Refactor in progress (deploy and upgrade to 0.13)
Some checks failed
continuous-integration/drone/push Build is failing
Some checks failed
continuous-integration/drone/push Build is failing
This commit is contained in:
parent
acbd41024a
commit
2c98242d0b
18 changed files with 384 additions and 322 deletions
|
|
@ -1,6 +1,6 @@
|
|||
---
|
||||
kind: pipeline
|
||||
type: docker
|
||||
type: kubernetes
|
||||
name: default
|
||||
|
||||
steps:
|
||||
|
|
|
|||
65
TODO.txt
Normal file
65
TODO.txt
Normal file
|
|
@ -0,0 +1,65 @@
|
|||
|
||||
|
||||
TASK [k8s/cert-manager : Install Cert Manager files version 0.12] ***************************************************************************************************************************************************
|
||||
--- before
|
||||
+++ after
|
||||
@@ -1,4 +1,6 @@
|
||||
metadata:
|
||||
+ annotations:
|
||||
+ kubectl.kubernetes.io/last-applied-configuration: '{"apiVersion":"rbac.authorization.k8s.io/v1beta1","kind":"RoleBinding","metadata":{"name":"cert-manager-webhook:webhook-authentication-reader","namespace":"kube-system","labels":{"app":"webhook","app.kubernetes.io/name":"webhook","app.kubernetes.io/instance":"cert-manager","app.kubernetes.io/managed-by":"Tiller","helm.sh/chart":"cert-manager-v0.12.0"}},"roleRef":{"apiGroup":"rbac.authorization.k8s.io","kind":"Role","name":"extension-apiserver-authentication-reader"},"subjects":[{"apiGroup":"","kind":"ServiceAccount","name":"cert-manager-webhook","namespace":"cert-manager"}]}'
|
||||
labels:
|
||||
- helm.sh/chart: cert-manager-v0.13.1
|
||||
- resourceVersion: '347269'
|
||||
+ helm.sh/chart: cert-manager-v0.12.0
|
||||
+ resourceVersion: '360246'
|
||||
|
||||
changed: [kubeibm] => (item=0.12/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml)
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
|
||||
TASK [k8s/cert-manager : Update Cert Manager files to version 0.14] *************************************************************************************************************************************************
|
||||
failed: [kubeibm] (item=0.14/certificates.cert-manager.io-CustomResourceDefinition.yaml) => changed=false
|
||||
ansible_loop_var: item
|
||||
error: 422
|
||||
item: 0.14/certificates.cert-manager.io-CustomResourceDefinition.yaml
|
||||
msg: 'Failed to patch object: b''{"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"CustomResourceDefinition.apiextensions.k8s.io \\"certificates.cert-manager.io\\" is invalid: spec.validation: Forbidden: top-level and per-version schemas are mutually exclusive","reason":"Invalid","details":{"name":"certificates.cert-manager.io","group":"apiextensions.k8s.io","kind":"CustomResourceDefinition","causes":[{"reason":"FieldValueForbidden","message":"Forbidden: top-level and per-version schemas are mutually exclusive","field":"spec.validation"}]},"code":422}\n'''
|
||||
reason: Unprocessable Entity
|
||||
status: 422
|
||||
|
||||
failed: [kubeibm] (item=0.15/certificates.cert-manager.io-CustomResourceDefinition.yaml) => changed=false
|
||||
ansible_loop_var: item
|
||||
error: 422
|
||||
item: 0.15/certificates.cert-manager.io-CustomResourceDefinition.yaml
|
||||
msg: 'Failed to patch object: b''{"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"CustomResourceDefinition.apiextensions.k8s.io \\"certificates.cert-manager.io\\" is invalid: spec.validation: Forbidden: top-level and per-version schemas are mutually exclusive","reason":"Invalid","details":{"name":"certificates.cert-manager.io","group":"apiextensions.k8s.io","kind":"CustomResourceDefinition","causes":[{"reason":"FieldValueForbidden","message":"Forbidden: top-level and per-version schemas are mutually exclusive","field":"spec.validation"}]},"code":422}\n'''
|
||||
reason: Unprocessable Entity
|
||||
status: 422
|
||||
|
||||
|
||||
{
|
||||
"kind":"Status",
|
||||
"apiVersion":"v1",
|
||||
"metadata":{},
|
||||
"status":"Failure",
|
||||
"message":"CustomResourceDefinition.apiextensions.k8s.io \\"certificates.cert-manager.io\\" is invalid: spec.validation: Forbidden: top-level and per-version schemas are mutually exclusive",
|
||||
"reason":"Invalid",
|
||||
"details":{
|
||||
"name":"certificates.cert-manager.io",
|
||||
"group":"apiextensions.k8s.io",
|
||||
"kind":"CustomResourceDefinition",
|
||||
"causes":[
|
||||
{
|
||||
"reason":"FieldValueForbidden",
|
||||
"message":"Forbidden: top-level and per-version schemas are mutually exclusive",
|
||||
"field":"spec.validation"
|
||||
}
|
||||
]
|
||||
},
|
||||
"code":422
|
||||
}
|
||||
|
|
@ -1,5 +1,5 @@
|
|||
#!/bin/bash
|
||||
CERTMANAGER_VERSION=0.15.1
|
||||
CERTMANAGER_VERSION="$(curl --silent "https://api.github.com/repos/jetstack/cert-manager/releases/latest" | jq {"name"} | sed -e '/^{/d' -e '/^}/d' -e 's|.*v\([0-9\.]*\).*|\1|')"
|
||||
CERTMANAGER_SHORTVERSION="$(echo "${CERTMANAGER_VERSION}" | sed 's/^\(.*\)\.[0-9]$/\1/')"
|
||||
wget https://github.com/jetstack/cert-manager/releases/download/v"${CERTMANAGER_VERSION}"/cert-manager.yaml
|
||||
kubernetes-split-yaml cert-manager.yaml > generated.log
|
||||
|
|
@ -7,7 +7,8 @@ if [ -d templates/"${CERTMANAGER_SHORTVERSION}" ]; then
|
|||
rm -fr templates/"${CERTMANAGER_SHORTVERSION}"
|
||||
fi
|
||||
mv generated templates/"${CERTMANAGER_SHORTVERSION}"
|
||||
cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "'${CERTMANAGER_SHORTVERSION}'/\2"|'
|
||||
echo -e "---\ncertmanager_${CERTMANAGER_SHORTVERSION}_list:" > vars/files_list_${CERTMANAGER_SHORTVERSION}.yml
|
||||
cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "'${CERTMANAGER_SHORTVERSION}'/\2"|' >> vars/files_list_${CERTMANAGER_SHORTVERSION}.yml
|
||||
|
||||
sed '/args:/ a\ - --dns01-recursive-nameservers=8.8.8.8:53,1.1.1.1:53' -i templates/"${CERTMANAGER_SHORTVERSION}"/cert-manager-Deployment.yaml
|
||||
rm -f generated.log cert-manager.yaml
|
||||
|
|
|
|||
|
|
@ -7,6 +7,7 @@ if [ -d files/csi ]; then
|
|||
rm -fr files/csi
|
||||
fi
|
||||
mv generated files/csi
|
||||
cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "csi/\2"|'
|
||||
echo -e "---\ncertmanager_csi_list:" > vars/files_list_csi.yml
|
||||
cat generated.log | while read LIGNE; do if [ $(echo "${LIGNE}" | grep -c ^File) -eq 1 ]; then echo -n "${LIGNE} "; else echo "${LIGNE}"; fi; done | grep ^File | sort -V | sed 's|.*\(generated/\)\(.*\.yaml\)| - "csi/\2"|' >> vars/files_list_csi.yml
|
||||
|
||||
rm -f generated.log cert-manager-csi-driver.yaml
|
||||
|
|
|
|||
|
|
@ -1,12 +1,17 @@
|
|||
---
|
||||
- name: CSI Cert Manager Setup
|
||||
block:
|
||||
- set_fact:
|
||||
- name: Include vars for CSI
|
||||
include_vars: "files_list_csi.yml"
|
||||
|
||||
- name: Define state to present
|
||||
set_fact:
|
||||
certmanager_csi_state: "present"
|
||||
when:
|
||||
- certmanager_csi|bool
|
||||
|
||||
- set_fact:
|
||||
- name: Define state to absent
|
||||
set_fact:
|
||||
certmanager_csi_state: "absent"
|
||||
when:
|
||||
- not certmanager_csi|bool
|
||||
|
|
@ -18,11 +23,7 @@
|
|||
merge_type: merge
|
||||
resource_definition: "{{ lookup('file', item) | from_yaml }}"
|
||||
with_items:
|
||||
- "csi/csi.cert-manager.io-CSIDriver.yaml"
|
||||
- "csi/cert-manager-csi-ServiceAccount.yaml"
|
||||
- "csi/cert-manager-csi-ClusterRole.yaml"
|
||||
- "csi/cert-manager-csi-ClusterRoleBinding.yaml"
|
||||
- "csi/cert-manager-csi-DaemonSet.yaml"
|
||||
- '{{ certmanager_csi_list }}'
|
||||
tags:
|
||||
- certmanager
|
||||
- storage
|
||||
|
|
|
|||
|
|
@ -20,34 +20,39 @@
|
|||
register: certmanager_actual_resources
|
||||
|
||||
- name: Retreive actual cert-manager version
|
||||
shell: echo "{{ certmanager_actual_resources.resources }}" | sed -e "s/.*cert-manager-controller:v\([.0-9]*\).*/\1/" -e 's/\([0-9]*\.[0-9]*\)\.[0-9]*/\1/' | uniq
|
||||
shell: >
|
||||
echo "{{ certmanager_actual_resources.resources }}" |
|
||||
sed -e "s/.*cert-manager-controller:v\([.0-9]*\).*/\1/" -e 's/\([0-9]*\.[0-9]*\)\.[0-9]*/\1/' |
|
||||
uniq
|
||||
register: certmanager_actual_version
|
||||
|
||||
- name: install / uninstall version 0.11.0
|
||||
include_tasks: "version_0.11.0.yml"
|
||||
when:
|
||||
- certmanager_version | regex_search('(0.11)') or certmanager_actual_version.stdout | regex_search('(0.11)')
|
||||
- name: Use a short variable name
|
||||
set_fact:
|
||||
certmanager_actual_version: "{{ certmanager_actual_version.stdout }}"
|
||||
certmanager_upgraded: false
|
||||
|
||||
- name: install / uninstall version 0.12
|
||||
include_tasks: "version_0.12.yml"
|
||||
- name: Include upgrade task
|
||||
include_tasks: "upgrade.yml"
|
||||
when:
|
||||
- certmanager_version | regex_search('(0.12)') or certmanager_actual_version.stdout | regex_search('(0.12)')
|
||||
- not certmanager_actual_version == "[]"
|
||||
- not certmanager_version == certmanager_actual_version
|
||||
|
||||
- name: install / uninstall version 0.13
|
||||
include_tasks: "version_0.13.yml"
|
||||
|
||||
- name: Include vars for version {{ certmanager_version }}
|
||||
include_vars: "files_list_{{ certmanager_version }}.yml"
|
||||
|
||||
- name: Install Cert Manager files version {{ certmanager_version }}
|
||||
k8s:
|
||||
state: "present"
|
||||
context: "{{ my_context }}"
|
||||
# merge_type: ['strategic-merge', 'merge']
|
||||
apply: yes
|
||||
force: yes
|
||||
resource_definition: "{{ lookup('template', item) | from_yaml }}"
|
||||
with_items:
|
||||
- "{{ lookup('vars', 'certmanager_' + certmanager_version + '_list') }}"
|
||||
when:
|
||||
- certmanager_version | regex_search('(0.13)') or certmanager_actual_version.stdout | regex_search('(0.13)')
|
||||
|
||||
- name: install / uninstall version 0.14
|
||||
include_tasks: "version_0.14.yml"
|
||||
when:
|
||||
- certmanager_version | regex_search('(0.14)') or certmanager_actual_version.stdout | regex_search('(0.14)')
|
||||
|
||||
- name: install / uninstall version 0.15
|
||||
include_tasks: "version_0.15.yml"
|
||||
when:
|
||||
- certmanager_version | regex_search('(0.15)') or certmanager_actual_version.stdout | regex_search('(0.15)')
|
||||
|
||||
- not certmanager_upgraded|bool
|
||||
tags: certmanager
|
||||
|
||||
|
||||
|
|
|
|||
110
tasks/upgrade.yml
Normal file
110
tasks/upgrade.yml
Normal file
|
|
@ -0,0 +1,110 @@
|
|||
---
|
||||
- name: Enable upgrade mode
|
||||
set_fact:
|
||||
certmanager_need_upgrade: true
|
||||
|
||||
- name: Upgrade version from 0.12 to 0.13
|
||||
block:
|
||||
- name: Update upgrade version to 0.13
|
||||
set_fact:
|
||||
certmanager_upgrade_version: "0.13"
|
||||
- name: Include vars for version 0.13
|
||||
include_vars: "files_list_0.13.yml"
|
||||
- name: Update Cert Manager files to version 0.13
|
||||
k8s:
|
||||
state: "present"
|
||||
context: "{{ my_context }}"
|
||||
apply: yes
|
||||
force: yes
|
||||
resource_definition: "{{ lookup('template', item) | from_yaml }}"
|
||||
with_items:
|
||||
- "{{ lookup('vars', 'certmanager_' + certmanager_upgrade_version + '_list') }}"
|
||||
- name: Update actual version to 0.13
|
||||
set_fact:
|
||||
certmanager_actual_version: "0.13"
|
||||
when:
|
||||
- certmanager_actual_version == "0.12"
|
||||
- certmanager_need_upgrade|bool
|
||||
|
||||
- name: Disable upgrade mode
|
||||
set_fact:
|
||||
certmanager_need_upgrade: false
|
||||
certmanager_upgraded: true
|
||||
when:
|
||||
- certmanager_version == certmanager_actual_version
|
||||
|
||||
- name: Upgrade version from 0.13 to 0.14
|
||||
block:
|
||||
- name: Update upgrade version to 0.14
|
||||
set_fact:
|
||||
certmanager_upgrade_version: "0.14"
|
||||
- name: Include vars for version 0.14
|
||||
include_vars: "files_list_0.14.yml"
|
||||
- name: Remove old existing object
|
||||
k8s:
|
||||
context: "{{ my_context }}"
|
||||
state: absent
|
||||
api_version: '{{ item.apiversion }}'
|
||||
kind: '{{ item.type }}'
|
||||
namespace: cert-manager
|
||||
name: '{{ item.name }}'
|
||||
with_items:
|
||||
- { type: "Deployment", name: "cert-manager", apiversion: "apps/v1" }
|
||||
- { type: "Deployment", name: "cert-manager-cainjector", apiversion: "apps/v1" }
|
||||
- { type: "Deployment", name: "cert-manager-webhook", apiversion: "apps/v1" }
|
||||
# - { type: "ClusterRoleBinding", name: "cert-manager-webhook:auth-delegator", apiversion: "rbac.authorization.k8s.io/v1" }
|
||||
# - { type: "RoleBinding", name: "cert-manager-webhook:webhook-authentication-reader", apiversion: "rbac.authorization.k8s.io/v1beta1" }
|
||||
# - { type: "ClusterRole", name: "cert-manager-webhook:webhook-requester", apiversion: "rbac.authorization.k8s.io/v1" }
|
||||
## - { type: "CustomResourceDefinition", name: "certificates.cert-manager.io", apiversion: "apiextensions.k8s.io/v1" }
|
||||
- name: Update Cert Manager files to version 0.14
|
||||
k8s:
|
||||
state: "present"
|
||||
context: "{{ my_context }}"
|
||||
apply: yes
|
||||
force: yes
|
||||
resource_definition: "{{ lookup('template', item) | from_yaml }}"
|
||||
with_items:
|
||||
- "{{ lookup('vars', 'certmanager_' + certmanager_upgrade_version + '_list') }}"
|
||||
- name: Update actual version to 0.14
|
||||
set_fact:
|
||||
certmanager_actual_version: "0.14"
|
||||
when:
|
||||
- certmanager_actual_version == "0.13"
|
||||
- certmanager_need_upgrade|bool
|
||||
|
||||
- name: Disable upgrade mode
|
||||
set_fact:
|
||||
certmanager_upgrade: false
|
||||
certmanager_upgraded: true
|
||||
when:
|
||||
- certmanager_version == certmanager_actual_version
|
||||
|
||||
- name: Upgrade version from 0.14 to 0.15
|
||||
block:
|
||||
- name: Update upgrade version to 0.15
|
||||
set_fact:
|
||||
certmanager_upgrade_version: "0.15"
|
||||
- name: Include vars for version 0.15
|
||||
include_vars: "files_list_0.15.yml"
|
||||
- name: Update Cert Manager files to version 0.15
|
||||
k8s:
|
||||
state: "present"
|
||||
context: "{{ my_context }}"
|
||||
apply: yes
|
||||
force: yes
|
||||
resource_definition: "{{ lookup('template', item) | from_yaml }}"
|
||||
with_items:
|
||||
- "{{ lookup('vars', 'certmanager_' + certmanager_upgrade_version + '_list') }}"
|
||||
- name: Update actual version to 0.15
|
||||
set_fact:
|
||||
certmanager_actual_version: "0.15"
|
||||
when:
|
||||
- certmanager_actual_version == "0.14"
|
||||
- certmanager_need_upgrade|bool
|
||||
|
||||
- name: Disable upgrade mode
|
||||
set_fact:
|
||||
certmanager_need_upgrade: false
|
||||
certmanager_upgraded: true
|
||||
when:
|
||||
- certmanager_version == certmanager_actual_version
|
||||
|
|
@ -1,60 +0,0 @@
|
|||
---
|
||||
- set_fact:
|
||||
certmanager_0_11_0_state: "present"
|
||||
when:
|
||||
- certmanager_version | regex_search('(0.11)')
|
||||
|
||||
- set_fact:
|
||||
certmanager_0_11_0_state: "absent"
|
||||
when:
|
||||
- not certmanager_version | regex_search('(0.11)')
|
||||
|
||||
- name: Cert Manager files
|
||||
k8s:
|
||||
state: "{{ certmanager_0_11_0_state }}"
|
||||
context: "{{ my_context }}"
|
||||
merge_type: merge
|
||||
resource_definition: "{{ lookup('template', item) | from_yaml }}"
|
||||
with_items:
|
||||
- "0.11.0/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.11.0/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.11.0/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.11.0/certificates.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.11.0/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.11.0/issuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
# - "0.11.0/cert-manager-Namespace.yaml"
|
||||
- "0.11.0/cert-manager-cainjector-ServiceAccount.yaml"
|
||||
- "0.11.0/cert-manager-ServiceAccount.yaml"
|
||||
- "0.11.0/cert-manager-webhook-ServiceAccount.yaml"
|
||||
- "0.11.0/cert-manager-cainjector-ClusterRole.yaml"
|
||||
- "0.11.0/cert-manager-cainjector-ClusterRoleBinding.yaml"
|
||||
- "0.11.0/cert-manager-cainjector:leaderelection-Role.yaml"
|
||||
- "0.11.0/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
|
||||
- "0.11.0/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml"
|
||||
- "0.11.0/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml"
|
||||
- "0.11.0/cert-manager-webhook:webhook-requester-ClusterRole.yaml"
|
||||
- "0.11.0/cert-manager:leaderelection-Role.yaml"
|
||||
- "0.11.0/cert-manager:leaderelection-RoleBinding.yaml"
|
||||
- "0.11.0/cert-manager-controller-issuers-ClusterRole.yaml"
|
||||
- "0.11.0/cert-manager-controller-clusterissuers-ClusterRole.yaml"
|
||||
- "0.11.0/cert-manager-controller-certificates-ClusterRole.yaml"
|
||||
- "0.11.0/cert-manager-controller-orders-ClusterRole.yaml"
|
||||
- "0.11.0/cert-manager-controller-challenges-ClusterRole.yaml"
|
||||
- "0.11.0/cert-manager-controller-ingress-shim-ClusterRole.yaml"
|
||||
- "0.11.0/cert-manager-leaderelection-ClusterRoleBinding.yaml"
|
||||
- "0.11.0/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
|
||||
- "0.11.0/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
|
||||
- "0.11.0/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
|
||||
- "0.11.0/cert-manager-controller-orders-ClusterRoleBinding.yaml"
|
||||
- "0.11.0/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
|
||||
- "0.11.0/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
|
||||
- "0.11.0/cert-manager-view-ClusterRole.yaml"
|
||||
- "0.11.0/cert-manager-edit-ClusterRole.yaml"
|
||||
- "0.11.0/cert-manager-Service.yaml"
|
||||
- "0.11.0/cert-manager-webhook-Service.yaml"
|
||||
- "0.11.0/cert-manager-cainjector-Deployment.yaml"
|
||||
- "0.11.0/cert-manager-Deployment.yaml"
|
||||
- "0.11.0/cert-manager-webhook-Deployment.yaml"
|
||||
- "0.11.0/v1beta1.webhook.cert-manager.io-APIService.yaml"
|
||||
- "0.11.0/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
|
||||
- "0.11.0/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"
|
||||
|
|
@ -1,58 +0,0 @@
|
|||
---
|
||||
- set_fact:
|
||||
certmanager_0_12_state: "present"
|
||||
when:
|
||||
- certmanager_version | regex_search('(0.12)')
|
||||
|
||||
- set_fact:
|
||||
certmanager_0_12_state: "absent"
|
||||
when:
|
||||
- not certmanager_version | regex_search('(0.12)')
|
||||
|
||||
- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_12_state }}
|
||||
k8s:
|
||||
state: "{{ certmanager_0_12_state }}"
|
||||
context: "{{ my_context }}"
|
||||
merge_type: merge
|
||||
resource_definition: "{{ lookup('template', item) | from_yaml }}"
|
||||
with_items:
|
||||
- "0.12/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.12/certificates.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.12/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.12/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.12/issuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.12/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
# - "0.12/cert-manager-Namespace.yaml"
|
||||
- "0.12/cert-manager-cainjector-ServiceAccount.yaml"
|
||||
- "0.12/cert-manager-ServiceAccount.yaml"
|
||||
- "0.12/cert-manager-webhook-ServiceAccount.yaml"
|
||||
- "0.12/cert-manager-cainjector-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-cainjector-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-cainjector:leaderelection-Role.yaml"
|
||||
- "0.12/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
|
||||
- "0.12/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml"
|
||||
- "0.12/cert-manager-webhook:webhook-requester-ClusterRole.yaml"
|
||||
- "0.12/cert-manager:leaderelection-Role.yaml"
|
||||
- "0.12/cert-manager:leaderelection-RoleBinding.yaml"
|
||||
- "0.12/cert-manager-controller-issuers-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-controller-clusterissuers-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-controller-certificates-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-controller-orders-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-controller-challenges-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-controller-ingress-shim-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-controller-orders-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-view-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-edit-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-Service.yaml"
|
||||
- "0.12/cert-manager-webhook-Service.yaml"
|
||||
- "0.12/cert-manager-cainjector-Deployment.yaml"
|
||||
- "0.12/cert-manager-Deployment.yaml"
|
||||
- "0.12/cert-manager-webhook-Deployment.yaml"
|
||||
- "0.12/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
|
||||
- "0.12/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"
|
||||
|
|
@ -1,58 +0,0 @@
|
|||
---
|
||||
- set_fact:
|
||||
certmanager_0_13_state: "present"
|
||||
when:
|
||||
- certmanager_version | regex_search('(0.13)')
|
||||
|
||||
- set_fact:
|
||||
certmanager_0_13_state: "absent"
|
||||
when:
|
||||
- not certmanager_version | regex_search('(0.13)')
|
||||
|
||||
- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_13_state }}
|
||||
k8s:
|
||||
state: "{{ certmanager_0_13_state }}"
|
||||
context: "{{ my_context }}"
|
||||
merge_type: merge
|
||||
resource_definition: "{{ lookup('template', item) | from_yaml }}"
|
||||
with_items:
|
||||
- "0.13/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.13/certificates.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.13/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.13/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.13/issuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.13/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
# - "0.13/cert-manager-Namespace.yaml"
|
||||
- "0.13/cert-manager-cainjector-ServiceAccount.yaml"
|
||||
- "0.13/cert-manager-ServiceAccount.yaml"
|
||||
- "0.13/cert-manager-webhook-ServiceAccount.yaml"
|
||||
- "0.13/cert-manager-cainjector-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-cainjector-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-cainjector:leaderelection-Role.yaml"
|
||||
- "0.13/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
|
||||
- "0.13/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml"
|
||||
- "0.13/cert-manager-webhook:webhook-requester-ClusterRole.yaml"
|
||||
- "0.13/cert-manager:leaderelection-Role.yaml"
|
||||
- "0.13/cert-manager:leaderelection-RoleBinding.yaml"
|
||||
- "0.13/cert-manager-controller-issuers-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-controller-clusterissuers-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-controller-certificates-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-controller-orders-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-controller-challenges-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-controller-ingress-shim-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-controller-orders-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-view-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-edit-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-Service.yaml"
|
||||
- "0.13/cert-manager-webhook-Service.yaml"
|
||||
- "0.13/cert-manager-cainjector-Deployment.yaml"
|
||||
- "0.13/cert-manager-Deployment.yaml"
|
||||
- "0.13/cert-manager-webhook-Deployment.yaml"
|
||||
- "0.13/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
|
||||
- "0.13/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"
|
||||
|
|
@ -1,55 +0,0 @@
|
|||
---
|
||||
- set_fact:
|
||||
certmanager_0_14_state: "present"
|
||||
when:
|
||||
- certmanager_version | regex_search('(0.14)')
|
||||
|
||||
- set_fact:
|
||||
certmanager_0_14_state: "absent"
|
||||
when:
|
||||
- not certmanager_version | regex_search('(0.14)')
|
||||
|
||||
- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_14_state }}
|
||||
k8s:
|
||||
state: "{{ certmanager_0_14_state }}"
|
||||
context: "{{ my_context }}"
|
||||
merge_type: merge
|
||||
resource_definition: "{{ lookup('template', item) | from_yaml }}"
|
||||
with_items:
|
||||
- "0.14/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.14/certificates.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.14/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.14/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.14/issuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.14/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.14/cert-manager-Namespace.yaml"
|
||||
- "0.14/cert-manager-cainjector-ServiceAccount.yaml"
|
||||
- "0.14/cert-manager-ServiceAccount.yaml"
|
||||
- "0.14/cert-manager-webhook-ServiceAccount.yaml"
|
||||
- "0.14/cert-manager-cainjector-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-controller-certificates-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-controller-issuers-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-view-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-controller-orders-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-controller-challenges-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-controller-ingress-shim-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-controller-clusterissuers-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-edit-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-cainjector-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-controller-orders-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-cainjector:leaderelection-Role.yaml"
|
||||
- "0.14/cert-manager:leaderelection-Role.yaml"
|
||||
- "0.14/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
|
||||
- "0.14/cert-manager:leaderelection-RoleBinding.yaml"
|
||||
- "0.14/cert-manager-Service.yaml"
|
||||
- "0.14/cert-manager-webhook-Service.yaml"
|
||||
- "0.14/cert-manager-cainjector-Deployment.yaml"
|
||||
- "0.14/cert-manager-Deployment.yaml"
|
||||
- "0.14/cert-manager-webhook-Deployment.yaml"
|
||||
- "0.14/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
|
||||
- "0.14/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"
|
||||
|
|
@ -1,58 +0,0 @@
|
|||
---
|
||||
- set_fact:
|
||||
certmanager_0_15_state: "present"
|
||||
when:
|
||||
- certmanager_version | regex_search('(0.15)')
|
||||
|
||||
- set_fact:
|
||||
certmanager_0_15_state: "absent"
|
||||
when:
|
||||
- not certmanager_version | regex_search('(0.15)')
|
||||
|
||||
- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_15_state }}
|
||||
k8s:
|
||||
state: "{{ certmanager_0_15_state }}"
|
||||
context: "{{ my_context }}"
|
||||
merge_type: merge
|
||||
resource_definition: "{{ lookup('template', item) | from_yaml }}"
|
||||
with_items:
|
||||
- "0.15/issuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.15/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.15/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.15/certificates.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.15/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.15/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.15/cert-manager-Namespace.yaml"
|
||||
- "0.15/cert-manager-cainjector-ServiceAccount.yaml"
|
||||
- "0.15/cert-manager-ServiceAccount.yaml"
|
||||
- "0.15/cert-manager-webhook-ServiceAccount.yaml"
|
||||
- "0.15/cert-manager-cainjector-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-controller-orders-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-controller-challenges-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-edit-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-controller-ingress-shim-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-view-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-controller-certificates-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-controller-issuers-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-controller-clusterissuers-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-cainjector-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-controller-orders-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-cainjector:leaderelection-Role.yaml"
|
||||
- "0.15/cert-manager:leaderelection-Role.yaml"
|
||||
- "0.15/cert-manager-webhook:dynamic-serving-Role.yaml"
|
||||
- "0.15/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
|
||||
- "0.15/cert-manager:leaderelection-RoleBinding.yaml"
|
||||
- "0.15/cert-manager-webhook:dynamic-serving-RoleBinding.yaml"
|
||||
- "0.15/cert-manager-Service.yaml"
|
||||
- "0.15/cert-manager-webhook-Service.yaml"
|
||||
- "0.15/cert-manager-cainjector-Deployment.yaml"
|
||||
- "0.15/cert-manager-Deployment.yaml"
|
||||
- "0.15/cert-manager-webhook-Deployment.yaml"
|
||||
- "0.15/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
|
||||
- "0.15/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"
|
||||
|
||||
41
vars/files_list_0.12.yml
Normal file
41
vars/files_list_0.12.yml
Normal file
|
|
@ -0,0 +1,41 @@
|
|||
certmanager_0.12_list:
|
||||
- "0.12/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.12/certificates.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.12/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.12/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.12/issuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.12/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
# - "0.12/cert-manager-Namespace.yaml"
|
||||
- "0.12/cert-manager-cainjector-ServiceAccount.yaml"
|
||||
- "0.12/cert-manager-ServiceAccount.yaml"
|
||||
- "0.12/cert-manager-webhook-ServiceAccount.yaml"
|
||||
- "0.12/cert-manager-cainjector-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-cainjector-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-cainjector:leaderelection-Role.yaml"
|
||||
- "0.12/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
|
||||
- "0.12/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml"
|
||||
- "0.12/cert-manager-webhook:webhook-requester-ClusterRole.yaml"
|
||||
- "0.12/cert-manager:leaderelection-Role.yaml"
|
||||
- "0.12/cert-manager:leaderelection-RoleBinding.yaml"
|
||||
- "0.12/cert-manager-controller-issuers-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-controller-clusterissuers-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-controller-certificates-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-controller-orders-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-controller-challenges-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-controller-ingress-shim-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-controller-orders-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
|
||||
- "0.12/cert-manager-view-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-edit-ClusterRole.yaml"
|
||||
- "0.12/cert-manager-Service.yaml"
|
||||
- "0.12/cert-manager-webhook-Service.yaml"
|
||||
- "0.12/cert-manager-cainjector-Deployment.yaml"
|
||||
- "0.12/cert-manager-Deployment.yaml"
|
||||
- "0.12/cert-manager-webhook-Deployment.yaml"
|
||||
- "0.12/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
|
||||
- "0.12/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"
|
||||
41
vars/files_list_0.13.yml
Normal file
41
vars/files_list_0.13.yml
Normal file
|
|
@ -0,0 +1,41 @@
|
|||
certmanager_0.13_list:
|
||||
- "0.13/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.13/certificates.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.13/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.13/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.13/issuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.13/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
# - "0.13/cert-manager-Namespace.yaml"
|
||||
- "0.13/cert-manager-cainjector-ServiceAccount.yaml"
|
||||
- "0.13/cert-manager-ServiceAccount.yaml"
|
||||
- "0.13/cert-manager-webhook-ServiceAccount.yaml"
|
||||
- "0.13/cert-manager-cainjector-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-cainjector-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-cainjector:leaderelection-Role.yaml"
|
||||
- "0.13/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
|
||||
- "0.13/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml"
|
||||
- "0.13/cert-manager-webhook:webhook-requester-ClusterRole.yaml"
|
||||
- "0.13/cert-manager:leaderelection-Role.yaml"
|
||||
- "0.13/cert-manager:leaderelection-RoleBinding.yaml"
|
||||
- "0.13/cert-manager-controller-issuers-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-controller-clusterissuers-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-controller-certificates-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-controller-orders-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-controller-challenges-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-controller-ingress-shim-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-controller-orders-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
|
||||
- "0.13/cert-manager-view-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-edit-ClusterRole.yaml"
|
||||
- "0.13/cert-manager-Service.yaml"
|
||||
- "0.13/cert-manager-webhook-Service.yaml"
|
||||
- "0.13/cert-manager-cainjector-Deployment.yaml"
|
||||
- "0.13/cert-manager-Deployment.yaml"
|
||||
- "0.13/cert-manager-webhook-Deployment.yaml"
|
||||
- "0.13/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
|
||||
- "0.13/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"
|
||||
38
vars/files_list_0.14.yml
Normal file
38
vars/files_list_0.14.yml
Normal file
|
|
@ -0,0 +1,38 @@
|
|||
certmanager_0.14_list:
|
||||
- "0.14/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.14/certificates.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.14/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.14/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.14/issuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.14/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.14/cert-manager-Namespace.yaml"
|
||||
- "0.14/cert-manager-cainjector-ServiceAccount.yaml"
|
||||
- "0.14/cert-manager-ServiceAccount.yaml"
|
||||
- "0.14/cert-manager-webhook-ServiceAccount.yaml"
|
||||
- "0.14/cert-manager-cainjector-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-controller-certificates-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-controller-issuers-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-view-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-controller-orders-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-controller-challenges-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-controller-ingress-shim-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-controller-clusterissuers-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-edit-ClusterRole.yaml"
|
||||
- "0.14/cert-manager-cainjector-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-controller-orders-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
|
||||
- "0.14/cert-manager-cainjector:leaderelection-Role.yaml"
|
||||
- "0.14/cert-manager:leaderelection-Role.yaml"
|
||||
- "0.14/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
|
||||
- "0.14/cert-manager:leaderelection-RoleBinding.yaml"
|
||||
- "0.14/cert-manager-Service.yaml"
|
||||
- "0.14/cert-manager-webhook-Service.yaml"
|
||||
- "0.14/cert-manager-cainjector-Deployment.yaml"
|
||||
- "0.14/cert-manager-Deployment.yaml"
|
||||
- "0.14/cert-manager-webhook-Deployment.yaml"
|
||||
- "0.14/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
|
||||
- "0.14/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"
|
||||
40
vars/files_list_0.15.yml
Normal file
40
vars/files_list_0.15.yml
Normal file
|
|
@ -0,0 +1,40 @@
|
|||
certmanager_0.15_list:
|
||||
- "0.15/issuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.15/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.15/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.15/certificates.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.15/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.15/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
|
||||
- "0.15/cert-manager-Namespace.yaml"
|
||||
- "0.15/cert-manager-cainjector-ServiceAccount.yaml"
|
||||
- "0.15/cert-manager-ServiceAccount.yaml"
|
||||
- "0.15/cert-manager-webhook-ServiceAccount.yaml"
|
||||
- "0.15/cert-manager-cainjector-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-controller-orders-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-controller-challenges-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-edit-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-controller-ingress-shim-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-view-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-controller-certificates-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-controller-issuers-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-controller-clusterissuers-ClusterRole.yaml"
|
||||
- "0.15/cert-manager-cainjector-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-controller-orders-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
|
||||
- "0.15/cert-manager-cainjector:leaderelection-Role.yaml"
|
||||
- "0.15/cert-manager:leaderelection-Role.yaml"
|
||||
- "0.15/cert-manager-webhook:dynamic-serving-Role.yaml"
|
||||
- "0.15/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
|
||||
- "0.15/cert-manager:leaderelection-RoleBinding.yaml"
|
||||
- "0.15/cert-manager-webhook:dynamic-serving-RoleBinding.yaml"
|
||||
- "0.15/cert-manager-Service.yaml"
|
||||
- "0.15/cert-manager-webhook-Service.yaml"
|
||||
- "0.15/cert-manager-cainjector-Deployment.yaml"
|
||||
- "0.15/cert-manager-Deployment.yaml"
|
||||
- "0.15/cert-manager-webhook-Deployment.yaml"
|
||||
- "0.15/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
|
||||
- "0.15/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"
|
||||
7
vars/files_list_csi.yml
Normal file
7
vars/files_list_csi.yml
Normal file
|
|
@ -0,0 +1,7 @@
|
|||
---
|
||||
certmanager_csi_list:
|
||||
- "csi/csi.cert-manager.io-CSIDriver.yaml"
|
||||
- "csi/cert-manager-csi-ServiceAccount.yaml"
|
||||
- "csi/cert-manager-csi-ClusterRole.yaml"
|
||||
- "csi/cert-manager-csi-ClusterRoleBinding.yaml"
|
||||
- "csi/cert-manager-csi-DaemonSet.yaml"
|
||||
|
|
@ -1 +1,2 @@
|
|||
user: "{{ ansible_user_id }}"
|
||||
certmanager_upgrade: false
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue