Merge "Removed old v1alpha2 version of CAPI componets"

This commit is contained in:
Zuul 2020-04-28 17:59:40 +00:00 committed by Gerrit Code Review
commit 21dceb20d1
22 changed files with 0 additions and 556 deletions

View File

@ -1,13 +0,0 @@
resources:
- ../../global/crd/baremetal-provider
- rbac
- provider.yaml
- namespace.yaml
commonLabels:
# NOTE We can't use airshipit.org/clustertype
# bacause a label can't consists of multiple values
airshipit.org/ephemeral: "true"
airshipit.org/target: "true"
namespace: capbm

View File

@ -1,4 +0,0 @@
apiVersion: v1
kind: Namespace
metadata:
name: capbm

View File

@ -1,108 +0,0 @@
---
apiVersion: v1
kind: Secret
metadata:
name: capbm-webhook-server-secret
---
apiVersion: v1
kind: Service
metadata:
annotations:
prometheus.io/port: "8443"
prometheus.io/scheme: https
prometheus.io/scrape: "true"
labels:
control-plane: controller-manager
controller-tools.k8s.io: "1.0"
name: capbm-controller-manager-metrics-svc
spec:
ports:
- name: https
port: 8443
targetPort: https
selector:
control-plane: controller-manager
controller-tools.k8s.io: "1.0"
---
apiVersion: v1
kind: Service
metadata:
labels:
control-plane: controller-manager
controller-tools.k8s.io: "1.0"
name: capbm-controller-manager-service
spec:
ports:
- port: 443
selector:
control-plane: controller-manager
controller-tools.k8s.io: "1.0"
---
apiVersion: apps/v1
kind: StatefulSet
metadata:
labels:
control-plane: controller-manager
controller-tools.k8s.io: "1.0"
name: capbm-controller-manager
spec:
selector:
matchLabels:
control-plane: controller-manager
controller-tools.k8s.io: "1.0"
serviceName: capbm-controller-manager-service
template:
metadata:
labels:
control-plane: controller-manager
controller-tools.k8s.io: "1.0"
spec:
containers:
- args:
- --secure-listen-address=0.0.0.0:8443
- --upstream=http://127.0.0.1:8080/
- --logtostderr=true
- --v=10
image: gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
name: kube-rbac-proxy
ports:
- containerPort: 8443
name: https
- args:
- --metrics-addr=127.0.0.1:8080
- --enable-leader-election
command:
- /manager
env:
- name: POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
- name: SECRET_NAME
value: capbm-webhook-server-secret
image: "quay.io/metal3-io/cluster-api-provider-baremetal:v1alpha2"
imagePullPolicy: Always
name: manager
ports:
- containerPort: 9876
name: webhook-server
protocol: TCP
resources:
limits:
cpu: 100m
memory: 30Mi
requests:
cpu: 100m
memory: 20Mi
volumeMounts:
- mountPath: /tmp/cert
name: cert
readOnly: true
terminationGracePeriodSeconds: 10
volumes:
- name: cert
secret:
defaultMode: 420
secretName: capbm-webhook-server-secret

View File

@ -1,32 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: capbm-leader-election-role
rules:
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- list
- watch
- create
- update
- patch
- delete
- apiGroups:
- ""
resources:
- configmaps/status
verbs:
- get
- update
- patch
- apiGroups:
- ""
resources:
- events
verbs:
- create

View File

@ -1,12 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: capbm-leader-election-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: capbm-leader-election-role
subjects:
- kind: ServiceAccount
name: default

View File

@ -1,108 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
name: capbm-manager-role
rules:
- apiGroups:
- ""
resources:
- events
verbs:
- create
- get
- list
- patch
- update
- watch
- apiGroups:
- ""
resources:
- secrets
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- cluster.x-k8s.io
resources:
- clusters
- clusters/status
verbs:
- get
- list
- watch
- apiGroups:
- cluster.x-k8s.io
resources:
- machines
- machines/status
verbs:
- get
- list
- watch
- apiGroups:
- infrastructure.cluster.x-k8s.io
resources:
- baremetalclusters
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- infrastructure.cluster.x-k8s.io
resources:
- baremetalclusters/status
verbs:
- get
- patch
- update
- apiGroups:
- infrastructure.cluster.x-k8s.io
resources:
- baremetalmachines
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- infrastructure.cluster.x-k8s.io
resources:
- baremetalmachines/status
verbs:
- get
- patch
- update
- apiGroups:
- metal3.io
resources:
- baremetalhosts
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- metal3.io
resources:
- baremetalhosts/status
verbs:
- get
- patch
- update

View File

@ -1,14 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
control-plane: capbm-controller-manager
name: capbm-manager-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: capbm-manager-role
subjects:
- kind: ServiceAccount
name: default

View File

@ -1,20 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
labels:
control-plane: capbm-controller-manager
name: capbm-proxy-role
rules:
- apiGroups:
- authentication.k8s.io
resources:
- tokenreviews
verbs:
- create
- apiGroups:
- authorization.k8s.io
resources:
- subjectaccessreviews
verbs:
- create

View File

@ -1,14 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
labels:
control-plane: capbm-controller-manager
name: capbm-proxy-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: capbm-proxy-role
subjects:
- kind: ServiceAccount
name: default

View File

@ -1,7 +0,0 @@
resources:
- capbm-leader-election-rolebinding.yaml
- capbm-leader-election-role.yaml
- capbm-manager-rolebinding.yaml
- capbm-manager-role.yaml
- capbm-proxy-rolebinding.yaml
- capbm-proxy-role.yaml

View File

@ -1,14 +0,0 @@
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- ../../global/crd/cluster-api
- https://github.com/kubernetes-sigs/cluster-api/config/default/?ref=v0.3.2
namePrefix: capi-
patchesJson6902:
- target:
version: v1
kind: Namespace
name: system
path: patch_namespace.yaml

View File

@ -1,3 +0,0 @@
- op: replace
path: "/metadata/name"
value: capi-system

View File

@ -1,13 +0,0 @@
resources:
- ../../global/crd/kubeadm
- rbac
- provider.yaml
- namespace.yaml
commonLabels:
# NOTE We can't use airshipit.org/clustertype
# bacause a label can't consists of multiple values
airshipit.org/ephemeral: "true"
airshipit.org/target: "true"
namespace: capbk

View File

@ -1,4 +0,0 @@
apiVersion: v1
kind: Namespace
metadata:
name: capbk

View File

@ -1,58 +0,0 @@
---
apiVersion: v1
kind: Service
metadata:
annotations:
prometheus.io/port: "8443"
prometheus.io/scheme: https
prometheus.io/scrape: "true"
labels:
control-plane: cabpk-controller-manager
name: cabpk-controller-manager-metrics-service
spec:
ports:
- name: https
port: 8443
targetPort: https
selector:
control-plane: cabpk-controller-manager
---
apiVersion: apps/v1
kind: Deployment
metadata:
labels:
control-plane: cabpk-controller-manager
name: cabpk-controller-manager
spec:
replicas: 1
selector:
matchLabels:
control-plane: cabpk-controller-manager
template:
metadata:
labels:
control-plane: cabpk-controller-manager
spec:
containers:
- args:
- --secure-listen-address=0.0.0.0:8443
- --upstream=http://127.0.0.1:8080/
- --logtostderr=true
- --v=10
image: gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
imagePullPolicy: Always
name: kube-rbac-proxy
ports:
- containerPort: 8443
name: https
- args:
- --metrics-addr=127.0.0.1:8080
- --v=4
- --enable-leader-election
image: gcr.io/k8s-staging-capi-kubeadm/cluster-api-kubeadm-controller:latest
imagePullPolicy: Always
name: manager
terminationGracePeriodSeconds: 10
tolerations:
- effect: NoSchedule
key: node-role.kubernetes.io/master

View File

@ -1,26 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: cabpk-leader-election-role
rules:
- apiGroups:
- ""
resources:
- configmaps
verbs:
- get
- list
- watch
- create
- update
- patch
- delete
- apiGroups:
- ""
resources:
- configmaps/status
verbs:
- get
- update
- patch

View File

@ -1,12 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: cabpk-leader-election-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: cabpk-leader-election-role
subjects:
- kind: ServiceAccount
name: default

View File

@ -1,45 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
creationTimestamp: null
name: cabpk-manager-role
rules:
- apiGroups:
- ""
resources:
- configmaps
- events
- secrets
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- bootstrap.cluster.x-k8s.io
resources:
- kubeadmconfigs
- kubeadmconfigs/status
verbs:
- create
- delete
- get
- list
- patch
- update
- watch
- apiGroups:
- cluster.x-k8s.io
resources:
- clusters
- clusters/status
- machines
- machines/status
verbs:
- get
- list
- watch

View File

@ -1,12 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cabpk-manager-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cabpk-manager-role
subjects:
- kind: ServiceAccount
name: default

View File

@ -1,18 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: cabpk-proxy-role
rules:
- apiGroups:
- authentication.k8s.io
resources:
- tokenreviews
verbs:
- create
- apiGroups:
- authorization.k8s.io
resources:
- subjectaccessreviews
verbs:
- create

View File

@ -1,12 +0,0 @@
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: cabpk-proxy-rolebinding
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: cabpk-proxy-role
subjects:
- kind: ServiceAccount
name: default

View File

@ -1,7 +0,0 @@
resources:
- cabpk-leader-election-rolebinding.yaml
- cabpk-leader-election-role.yaml
- cabpk-manager-rolebinding.yaml
- cabpk-manager-role.yaml
- cabpk-proxy-rolebinding.yaml
- cabpk-proxy-role.yaml