-manager-Service.yaml"
- "0.15/cert-manager-webhook-Service.yaml"
- "0.15/cert-manager-cainjector-Deployment.yaml"
- "0.15/cert-manager-Deployment.yaml"
- "0.15/cert-manager-webhook-Deployment.yaml"
- "0.15/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
- "0.15/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"

41
vars/files_list_0.12.yml Normal file
View file

@ -0,0 +1,41 @@
certmanager_0.12_list:
- "0.12/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/certificates.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/issuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
# - "0.12/cert-manager-Namespace.yaml"
- "0.12/cert-manager-cainjector-ServiceAccount.yaml"
- "0.12/cert-manager-ServiceAccount.yaml"
- "0.12/cert-manager-webhook-ServiceAccount.yaml"
- "0.12/cert-manager-cainjector-ClusterRole.yaml"
- "0.12/cert-manager-cainjector-ClusterRoleBinding.yaml"
- "0.12/cert-manager-cainjector:leaderelection-Role.yaml"
- "0.12/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
- "0.12/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml"
- "0.12/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml"
- "0.12/cert-manager-webhook:webhook-requester-ClusterRole.yaml"
- "0.12/cert-manager:leaderelection-Role.yaml"
- "0.12/cert-manager:leaderelection-RoleBinding.yaml"
- "0.12/cert-manager-controller-issuers-ClusterRole.yaml"
- "0.12/cert-manager-controller-clusterissuers-ClusterRole.yaml"
- "0.12/cert-manager-controller-certificates-ClusterRole.yaml"
- "0.12/cert-manager-controller-orders-ClusterRole.yaml"
- "0.12/cert-manager-controller-challenges-ClusterRole.yaml"
- "0.12/cert-manager-controller-ingress-shim-ClusterRole.yaml"
- "0.12/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-orders-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
- "0.12/cert-manager-view-ClusterRole.yaml"
- "0.12/cert-manager-edit-ClusterRole.yaml"
- "0.12/cert-manager-Service.yaml"
- "0.12/cert-manager-webhook-Service.yaml"
- "0.12/cert-manager-cainjector-Deployment.yaml"
- "0.12/cert-manager-Deployment.yaml"
- "0.12/cert-manager-webhook-Deployment.yaml"
- "0.12/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
- "0.12/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"

41
vars/files_list_0.13.yml Normal file
View file

@ -0,0 +1,41 @@
certmanager_0.13_list:
- "0.13/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/certificates.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/issuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
# - "0.13/cert-manager-Namespace.yaml"
- "0.13/cert-manager-cainjector-ServiceAccount.yaml"
- "0.13/cert-manager-ServiceAccount.yaml"
- "0.13/cert-manager-webhook-ServiceAccount.yaml"
- "0.13/cert-manager-cainjector-ClusterRole.yaml"
- "0.13/cert-manager-cainjector-ClusterRoleBinding.yaml"
- "0.13/cert-manager-cainjector:leaderelection-Role.yaml"
- "0.13/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
- "0.13/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml"
- "0.13/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml"
- "0.13/cert-manager-webhook:webhook-requester-ClusterRole.yaml"
- "0.13/cert-manager:leaderelection-Role.yaml"
- "0.13/cert-manager:leaderelection-RoleBinding.yaml"
- "0.13/cert-manager-controller-issuers-ClusterRole.yaml"
- "0.13/cert-manager-controller-clusterissuers-ClusterRole.yaml"
- "0.13/cert-manager-controller-certificates-ClusterRole.yaml"
- "0.13/cert-manager-controller-orders-ClusterRole.yaml"
- "0.13/cert-manager-controller-challenges-ClusterRole.yaml"
- "0.13/cert-manager-controller-ingress-shim-ClusterRole.yaml"
- "0.13/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-orders-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
- "0.13/cert-manager-view-ClusterRole.yaml"
- "0.13/cert-manager-edit-ClusterRole.yaml"
- "0.13/cert-manager-Service.yaml"
- "0.13/cert-manager-webhook-Service.yaml"
- "0.13/cert-manager-cainjector-Deployment.yaml"
- "0.13/cert-manager-Deployment.yaml"
- "0.13/cert-manager-webhook-Deployment.yaml"
- "0.13/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
- "0.13/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"

38
vars/files_list_0.14.yml Normal file
View file

@ -0,0 +1,38 @@
certmanager_0.14_list:
- "0.14/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
- "0.14/certificates.cert-manager.io-CustomResourceDefinition.yaml"
- "0.14/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.14/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.14/issuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.14/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.14/cert-manager-Namespace.yaml"
- "0.14/cert-manager-cainjector-ServiceAccount.yaml"
- "0.14/cert-manager-ServiceAccount.yaml"
- "0.14/cert-manager-webhook-ServiceAccount.yaml"
- "0.14/cert-manager-cainjector-ClusterRole.yaml"
- "0.14/cert-manager-controller-certificates-ClusterRole.yaml"
- "0.14/cert-manager-controller-issuers-ClusterRole.yaml"
- "0.14/cert-manager-view-ClusterRole.yaml"
- "0.14/cert-manager-controller-orders-ClusterRole.yaml"
- "0.14/cert-manager-controller-challenges-ClusterRole.yaml"
- "0.14/cert-manager-controller-ingress-shim-ClusterRole.yaml"
- "0.14/cert-manager-controller-clusterissuers-ClusterRole.yaml"
- "0.14/cert-manager-edit-ClusterRole.yaml"
- "0.14/cert-manager-cainjector-ClusterRoleBinding.yaml"
- "0.14/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
- "0.14/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
- "0.14/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
- "0.14/cert-manager-controller-orders-ClusterRoleBinding.yaml"
- "0.14/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
- "0.14/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
- "0.14/cert-manager-cainjector:leaderelection-Role.yaml"
- "0.14/cert-manager:leaderelection-Role.yaml"
- "0.14/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
- "0.14/cert-manager:leaderelection-RoleBinding.yaml"
- "0.14/cert-manager-Service.yaml"
- "0.14/cert-manager-webhook-Service.yaml"
- "0.14/cert-manager-cainjector-Deployment.yaml"
- "0.14/cert-manager-Deployment.yaml"
- "0.14/cert-manager-webhook-Deployment.yaml"
- "0.14/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
- "0.14/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"

40
vars/files_list_0.15.yml Normal file
View file

@ -0,0 +1,40 @@
certmanager_0.15_list:
- "0.15/issuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.15/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.15/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
- "0.15/certificates.cert-manager.io-CustomResourceDefinition.yaml"
- "0.15/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.15/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.15/cert-manager-Namespace.yaml"
- "0.15/cert-manager-cainjector-ServiceAccount.yaml"
- "0.15/cert-manager-ServiceAccount.yaml"
- "0.15/cert-manager-webhook-ServiceAccount.yaml"
- "0.15/cert-manager-cainjector-ClusterRole.yaml"
- "0.15/cert-manager-controller-orders-ClusterRole.yaml"
- "0.15/cert-manager-controller-challenges-ClusterRole.yaml"
- "0.15/cert-manager-edit-ClusterRole.yaml"
- "0.15/cert-manager-controller-ingress-shim-ClusterRole.yaml"
- "0.15/cert-manager-view-ClusterRole.yaml"
- "0.15/cert-manager-controller-certificates-ClusterRole.yaml"
- "0.15/cert-manager-controller-issuers-ClusterRole.yaml"
- "0.15/cert-manager-controller-clusterissuers-ClusterRole.yaml"
- "0.15/cert-manager-cainjector-ClusterRoleBinding.yaml"
- "0.15/cert-manager-controller-orders-ClusterRoleBinding.yaml"
- "0.15/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
- "0.15/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
- "0.15/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
- "0.15/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
- "0.15/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
- "0.15/cert-manager-cainjector:leaderelection-Role.yaml"
- "0.15/cert-manager:leaderelection-Role.yaml"
- "0.15/cert-manager-webhook:dynamic-serving-Role.yaml"
- "0.15/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
- "0.15/cert-manager:leaderelection-RoleBinding.yaml"
- "0.15/cert-manager-webhook:dynamic-serving-RoleBinding.yaml"
- "0.15/cert-manager-Service.yaml"
- "0.15/cert-manager-webhook-Service.yaml"
- "0.15/cert-manager-cainjector-Deployment.yaml"
- "0.15/cert-manager-Deployment.yaml"
- "0.15/cert-manager-webhook-Deployment.yaml"
- "0.15/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
- "0.15/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"

7
vars/files_list_csi.yml Normal file
View file

@ -0,0 +1,7 @@
---
certmanager_csi_list:
- "csi/csi.cert-manager.io-CSIDriver.yaml"
- "csi/cert-manager-csi-ServiceAccount.yaml"
- "csi/cert-manager-csi-ClusterRole.yaml"
- "csi/cert-manager-csi-ClusterRoleBinding.yaml"
- "csi/cert-manager-csi-DaemonSet.yaml"

View file

@ -1 +1,2 @@
user: "{{ ansible_user_id }}"
certmanager_upgrade: false