Add version 0.12 and 0.13

This commit is contained in:
Adrien Reslinger 2020-02-20 09:06:20 +01:00
parent 202b4c9dc4
commit 75ec6fbf8e
88 changed files with 25844 additions and 5 deletions

View file

@ -14,9 +14,35 @@
kind: Namespace
tags: certmanager
- name: Get Deployment information object
k8s_info:
context: "{{ my_context }}"
api_version: v1
kind: Deployment
name: cert-manager
namespace: cert-manager
field_selectors:
- spec.template.spec.containers.image
register: certmanager_actual_resources
- name: Retreive actual cert-manager version
shell: echo "{{ certmanager_actual_resources.resources }}" | sed -e "s/.*cert-manager-controller:v\([.0-9]*\).*/\1/" -e 's/\([0-9]*\.[0-9]*\)\.[0-9]*/\1/' | uniq
register: certmanager_actual_version
- name: install / uninstall version 0.11.0
include_tasks: "version_0.11.0.yml"
when:
- certmanager_version == "0.11.0"
# - certmanager_version == 0.11.0 or certmanager_actual_version.stdout == 0.11.0
- certmanager_version | regex_search('(0.11)') or certmanager_actual_version.stdout | regex_search('(0.11)')
tags: certmanager
- name: install / uninstall version 0.12
include_tasks: "version_0.12.yml"
when:
- certmanager_version | regex_search('(0.12)') or certmanager_actual_version.stdout | regex_search('(0.12)')
tags: certmanager
- name: install / uninstall version 0.13
include_tasks: "version_0.13.yml"
when:
- certmanager_version | regex_search('(0.13)') or certmanager_actual_version.stdout | regex_search('(0.13)')
tags: certmanager

View file

@ -2,12 +2,12 @@
- set_fact:
certmanager_0_11_0_state: "present"
when:
- certmanager_version == "0.11.0"
- certmanager_version | regex_search('(0.11)')
- set_fact:
certmanager_0_11_0_state: "absent"
when:
- certmanager_version != "0.11.0"
- not certmanager_version | regex_search('(0.11)')
- name: Cert Manager files
k8s:

57
tasks/version_0.12.yml Normal file
View file

@ -0,0 +1,57 @@
---
- set_fact:
certmanager_0_12_state: "present"
when:
- certmanager_version | regex_search('(0.12)')
- set_fact:
certmanager_0_12_state: "absent"
when:
- not certmanager_version | regex_search('(0.12)')
- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_12_state }}
k8s:
state: "{{ certmanager_0_12_state }}"
context: "{{ my_context }}"
resource_definition: "{{ lookup('template', item) | from_yaml }}"
with_items:
- "0.12/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/certificates.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/issuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.12/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
# - "0.12/cert-manager-Namespace.yaml"
- "0.12/cert-manager-cainjector-ServiceAccount.yaml"
- "0.12/cert-manager-ServiceAccount.yaml"
- "0.12/cert-manager-webhook-ServiceAccount.yaml"
- "0.12/cert-manager-cainjector-ClusterRole.yaml"
- "0.12/cert-manager-cainjector-ClusterRoleBinding.yaml"
- "0.12/cert-manager-cainjector:leaderelection-Role.yaml"
- "0.12/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
- "0.12/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml"
- "0.12/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml"
- "0.12/cert-manager-webhook:webhook-requester-ClusterRole.yaml"
- "0.12/cert-manager:leaderelection-Role.yaml"
- "0.12/cert-manager:leaderelection-RoleBinding.yaml"
- "0.12/cert-manager-controller-issuers-ClusterRole.yaml"
- "0.12/cert-manager-controller-clusterissuers-ClusterRole.yaml"
- "0.12/cert-manager-controller-certificates-ClusterRole.yaml"
- "0.12/cert-manager-controller-orders-ClusterRole.yaml"
- "0.12/cert-manager-controller-challenges-ClusterRole.yaml"
- "0.12/cert-manager-controller-ingress-shim-ClusterRole.yaml"
- "0.12/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-orders-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
- "0.12/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
- "0.12/cert-manager-view-ClusterRole.yaml"
- "0.12/cert-manager-edit-ClusterRole.yaml"
- "0.12/cert-manager-Service.yaml"
- "0.12/cert-manager-webhook-Service.yaml"
- "0.12/cert-manager-cainjector-Deployment.yaml"
- "0.12/cert-manager-Deployment.yaml"
- "0.12/cert-manager-webhook-Deployment.yaml"
- "0.12/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
- "0.12/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"

57
tasks/version_0.13.yml Normal file
View file

@ -0,0 +1,57 @@
---
- set_fact:
certmanager_0_13_state: "present"
when:
- certmanager_version | regex_search('(0.13)')
- set_fact:
certmanager_0_13_state: "absent"
when:
- not certmanager_version | regex_search('(0.13)')
- name: Cert Manager files version {{ certmanager_version }} need to be {{ certmanager_0_13_state }}
k8s:
state: "{{ certmanager_0_13_state }}"
context: "{{ my_context }}"
resource_definition: "{{ lookup('template', item) | from_yaml }}"
with_items:
- "0.13/certificaterequests.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/certificates.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/challenges.acme.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/clusterissuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/issuers.cert-manager.io-CustomResourceDefinition.yaml"
- "0.13/orders.acme.cert-manager.io-CustomResourceDefinition.yaml"
# - "0.13/cert-manager-Namespace.yaml"
- "0.13/cert-manager-cainjector-ServiceAccount.yaml"
- "0.13/cert-manager-ServiceAccount.yaml"
- "0.13/cert-manager-webhook-ServiceAccount.yaml"
- "0.13/cert-manager-cainjector-ClusterRole.yaml"
- "0.13/cert-manager-cainjector-ClusterRoleBinding.yaml"
- "0.13/cert-manager-cainjector:leaderelection-Role.yaml"
- "0.13/cert-manager-cainjector:leaderelection-RoleBinding.yaml"
- "0.13/cert-manager-webhook:auth-delegator-ClusterRoleBinding.yaml"
- "0.13/cert-manager-webhook:webhook-authentication-reader-RoleBinding.yaml"
- "0.13/cert-manager-webhook:webhook-requester-ClusterRole.yaml"
- "0.13/cert-manager:leaderelection-Role.yaml"
- "0.13/cert-manager:leaderelection-RoleBinding.yaml"
- "0.13/cert-manager-controller-issuers-ClusterRole.yaml"
- "0.13/cert-manager-controller-clusterissuers-ClusterRole.yaml"
- "0.13/cert-manager-controller-certificates-ClusterRole.yaml"
- "0.13/cert-manager-controller-orders-ClusterRole.yaml"
- "0.13/cert-manager-controller-challenges-ClusterRole.yaml"
- "0.13/cert-manager-controller-ingress-shim-ClusterRole.yaml"
- "0.13/cert-manager-controller-issuers-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-clusterissuers-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-certificates-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-orders-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-challenges-ClusterRoleBinding.yaml"
- "0.13/cert-manager-controller-ingress-shim-ClusterRoleBinding.yaml"
- "0.13/cert-manager-view-ClusterRole.yaml"
- "0.13/cert-manager-edit-ClusterRole.yaml"
- "0.13/cert-manager-Service.yaml"
- "0.13/cert-manager-webhook-Service.yaml"
- "0.13/cert-manager-cainjector-Deployment.yaml"
- "0.13/cert-manager-Deployment.yaml"
- "0.13/cert-manager-webhook-Deployment.yaml"
- "0.13/cert-manager-webhook-MutatingWebhookConfiguration.yaml"
- "0.13/cert-manager-webhook-ValidatingWebhookConfiguration.yaml"