Merge "Integrate openstack provider(capo) with airshipctl"
This commit is contained in:
commit
3866d358b8
BIN
docs/source/img/openstack-machines.png
Normal file
BIN
docs/source/img/openstack-machines.png
Normal file
Binary file not shown.
After Width: | Height: | Size: 141 KiB |
@ -33,6 +33,7 @@ Welcome to airshipctl's Documentation!
|
|||||||
hardware_profile
|
hardware_profile
|
||||||
Commands <cli/airshipctl>
|
Commands <cli/airshipctl>
|
||||||
providers/cluster_api_docker
|
providers/cluster_api_docker
|
||||||
|
providers/cluster_api_openstack
|
||||||
|
|
||||||
.. toctree::
|
.. toctree::
|
||||||
:caption: Airship Project Documentation
|
:caption: Airship Project Documentation
|
||||||
|
827
docs/source/providers/cluster_api_openstack.md
Executable file
827
docs/source/providers/cluster_api_openstack.md
Executable file
@ -0,0 +1,827 @@
|
|||||||
|
# Airshipctl integration with Cluster API Openstack
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
This document provides instructions on the usage of airshipctl, to perform the
|
||||||
|
following operations with openstack as infrastructure provider:
|
||||||
|
|
||||||
|
- Initialize the management cluster with cluster api, and cluster api openstack
|
||||||
|
provider components
|
||||||
|
- Create a target workload cluster with controlplane and worker machines on an openstack
|
||||||
|
cloud environment
|
||||||
|
|
||||||
|
## Workflow
|
||||||
|
|
||||||
|
A simple workflow that can be tested involves the following operations:
|
||||||
|
|
||||||
|
Initialize a management cluster with cluster api and openstack provider
|
||||||
|
components:
|
||||||
|
|
||||||
|
*`$ airshipctl cluster init`* or *`$ airshipctl cluster init --debug`*
|
||||||
|
|
||||||
|
Create a target workload cluster with control plane and worker nodes:
|
||||||
|
|
||||||
|
*`$ airshipctl phase apply controlplane`*
|
||||||
|
|
||||||
|
*`$ airshipctl phase apply workers`*
|
||||||
|
|
||||||
|
Note: `airshipctl phase apply initinfra` is not used because all the provider
|
||||||
|
components are initialized using `airshipctl cluster init`.
|
||||||
|
|
||||||
|
## Common Prerequisite
|
||||||
|
|
||||||
|
- Install [Docker](https://www.docker.com/)
|
||||||
|
- Install and setup [kubectl](https://kubernetes.io/docs/tasks/tools/install-kubectl/)
|
||||||
|
- Install [Kind](https://kind.sigs.k8s.io/)
|
||||||
|
- Install [Kustomize](https://kubernetes-sigs.github.io/kustomize/installation/binaries/)
|
||||||
|
- Install [Airshipctl](https://docs.airshipit.org/airshipctl/developers.html)
|
||||||
|
|
||||||
|
## Openstack Prerequisites
|
||||||
|
|
||||||
|
### Credentials
|
||||||
|
|
||||||
|
In order to comunicate with openstack cloud environment, following set of credentials are
|
||||||
|
needed to be generated.
|
||||||
|
|
||||||
|
The [env.rc](<https://github.com/kubernetes-sigs/cluster-api-provider-openstack/blob/master/docs/env.rc>) script
|
||||||
|
sets the required environment variables related to credentials.
|
||||||
|
|
||||||
|
`source env.rc <path/to/clouds.yaml> <cloud>`
|
||||||
|
|
||||||
|
The following variables are set.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
OPENSTACK_CLOUD: The cloud name which is used as second argument in the command above
|
||||||
|
OPENSTACK_CLOUD_YAML_B64: The secret used by capo to access OpenStack cloud
|
||||||
|
OPENSTACK_CLOUD_PROVIDER_CONF_B64: The content of cloud.conf used by OpenStack cloud
|
||||||
|
OPENSTACK_CLOUD_CACERT_B64: (Optional) The content of custom CA file which can be specified in the clouds.yaml
|
||||||
|
```
|
||||||
|
|
||||||
|
### SSH key pair
|
||||||
|
|
||||||
|
An ssh key-pair must be specified by setting the `OPENSTACK_SSH_KEY_NAME` environment variable.
|
||||||
|
|
||||||
|
A key-pair can be created by executing the following command
|
||||||
|
|
||||||
|
`openstack keypair create [--public-key <file> | --private-key <file>] <name>`
|
||||||
|
|
||||||
|
### Availability zone
|
||||||
|
|
||||||
|
The availability zone must be set as an environment variable `OPENSTACK_FAILURE_DOMAIN`.
|
||||||
|
|
||||||
|
### DNS server
|
||||||
|
|
||||||
|
The DNS servers must be set as an environment variable `OPENSTACK_DNS_NAMESERVERS`.
|
||||||
|
|
||||||
|
### External network
|
||||||
|
|
||||||
|
The openstack environment should have an external network already present.
|
||||||
|
The external network id can be specified by setting the `spec.externalNetworkId` of `OpenStackCluster` CRD of the cluster template.
|
||||||
|
The public network id can be obtained by using command
|
||||||
|
|
||||||
|
```bash
|
||||||
|
openstack network list --external
|
||||||
|
```
|
||||||
|
|
||||||
|
### Floating IP
|
||||||
|
|
||||||
|
A floating IP is automatically created and associated with the load balancer or controller node, however floating IP can also be
|
||||||
|
specified explicitly by setting the `spec.apiServerLoadBalancerFlotingIP` of `OpenStackCluster` CRD.
|
||||||
|
|
||||||
|
Floating ip can be created using `openstack floating ip create <public network>` command.
|
||||||
|
|
||||||
|
Note: Only user with admin role can create a floating IP with specific IP address.
|
||||||
|
|
||||||
|
### Operating system image
|
||||||
|
|
||||||
|
A cluster api compatible image is required for creating workload kubernetes clusters. The kubeadm bootstrap provider that capo uses
|
||||||
|
depends on some pre-installed software like a container runtime, kubelet, kubeadm and also on an up-to-date version of cloud-init.
|
||||||
|
|
||||||
|
The image can be referenced by setting an environment variable `OPENSTACK_IMAGE_NAME`.
|
||||||
|
|
||||||
|
#### Install Packer
|
||||||
|
|
||||||
|
$ mkdir packer
|
||||||
|
|
||||||
|
$ cd packer
|
||||||
|
|
||||||
|
$ wget <https://releases.hashicorp.com/packer/1.6.0/packer_1.6.0_linux_amd64.zip>
|
||||||
|
|
||||||
|
$ unzip packer_1.6.0_linux_amd64.zip
|
||||||
|
|
||||||
|
$ sudo mv packer /usr/local/bin/
|
||||||
|
|
||||||
|
#### Install Ansible
|
||||||
|
|
||||||
|
$ sudo apt update
|
||||||
|
|
||||||
|
$ sudo apt upgrade
|
||||||
|
|
||||||
|
$ sudo apt install software-properties-common
|
||||||
|
|
||||||
|
$ sudo apt-add-repository ppa:ansible/ansible
|
||||||
|
|
||||||
|
$ sudo apt update
|
||||||
|
|
||||||
|
$ sudo apt install ansible
|
||||||
|
|
||||||
|
#### Build Cluster API Compliant VM Image
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ sudo -i
|
||||||
|
# apt install qemu-kvm libvirt-bin qemu-utils
|
||||||
|
$ sudo usermod -a -G kvm `<yourusername>`
|
||||||
|
$ sudo chown root:kvm /dev/kvm
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
Exit and log back in to make the change take place.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
git clone <https://github.com/kubernetes-sigs/image-builder.git> image-builder
|
||||||
|
cd image-builder/images/capi/
|
||||||
|
vim packer/qemu/qemu-ubuntu-1804.json
|
||||||
|
```
|
||||||
|
|
||||||
|
Update the iso_url to `http://cdimage.ubuntu.com/releases/18.04/release/ubuntu-18.04.5-server-amd64.iso`
|
||||||
|
|
||||||
|
Make sure to use the correct checksum value from
|
||||||
|
[ubuntu-releases](http://cdimage.ubuntu.com/releases/18.04.5/release/SHA256SUMS)
|
||||||
|
|
||||||
|
$ make build-qemu-ubuntu-1804
|
||||||
|
|
||||||
|
#### Upload Images to Openstack
|
||||||
|
|
||||||
|
$ openstack image create --container-format bare --disk-format qcow2 --file ubuntu-1804-kube-v1.16.14 ubuntu-1804-kube-v1.16.4
|
||||||
|
|
||||||
|
``` bash
|
||||||
|
$ openstack image list
|
||||||
|
+--------------------------------------+--------------------------+--------+
|
||||||
|
| ID | Name | Status |
|
||||||
|
+--------------------------------------+--------------------------+--------+
|
||||||
|
| 10e31af1-5414-4bae-9500-922db677e695 | amphora-x64-haproxy | active |
|
||||||
|
| 61bf8071-5e00-4806-83e0-612f8da03bf8 | cirros-0.5.1-x86_64-disk | active |
|
||||||
|
| 4fd894c7-9964-461b-bc9f-2e90fdade505 | ubuntu-1804-kube-v1.16.4 | active |
|
||||||
|
+--------------------------------------+--------------------------+--------+
|
||||||
|
```
|
||||||
|
|
||||||
|
## Getting Started
|
||||||
|
|
||||||
|
Kind is used to setup a kubernetes cluster, that will later be transformed
|
||||||
|
into a management cluster using airshipctl. The kind kubernetes cluster will be
|
||||||
|
initialized with cluster API and Cluster API openstack(CAPO) provider components.
|
||||||
|
|
||||||
|
$ export KIND_EXPERIMENTAL_DOCKER_NETWORK=bridge
|
||||||
|
|
||||||
|
$ kind create cluster --name capi-openstack
|
||||||
|
|
||||||
|
```bash
|
||||||
|
Creating cluster "capi-openstack" ...
|
||||||
|
WARNING: Overriding docker network due to KIND_EXPERIMENTAL_DOCKER_NETWORK
|
||||||
|
WARNING: Here be dragons! This is not supported currently.
|
||||||
|
✓ Ensuring node image (kindest/node:v1.18.2) 🖼
|
||||||
|
✓ Preparing nodes 📦
|
||||||
|
✓ Writing configuration 📜
|
||||||
|
✓ Starting control-plane 🕹️
|
||||||
|
✓ Installing CNI 🔌
|
||||||
|
✓ Installing StorageClass 💾
|
||||||
|
Set kubectl context to "kind-capi-openstack"
|
||||||
|
You can now use your cluster with:
|
||||||
|
|
||||||
|
kubectl cluster-info --context kind-capi-openstack
|
||||||
|
```
|
||||||
|
|
||||||
|
Check if all the pods are up.
|
||||||
|
$ kubectl get pods -A
|
||||||
|
|
||||||
|
```bash
|
||||||
|
NAMESPACE NAME READY STATUS RESTARTS AGE
|
||||||
|
kube-system coredns-66bff467f8-2thc2 1/1 Running 0 2m43s
|
||||||
|
kube-system coredns-66bff467f8-4qbvk 1/1 Running 0 2m43s
|
||||||
|
kube-system etcd-capi-openstack-control-plane 1/1 Running 0 2m58s
|
||||||
|
kube-system kindnet-xwp2x 1/1 Running 0 2m43s
|
||||||
|
kube-system kube-apiserver-capi-openstack-control-plane 1/1 Running 0 2m58s
|
||||||
|
kube-system kube-controller-manager-capi-openstack-control-plane 1/1 Running 0 2m58s
|
||||||
|
kube-system kube-proxy-khhvd 1/1 Running 0 2m43s
|
||||||
|
kube-system kube-scheduler-capi-openstack-control-plane 1/1 Running 0 2m58s
|
||||||
|
local-path-storage local-path-provisioner-bd4bb6b75-qnbjk 1/1 Running 0 2m43s
|
||||||
|
```
|
||||||
|
|
||||||
|
## Create airshipctl configuration
|
||||||
|
|
||||||
|
$ mkdir ~/.airship
|
||||||
|
|
||||||
|
$ airshipctl config init
|
||||||
|
|
||||||
|
Run the below command to configure openstack manifest, and add it to airship config
|
||||||
|
|
||||||
|
$ airshipctl config set-manifest openstack_manifest --repo primary --url \
|
||||||
|
<https://opendev.org/airship/airshipctl> --branch master --primary \
|
||||||
|
--sub-path manifests/site/openstack-test-site --target-path /tmp/airship/
|
||||||
|
|
||||||
|
$ airshipctl config set-context kind-capi-openstack --manifest openstack_manifest
|
||||||
|
|
||||||
|
```bash
|
||||||
|
Context "kind-capi-openstack" created.
|
||||||
|
```
|
||||||
|
|
||||||
|
$ cp ~/.kube/config ~/.airship/kubeconfig
|
||||||
|
|
||||||
|
$ airshipctl config get-context
|
||||||
|
|
||||||
|
```bash
|
||||||
|
Context: kind-capi-openstack
|
||||||
|
contextKubeconf: kind-capi-openstack_target
|
||||||
|
manifest: openstack_manifest
|
||||||
|
|
||||||
|
LocationOfOrigin: /home/stack/.airship/kubeconfig
|
||||||
|
cluster: kind-capi-openstack_target
|
||||||
|
user: kind-capi-openstack
|
||||||
|
```
|
||||||
|
|
||||||
|
$ airshipctl config use-context kind-capi-openstack
|
||||||
|
|
||||||
|
$ airshipctl document pull --debug
|
||||||
|
|
||||||
|
```bash
|
||||||
|
[airshipctl] 2020/09/10 23:19:32 Reading current context manifest information from /home/stack/.airship/config
|
||||||
|
[airshipctl] 2020/09/10 23:19:32 Downloading primary repository airshipctl from https://opendev.org/airship/airshipctl into /tmp/airship/
|
||||||
|
[airshipctl] 2020/09/10 23:19:32 Attempting to download the repository airshipctl
|
||||||
|
[airshipctl] 2020/09/10 23:19:32 Attempting to clone the repository airshipctl from https://opendev.org/airship/airshipctl
|
||||||
|
[airshipctl] 2020/09/10 23:19:32 Attempting to open repository airshipctl
|
||||||
|
[airshipctl] 2020/09/10 23:19:32 Attempting to checkout the repository airshipctl from branch refs/heads/master
|
||||||
|
```
|
||||||
|
|
||||||
|
$ airshipctl config set-manifest openstack_manifest --target-path /tmp/airship/airshipctl
|
||||||
|
|
||||||
|
## Initialize Management cluster
|
||||||
|
|
||||||
|
Execute the following command to initialize the Management cluster with CAPI and CAPO components.
|
||||||
|
|
||||||
|
$ airshipctl cluster init --debug
|
||||||
|
|
||||||
|
```bash
|
||||||
|
[airshipctl] 2020/09/10 23:36:23 Starting cluster-api initiation
|
||||||
|
Fetching providers
|
||||||
|
[airshipctl] 2020/09/10 23:36:23 Creating arishipctl repository implementation interface for provider cluster-api of type CoreProvider
|
||||||
|
[airshipctl] 2020/09/10 23:36:23 Setting up airshipctl provider Components client
|
||||||
|
Provider type: CoreProvider, name: cluster-api
|
||||||
|
[airshipctl] 2020/09/10 23:36:23 Getting airshipctl provider components, skipping variable substitution: true.
|
||||||
|
Provider type: CoreProvider, name: cluster-api
|
||||||
|
...
|
||||||
|
```
|
||||||
|
|
||||||
|
Wait for all the pods to be up.
|
||||||
|
|
||||||
|
$ kubectl get pods -A
|
||||||
|
|
||||||
|
```bash
|
||||||
|
NAMESPACE NAME READY STATUS RESTARTS AGE
|
||||||
|
capi-kubeadm-bootstrap-system capi-kubeadm-bootstrap-controller-manager-dfdf9877b-g44hd 2/2 Running 0 59s
|
||||||
|
capi-kubeadm-control-plane-system capi-kubeadm-control-plane-controller-manager-76c847457b-z2jtr 2/2 Running 0 58s
|
||||||
|
capi-system capi-controller-manager-7c7978f565-rk7qk 2/2 Running 0 59s
|
||||||
|
capi-webhook-system capi-controller-manager-748c57d64d-wjbnj 2/2 Running 0 60s
|
||||||
|
capi-webhook-system capi-kubeadm-bootstrap-controller-manager-65f979767f-bv6dr 2/2 Running 0 59s
|
||||||
|
capi-webhook-system capi-kubeadm-control-plane-controller-manager-7f5d88dcf9-k6kpf 2/2 Running 1 58s
|
||||||
|
capi-webhook-system capo-controller-manager-7d76dc9ddc-b9xhw 2/2 Running 0 57s
|
||||||
|
capo-system capo-controller-manager-79445d5984-k9fmc 2/2 Running 0 57s
|
||||||
|
cert-manager cert-manager-77d8f4d85f-nkg58 1/1 Running 0 71s
|
||||||
|
cert-manager cert-manager-cainjector-75f88c9f56-fcrc6 1/1 Running 0 72s
|
||||||
|
cert-manager cert-manager-webhook-56669d7fcb-cbzfn 1/1 Running 1 71s
|
||||||
|
kube-system coredns-66bff467f8-2thc2 1/1 Running 0 29m
|
||||||
|
kube-system coredns-66bff467f8-4qbvk 1/1 Running 0 29m
|
||||||
|
kube-system etcd-capi-openstack-control-plane 1/1 Running 0 29m
|
||||||
|
kube-system kindnet-xwp2x 1/1 Running 0 29m
|
||||||
|
kube-system kube-apiserver-capi-openstack-control-plane 1/1 Running 0 29m
|
||||||
|
kube-system kube-controller-manager-capi-openstack-control-plane 1/1 Running 0 29m
|
||||||
|
kube-system kube-proxy-khhvd 1/1 Running 0 29m
|
||||||
|
kube-system kube-scheduler-capi-openstack-control-plane 1/1 Running 0 29m
|
||||||
|
local-path-storage local-path-provisioner-bd4bb6b75-qnbjk 1/1 Running 0 29m
|
||||||
|
```
|
||||||
|
|
||||||
|
At this point, the management cluster is initialized with cluster api and cluster api openstack provider components.
|
||||||
|
|
||||||
|
## Create control plane and worker nodes
|
||||||
|
|
||||||
|
$ airshipctl phase apply controlplane --debug
|
||||||
|
|
||||||
|
```bash
|
||||||
|
[airshipctl] 2020/09/11 00:11:44 building bundle from kustomize path /tmp/airship/airshipctl/manifests/site/openstack-test-site/target/controlplane
|
||||||
|
[airshipctl] 2020/09/11 00:11:44 Getting infos for bundle, inventory id is kind-capi-openstack-target-controlplane
|
||||||
|
[airshipctl] 2020/09/11 00:11:44 Inventory Object config Map not found, auto generating Invetory object
|
||||||
|
[airshipctl] 2020/09/11 00:11:44 Injecting Invetory Object: {"apiVersion":"v1","kind":"ConfigMap","metadata":{"creationTimestamp":null,"labels":{"cli-utils.sigs.k8s.io/inventory-id":"kind-capi-openstack-target-controlplane"},"name":"airshipit-kind-capi-openstack-target-controlplane","namespace":"airshipit"}}{nsfx:false,beh:unspecified} into bundle
|
||||||
|
[airshipctl] 2020/09/11 00:11:44 Making sure that inventory object namespace airshipit exists
|
||||||
|
secret/ostgt-cloud-config created
|
||||||
|
cluster.cluster.x-k8s.io/ostgt created
|
||||||
|
kubeadmcontrolplane.controlplane.cluster.x-k8s.io/ostgt-control-plane created
|
||||||
|
openstackcluster.infrastructure.cluster.x-k8s.io/ostgt created
|
||||||
|
openstackmachinetemplate.infrastructure.cluster.x-k8s.io/ostgt-control-plane created
|
||||||
|
5 resource(s) applied. 5 created, 0 unchanged, 0 configured
|
||||||
|
secret/ostgt-cloud-config is NotFound: Resource not found
|
||||||
|
cluster.cluster.x-k8s.io/ostgt is NotFound: Resource not found
|
||||||
|
kubeadmcontrolplane.controlplane.cluster.x-k8s.io/ostgt-control-plane is NotFound: Resource not found
|
||||||
|
openstackcluster.infrastructure.cluster.x-k8s.io/ostgt is NotFound: Resource not found
|
||||||
|
openstackmachinetemplate.infrastructure.cluster.x-k8s.io/ostgt-control-plane is NotFound: Resource not found
|
||||||
|
secret/ostgt-cloud-config is Current: Resource is always ready
|
||||||
|
cluster.cluster.x-k8s.io/ostgt is Current: Resource is current
|
||||||
|
kubeadmcontrolplane.controlplane.cluster.x-k8s.io/ostgt-control-plane is Current: Resource is current
|
||||||
|
openstackcluster.infrastructure.cluster.x-k8s.io/ostgt is Current: Resource is current
|
||||||
|
openstackmachinetemplate.infrastructure.cluster.x-k8s.io/ostgt-control-plane is Current: Resource is current
|
||||||
|
all resources has reached the Current status
|
||||||
|
```
|
||||||
|
|
||||||
|
$ airshipctl phase apply workers --debug
|
||||||
|
|
||||||
|
```bash
|
||||||
|
[airshipctl] 2020/09/11 00:12:19 building bundle from kustomize path /tmp/airship/airshipctl/manifests/site/openstack-test-site/target/workers
|
||||||
|
[airshipctl] 2020/09/11 00:12:19 Getting infos for bundle, inventory id is kind-capi-openstack-target-workers
|
||||||
|
[airshipctl] 2020/09/11 00:12:19 Inventory Object config Map not found, auto generating Invetory object
|
||||||
|
[airshipctl] 2020/09/11 00:12:19 Injecting Invetory Object: {"apiVersion":"v1","kind":"ConfigMap","metadata":{"creationTimestamp":null,"labels":{"cli-utils.sigs.k8s.io/inventory-id":"kind-capi-openstack-target-workers"},"name":"airshipit-kind-capi-openstack-target-workers","namespace":"airshipit"}}{nsfx:false,beh:unspecified} into bundle
|
||||||
|
[airshipctl] 2020/09/11 00:12:19 Making sure that inventory object namespace airshipit exists
|
||||||
|
kubeadmconfigtemplate.bootstrap.cluster.x-k8s.io/ostgt-md-0 created
|
||||||
|
machinedeployment.cluster.x-k8s.io/ostgt-md-0 created
|
||||||
|
openstackmachinetemplate.infrastructure.cluster.x-k8s.io/ostgt-md-0 created
|
||||||
|
3 resource(s) applied. 3 created, 0 unchanged, 0 configured
|
||||||
|
kubeadmconfigtemplate.bootstrap.cluster.x-k8s.io/ostgt-md-0 is NotFound: Resource not found
|
||||||
|
machinedeployment.cluster.x-k8s.io/ostgt-md-0 is NotFound: Resource not found
|
||||||
|
openstackmachinetemplate.infrastructure.cluster.x-k8s.io/ostgt-md-0 is NotFound: Resource not found
|
||||||
|
kubeadmconfigtemplate.bootstrap.cluster.x-k8s.io/ostgt-md-0 is Current: Resource is current
|
||||||
|
machinedeployment.cluster.x-k8s.io/ostgt-md-0 is Current: Resource is current
|
||||||
|
openstackmachinetemplate.infrastructure.cluster.x-k8s.io/ostgt-md-0 is Current: Resource is current
|
||||||
|
all resources has reached the Current status
|
||||||
|
```
|
||||||
|
|
||||||
|
$ kubectl get po -A
|
||||||
|
|
||||||
|
```bash
|
||||||
|
NAMESPACE NAME READY STATUS RESTARTS AGE
|
||||||
|
capi-kubeadm-bootstrap-system capi-kubeadm-bootstrap-controller-manager-dfdf9877b-g44hd 2/2 Running 0 36m
|
||||||
|
capi-kubeadm-control-plane-system capi-kubeadm-control-plane-controller-manager-76c847457b-z2jtr 2/2 Running 0 36m
|
||||||
|
capi-system capi-controller-manager-7c7978f565-rk7qk 2/2 Running 0 36m
|
||||||
|
capi-webhook-system capi-controller-manager-748c57d64d-wjbnj 2/2 Running 0 36m
|
||||||
|
capi-webhook-system capi-kubeadm-bootstrap-controller-manager-65f979767f-bv6dr 2/2 Running 0 36m
|
||||||
|
capi-webhook-system capi-kubeadm-control-plane-controller-manager-7f5d88dcf9-k6kpf 2/2 Running 1 36m
|
||||||
|
capi-webhook-system capo-controller-manager-7d76dc9ddc-b9xhw 2/2 Running 0 36m
|
||||||
|
capo-system capo-controller-manager-79445d5984-k9fmc 2/2 Running 0 36m
|
||||||
|
cert-manager cert-manager-77d8f4d85f-nkg58 1/1 Running 0 36m
|
||||||
|
cert-manager cert-manager-cainjector-75f88c9f56-fcrc6 1/1 Running 0 36m
|
||||||
|
cert-manager cert-manager-webhook-56669d7fcb-cbzfn 1/1 Running 1 36m
|
||||||
|
kube-system coredns-66bff467f8-2thc2 1/1 Running 0 64m
|
||||||
|
kube-system coredns-66bff467f8-4qbvk 1/1 Running 0 64m
|
||||||
|
kube-system etcd-capi-openstack-control-plane 1/1 Running 0 64m
|
||||||
|
kube-system kindnet-xwp2x 1/1 Running 0 64m
|
||||||
|
kube-system kube-apiserver-capi-openstack-control-plane 1/1 Running 0 64m
|
||||||
|
kube-system kube-controller-manager-capi-openstack-control-plane 1/1 Running 0 64m
|
||||||
|
kube-system kube-proxy-khhvd 1/1 Running 0 64m
|
||||||
|
kube-system kube-scheduler-capi-openstack-control-plane 1/1 Running 0 64m
|
||||||
|
local-path-storage local-path-provisioner-bd4bb6b75-qnbjk 1/1 Running 0 64m
|
||||||
|
```
|
||||||
|
|
||||||
|
To check logs run the below command
|
||||||
|
|
||||||
|
$ kubectl logs capo-controller-manager-79445d5984-k9fmc -n capo-system --all-containers=true -f
|
||||||
|
|
||||||
|
```bash
|
||||||
|
I0910 23:36:54.768316 1 listener.go:44] controller-runtime/metrics "msg"="metrics server is starting to listen" "addr"="127.0.0.1:8080"
|
||||||
|
I0910 23:36:54.768890 1 main.go:235] setup "msg"="starting manager"
|
||||||
|
I0910 23:36:54.769149 1 leaderelection.go:242] attempting to acquire leader lease capo-system/controller-leader-election-capo...
|
||||||
|
I0910 23:36:54.769199 1 internal.go:356] controller-runtime/manager "msg"="starting metrics server" "path"="/metrics"
|
||||||
|
I0910 23:36:54.853723 1 leaderelection.go:252] successfully acquired lease capo-system/controller-leader-election-capo
|
||||||
|
I0910 23:36:54.854706 1 controller.go:164] controller-runtime/controller "msg"="Starting EventSource" "controller"="openstackcluster" "source"={" Type":{"metadata":{"creationTimestamp":null},"spec":{"cloudsSecret":null,"cloudName":"","network":{},"subnet":{},"managedAPIServerLoadBalancer":false,"m anagedSecurityGroups":false,"caKeyPair":{},"etcdCAKeyPair":{},"frontProxyCAKeyPair":{},"saKeyPair":{},"controlPlaneEndpoint":{"host":"","port":0}},"stat us":{"ready":false}}}
|
||||||
|
I0910 23:36:54.854962 1 controller.go:164] controller-runtime/controller "msg"="Starting EventSource" "controller"="openstackmachine" "source"={" Type":{"metadata":{"creationTimestamp":null},"spec":{"cloudsSecret":null,"cloudName":"","flavor":"","image":""},"status":{"ready":false}}}
|
||||||
|
```
|
||||||
|
|
||||||
|
$ kubectl get machines
|
||||||
|
|
||||||
|
```bash
|
||||||
|
NAME PROVIDERID PHASE
|
||||||
|
ostgt-control-plane-cggt7 openstack://a6da4363-9419-4e14-b67a-3ce86da198c4 Running
|
||||||
|
ostgt-md-0-6b564d74b8-8h8d8 openstack://23fd5b75-e3f4-4e89-b900-7a6873a146c2 Running
|
||||||
|
ostgt-md-0-6b564d74b8-pj4lm openstack://9b8323a2-757f-4905-8006-4514862fde75 Running
|
||||||
|
ostgt-md-0-6b564d74b8-wnw8l openstack://1a8f10da-5d12-4c50-a60d-f2e24a387611 Running
|
||||||
|
```
|
||||||
|
|
||||||
|
$ kubectl get secrets
|
||||||
|
|
||||||
|
```bash
|
||||||
|
NAME TYPE DATA AGE
|
||||||
|
default-token-vfcm7 kubernetes.io/service-account-token 3 114m
|
||||||
|
ostgt-ca Opaque 2 47m
|
||||||
|
ostgt-cloud-config Opaque 2 51m
|
||||||
|
ostgt-control-plane-gd2gq cluster.x-k8s.io/secret 1 47m
|
||||||
|
ostgt-etcd Opaque 2 47m
|
||||||
|
ostgt-kubeconfig Opaque 1 47m
|
||||||
|
ostgt-md-0-j76jg cluster.x-k8s.io/secret 1 44m
|
||||||
|
ostgt-md-0-kdjsv cluster.x-k8s.io/secret 1 44m
|
||||||
|
ostgt-md-0-q4vmn cluster.x-k8s.io/secret 1 44m
|
||||||
|
ostgt-proxy Opaque 2 47m
|
||||||
|
ostgt-sa Opaque 2 47m
|
||||||
|
```
|
||||||
|
|
||||||
|
$ kubectl --namespace=default get secret/ostgt-kubeconfig -o jsonpath={.data.value} | base64 --decode > ./ostgt.kubeconfig
|
||||||
|
|
||||||
|
$ kubectl get pods -A --kubeconfig ~/ostgt.kubeconfig
|
||||||
|
|
||||||
|
```bash
|
||||||
|
NAMESPACE NAME READY STATUS RESTARTS AGE
|
||||||
|
kube-system calico-kube-controllers-7865ff46b6-8pbnq 1/1 Running 0 47m
|
||||||
|
kube-system calico-node-7kpjb 1/1 Running 0 44m
|
||||||
|
kube-system calico-node-d8dcc 1/1 Running 0 45m
|
||||||
|
kube-system calico-node-mdwnt 1/1 Running 0 47m
|
||||||
|
kube-system calico-node-n2qr8 1/1 Running 0 45m
|
||||||
|
kube-system coredns-6955765f44-dkvwq 1/1 Running 0 47m
|
||||||
|
kube-system coredns-6955765f44-p4mbh 1/1 Running 0 47m
|
||||||
|
kube-system etcd-ostgt-control-plane-vpmqg 1/1 Running 0 47m
|
||||||
|
kube-system kube-apiserver-ostgt-control-plane-vpmqg 1/1 Running 0 47m
|
||||||
|
kube-system kube-controller-manager-ostgt-control-plane-vpmqg 1/1 Running 0 47m
|
||||||
|
kube-system kube-proxy-j6msn 1/1 Running 0 44m
|
||||||
|
kube-system kube-proxy-kgxvq 1/1 Running 0 45m
|
||||||
|
kube-system kube-proxy-lfmlf 1/1 Running 0 45m
|
||||||
|
kube-system kube-proxy-zq26j 1/1 Running 0 47m
|
||||||
|
kube-system kube-scheduler-ostgt-control-plane-vpmqg 1/1 Running 0 47m
|
||||||
|
```
|
||||||
|
|
||||||
|
$ kubectl get nodes --kubeconfig ~/ostgt.kubeconfig
|
||||||
|
|
||||||
|
```bash
|
||||||
|
NAME STATUS ROLES AGE VERSION
|
||||||
|
ostgt-control-plane-vpmqg Ready master 49m v1.17.3
|
||||||
|
ostgt-md-0-6p2f9 Ready <none> 46m v1.17.3
|
||||||
|
ostgt-md-0-h8hn9 Ready <none> 47m v1.17.3
|
||||||
|
ostgt-md-0-k9k66 Ready <none> 46m v1.17.3
|
||||||
|
```
|
||||||
|
|
||||||
|
$ kubectl get cs --kubeconfig ~/ostgt.kubeconfig
|
||||||
|
|
||||||
|
```bash
|
||||||
|
NAME STATUS MESSAGE ERROR
|
||||||
|
controller-manager Healthy ok
|
||||||
|
scheduler Healthy ok
|
||||||
|
etcd-0 Healthy {"health":"true"}
|
||||||
|
```
|
||||||
|
|
||||||
|
Now, the control plane and worker node are created on openstack.
|
||||||
|
|
||||||
|
![Machines](../img/openstack-machines.png)
|
||||||
|
|
||||||
|
## Tear Down Clusters
|
||||||
|
|
||||||
|
In order to delete the cluster run the below command. This will delete
|
||||||
|
the control plane, workers and all other resources
|
||||||
|
associated with the cluster on openstack.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ airshipctl phase render controlplane -k Cluster | kubectl delete -f -
|
||||||
|
cluster.cluster.x-k8s.io "ostgt" deleted
|
||||||
|
```
|
||||||
|
|
||||||
|
$ kind delete cluster --name capi-openstack
|
||||||
|
|
||||||
|
## Reference
|
||||||
|
|
||||||
|
### Installation Using Devstack
|
||||||
|
|
||||||
|
- Install [Devstack](https://docs.openstack.org/devstack/latest/guides/devstack-with-lbaas-v2.html)
|
||||||
|
|
||||||
|
- Create `ubuntu-1910-kube-v1.17.3.qcow2` image in the devstack.
|
||||||
|
|
||||||
|
Download a capi compatible image for ubuntu OS.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
wget https://github.com/sbueringer/image-builder/releases/download/v1.17.3-04/ubuntu-1910-kube-v1.17.3.qcow2
|
||||||
|
|
||||||
|
openstack image create --container-format bare --disk-format qcow2 --file ubuntu-1910-kube-v1.17.3.qcow2 ubuntu-1910-kube-v1.17.3
|
||||||
|
```
|
||||||
|
|
||||||
|
Check if the image status is `active`
|
||||||
|
|
||||||
|
```bash
|
||||||
|
stack@stackdev-ev:/opt/stack/devstack$ openstack image list
|
||||||
|
+--------------------------------------+--------------------------+--------+
|
||||||
|
| ID | Name | Status |
|
||||||
|
+--------------------------------------+--------------------------+--------+
|
||||||
|
| 83002c1d-436d-4007-bea1-3ffc94fa193b | amphora-x64-haproxy | active |
|
||||||
|
| a801c914-a0b9-485a-ba5f-246e912cb656 | cirros-0.5.1-x86_64-disk | active |
|
||||||
|
| 8e8fc7a8-cfe0-4251-bdde-8600838f2ed8 | ubuntu-1910-kube-v1.17.3 | active |
|
||||||
|
```
|
||||||
|
|
||||||
|
- Generate credentials
|
||||||
|
|
||||||
|
In devstack environment, normally the `clouds.yaml` file is found at `etc/openstack/` location.
|
||||||
|
|
||||||
|
Execute the following command to generate the cloud credentials for devstack
|
||||||
|
|
||||||
|
```bash
|
||||||
|
wget https://raw.githubusercontent.com/kubernetes-sigs/cluster-api-provider-openstack/master/templates/env.rc -O /tmp/env.rc
|
||||||
|
source /tmp/env.rc /etc/openstack/clouds.yaml devstack
|
||||||
|
```
|
||||||
|
|
||||||
|
A snippet of sample clouds.yaml file can be seen below for cloud `devstack`.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
clouds:
|
||||||
|
devstack:
|
||||||
|
auth:
|
||||||
|
auth_url: http://10.0.4.4/identity
|
||||||
|
project_id: f3deb6e94bee4addaed3ba42d6ffaeba
|
||||||
|
user_domain_name: Default
|
||||||
|
username: demo
|
||||||
|
password: pass
|
||||||
|
region_name: RegionOne
|
||||||
|
```
|
||||||
|
|
||||||
|
The list of project_id-s can be retrieved by `openstack project list` in the devstack environment.
|
||||||
|
|
||||||
|
- Ensure that `demo` user has `admin` rights so that floating ip-s can be created at the time of
|
||||||
|
workload cluster deployment.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
cd /opt/stack/devstack
|
||||||
|
export OS_USERNAME=admin
|
||||||
|
$ . ./openrc
|
||||||
|
$ openstack role add --project demo --user demo admin
|
||||||
|
```
|
||||||
|
|
||||||
|
- Create Floating IP
|
||||||
|
|
||||||
|
To create floating ip, following command can be used
|
||||||
|
|
||||||
|
`openstack floating ip create public --floating-ip-address $FLOATING_IP_ADDRESS`
|
||||||
|
|
||||||
|
where `FLOATING_IP_ADDRESS` is the specified ip address and `public` is the name of
|
||||||
|
the external network in devstack.
|
||||||
|
|
||||||
|
`openstack floating ip list` command shows the list of all floating ip-s.
|
||||||
|
|
||||||
|
- Allow ssh access to controlplane and worker nodes
|
||||||
|
|
||||||
|
Cluster api creates following security groups if `spec.managedSecurityGroups` of
|
||||||
|
`OpenStackCluster` CRD is set to true.
|
||||||
|
|
||||||
|
- k8s-cluster-default-`<CLUSTER-NAME>`-secgroup-controlplane (for control plane)
|
||||||
|
- k8s-cluster-default-`<CLUSTER-NAME>`-secgroup-worker (for worker nodes)
|
||||||
|
|
||||||
|
These security group rules include the kubeadm's
|
||||||
|
[Check required ports](https://kubernetes.io/docs/setup/production-environment/tools/kubeadm/install-kubeadm/#check-required-ports)
|
||||||
|
so that each node can not be logged in through ssh by default.
|
||||||
|
|
||||||
|
If ssh access to the nodes is required then follow the below steps -
|
||||||
|
|
||||||
|
Create a security group allowing ssh access
|
||||||
|
|
||||||
|
```bash
|
||||||
|
openstack security group create --project demo --project-domain Default allow-ssh
|
||||||
|
openstack security group rule create allow-ssh --protocol tcp --dst-port 22:22 --remote-ip 0.0.0.0/0
|
||||||
|
```
|
||||||
|
|
||||||
|
Add the security group to `OpenStackMachineTemplate` CRD as below
|
||||||
|
|
||||||
|
```bash
|
||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: OpenStackMachineTemplate
|
||||||
|
metadata:
|
||||||
|
name: ${CLUSTER_NAME}-control-plane
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
securityGroups:
|
||||||
|
- name: allow-ssh
|
||||||
|
```
|
||||||
|
|
||||||
|
### Provider Manifests
|
||||||
|
|
||||||
|
Provider Configuration for Capo is referenced from
|
||||||
|
[Config](https://github.com/kubernetes-sigs/cluster-api-provider-openstack/tree/master/config)
|
||||||
|
|
||||||
|
$ tree airshipctl/manifests/function/capo
|
||||||
|
|
||||||
|
```bash
|
||||||
|
└── v0.3.1
|
||||||
|
├── certmanager
|
||||||
|
│ ├── certificate.yaml
|
||||||
|
│ ├── kustomization.yaml
|
||||||
|
│ └── kustomizeconfig.yaml
|
||||||
|
├── crd
|
||||||
|
│ ├── bases
|
||||||
|
│ │ ├── infrastructure.cluster.x-k8s.io_openstackclusters.yaml
|
||||||
|
│ │ ├── infrastructure.cluster.x-k8s.io_openstackmachines.yaml
|
||||||
|
│ │ └── infrastructure.cluster.x-k8s.io_openstackmachinetemplates.yaml
|
||||||
|
│ ├── kustomization.yaml
|
||||||
|
│ ├── kustomizeconfig.yaml
|
||||||
|
│ └── patches
|
||||||
|
│ ├── cainjection_in_openstackclusters.yaml
|
||||||
|
│ ├── cainjection_in_openstackmachines.yaml
|
||||||
|
│ ├── cainjection_in_openstackmachinetemplates.yaml
|
||||||
|
│ ├── webhook_in_openstackclusters.yaml
|
||||||
|
│ ├── webhook_in_openstackmachines.yaml
|
||||||
|
│ └── webhook_in_openstackmachinetemplates.yaml
|
||||||
|
├── default
|
||||||
|
│ ├── kustomization.yaml
|
||||||
|
│ ├── manager_role_aggregation_patch.yaml
|
||||||
|
│ └── namespace.yaml
|
||||||
|
├── kustomization.yaml
|
||||||
|
├── manager
|
||||||
|
│ ├── kustomization.yaml
|
||||||
|
│ ├── manager.yaml
|
||||||
|
│ ├── manager_auth_proxy_patch.yaml
|
||||||
|
│ ├── manager_image_patch.yaml
|
||||||
|
│ └── manager_pull_policy.yaml
|
||||||
|
├── patch_crd_webhook_namespace.yaml
|
||||||
|
├── rbac
|
||||||
|
│ ├── auth_proxy_role.yaml
|
||||||
|
│ ├── auth_proxy_role_binding.yaml
|
||||||
|
│ ├── auth_proxy_service.yaml
|
||||||
|
│ ├── kustomization.yaml
|
||||||
|
│ ├── leader_election_role.yaml
|
||||||
|
│ ├── leader_election_role_binding.yaml
|
||||||
|
│ ├── role.yaml
|
||||||
|
│ └── role_binding.yaml
|
||||||
|
└── webhook
|
||||||
|
├── kustomization.yaml
|
||||||
|
├── kustomizeconfig.yaml
|
||||||
|
├── manager_webhook_patch.yaml
|
||||||
|
├── manifests.yaml
|
||||||
|
├── service.yaml
|
||||||
|
└── webhookcainjection_patch.yaml
|
||||||
|
```
|
||||||
|
|
||||||
|
### Cluster Templates
|
||||||
|
|
||||||
|
airshipctl/manifests/function/k8scontrol-capo contains cluster.yaml, controlplane.yaml templates.
|
||||||
|
|
||||||
|
```bash
|
||||||
|
cluster.yaml: Contains CRDs Cluster, OpenstackCluster, Secret
|
||||||
|
controlplane.yaml: Contains CRDs KubeadmControlPlane, OpenstackMachineTemplate
|
||||||
|
```
|
||||||
|
|
||||||
|
$ tree airshipctl/manifests/function/k8scontrol-capo
|
||||||
|
|
||||||
|
```bash
|
||||||
|
airshipctl/manifests/function/k8scontrol-capo
|
||||||
|
├── cluster.yaml
|
||||||
|
├── controlplane.yaml
|
||||||
|
└── kustomization.yaml
|
||||||
|
```
|
||||||
|
|
||||||
|
airshipctl/manifests/function/workers-capo contains workers.yaml
|
||||||
|
|
||||||
|
```bash
|
||||||
|
workers.yaml: Contains CRDs Cluster, OpenstackCluster, Secret
|
||||||
|
```
|
||||||
|
|
||||||
|
$ tree airshipctl/manifests/function/workers-capo
|
||||||
|
|
||||||
|
```bash
|
||||||
|
airshipctl/manifests/function/workers-capo
|
||||||
|
.
|
||||||
|
├── kustomization.yaml
|
||||||
|
└── workers.yaml
|
||||||
|
```
|
||||||
|
|
||||||
|
### Test Site Manifests
|
||||||
|
|
||||||
|
#### openstack-test-site/shared
|
||||||
|
|
||||||
|
airshipctl cluster init uses
|
||||||
|
airshipctl/manifests/site/openstack-test-site/shared/clusterctl to initialize
|
||||||
|
management cluster with defined provider components and version.
|
||||||
|
|
||||||
|
$ tree airshipctl/manifests/site/openstack-test-site/shared
|
||||||
|
|
||||||
|
```bash
|
||||||
|
└── clusterctl
|
||||||
|
├── clusterctl.yaml
|
||||||
|
└── kustomization.yaml
|
||||||
|
```
|
||||||
|
|
||||||
|
#### openstack-test-site/target
|
||||||
|
|
||||||
|
There are 3 phases currently available in openstack-test-site/target
|
||||||
|
|
||||||
|
```bash
|
||||||
|
controlplane - Patches templates in manifests/function/k8scontrol-capo
|
||||||
|
workers - Patches template in manifests/function/workers-capo
|
||||||
|
initinfra - Simply calls `openstack-test-site/shared/clusterctl
|
||||||
|
```
|
||||||
|
|
||||||
|
Note: `airshipctl cluster init` initializes all the provider components
|
||||||
|
including the openstack infrastructure provider component. As a result, `airshipctl
|
||||||
|
phase apply initinfra` is not used.
|
||||||
|
|
||||||
|
#### Patch Merge Strategy
|
||||||
|
|
||||||
|
Json and strategic merge patches are applied on templates in `manifests/function/k8scontrol-capo`
|
||||||
|
from `airshipctl/manifests/site/openstack-test-site/target/controlplane` when
|
||||||
|
`airshipctl phase apply controlplane` command is executed
|
||||||
|
|
||||||
|
Json and strategic merge patches are applied on templates in `manifests/function/workers-capo`
|
||||||
|
from `airshipctl/manifests/site/openstack-test-site/target/workers` when
|
||||||
|
`airshipctl phase apply workers` command is executed
|
||||||
|
|
||||||
|
```bash
|
||||||
|
controlplane/control_plane_ip.json: patches control plane ip in template function/k8scontrol-capo/cluster.yaml
|
||||||
|
controlplane/dns_servers.json: patches dns servers in template function/k8scontrol-capo/cluster.yaml
|
||||||
|
controlplane/external_network_id.json: patches external network id in template function/k8scontrol-capo/cluster.yaml
|
||||||
|
cluster_clouds_yaml_patch.yaml: patches clouds.yaml configuration in template function/k8scontrol-capo/cluster.yaml
|
||||||
|
controlplane/control_plane_ip_patch.yaml: patches controlplane ip in template function/k8scontrol-capo/controlplane.yaml
|
||||||
|
controlplane/control_plane_config_patch.yaml: patches cloud configuration in template function/k8scontrol-capo/controlplane.yaml
|
||||||
|
controlplane/ssh_key_patch.yaml: patches ssh key in template function/k8scontrol-capo/controlplane.yaml
|
||||||
|
controlplane/control_plane_machine_count_patch.yaml: patches controlplane replica count in template function/k8scontrol-capo/controlplane.yaml
|
||||||
|
controlplane/control_plane_machine_flavor_patch.yaml: patches controlplane machine flavor in template function/k8scontrol-capo/controlplane.yaml
|
||||||
|
workers/workers_cloud_conf_patch.yaml: patches cloud configuration in template function/workers-capo/workers.yaml
|
||||||
|
workers/workers_machine_count_patch.yaml: patches worker replica count in template function/workers-capo/workers.yaml
|
||||||
|
workers/workers_machine_flavor_patch.yaml: patches worker machine flavor in template function/workers-capo/workers.yaml
|
||||||
|
workers/workers_ssh_key_patch.yaml: patches ssh key in template function/workers-capo/workers.yaml
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
## Software Version Information
|
||||||
|
|
||||||
|
All the instructions provided in the document have been tested using the software and
|
||||||
|
version, provided in this section.
|
||||||
|
|
||||||
|
### Docker
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ docker version
|
||||||
|
Client: Docker Engine - Community
|
||||||
|
Version: 19.03.12
|
||||||
|
API version: 1.40
|
||||||
|
Go version: go1.13.10
|
||||||
|
Git commit: 48a66213fe
|
||||||
|
Built: Mon Jun 22 15:45:36 2020
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Experimental: false
|
||||||
|
|
||||||
|
Server: Docker Engine - Community
|
||||||
|
Engine:
|
||||||
|
Version: 19.03.12
|
||||||
|
API version: 1.40 (minimum version 1.12)
|
||||||
|
Go version: go1.13.10
|
||||||
|
Git commit: 48a66213fe
|
||||||
|
Built: Mon Jun 22 15:44:07 2020
|
||||||
|
OS/Arch: linux/amd64
|
||||||
|
Experimental: false
|
||||||
|
containerd:
|
||||||
|
Version: 1.2.13
|
||||||
|
GitCommit: 7ad184331fa3e55e52b890ea95e65ba581ae3429
|
||||||
|
runc:
|
||||||
|
Version: 1.0.0-rc10
|
||||||
|
GitCommit: dc9208a3303feef5b3839f4323d9beb36df0a9dd
|
||||||
|
docker-init:
|
||||||
|
Version: 0.18.0
|
||||||
|
GitCommit: fec3683
|
||||||
|
|
||||||
|
```
|
||||||
|
|
||||||
|
### Kind
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ kind version
|
||||||
|
kind v0.8.1 go1.14.2 linux/amd64
|
||||||
|
```
|
||||||
|
|
||||||
|
### Kubectl
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ kubectl version --short
|
||||||
|
Client Version: v1.17.4
|
||||||
|
Server Version: v1.18.2
|
||||||
|
```
|
||||||
|
|
||||||
|
### Go
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ go version
|
||||||
|
go version go1.10.4 linux/amd64
|
||||||
|
```
|
||||||
|
|
||||||
|
### Kustomize
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ kustomize version
|
||||||
|
{Version:kustomize/v3.8.0 GitCommit:6a50372dd5686df22750b0c729adaf369fbf193c BuildDate:2020-07-05T14:08:42Z GoOs:linux GoArch:amd64}
|
||||||
|
```
|
||||||
|
|
||||||
|
### OS
|
||||||
|
|
||||||
|
```bash
|
||||||
|
$ cat /etc/os-release
|
||||||
|
NAME="Ubuntu"
|
||||||
|
VERSION="18.04.4 LTS (Bionic Beaver)"
|
||||||
|
ID=ubuntu
|
||||||
|
ID_LIKE=debian
|
||||||
|
PRETTY_NAME="Ubuntu 18.04.4 LTS"
|
||||||
|
VERSION_ID="18.04"
|
||||||
|
HOME_URL="https://www.ubuntu.com/"
|
||||||
|
SUPPORT_URL="https://help.ubuntu.com/"
|
||||||
|
BUG_REPORT_URL="https://bugs.launchpad.net/ubuntu/"
|
||||||
|
PRIVACY_POLICY_URL="https://www.ubuntu.com/legal/terms-and-policies/privacy-policy"
|
||||||
|
VERSION_CODENAME=bionic
|
||||||
|
UBUNTU_CODENAME=bionic
|
||||||
|
```
|
||||||
|
|
||||||
|
## Virtual Machine Specification
|
||||||
|
|
||||||
|
All the instructions in the document were perfomed on VM(with nested virtualization enabled)
|
||||||
|
with 16 vCPUs, 64 GB RAM.
|
24
manifests/function/capo/v0.3.1/certmanager/certificate.yaml
Normal file
24
manifests/function/capo/v0.3.1/certmanager/certificate.yaml
Normal file
@ -0,0 +1,24 @@
|
|||||||
|
# The following manifests contain a self-signed issuer CR and a certificate CR.
|
||||||
|
# More document can be found at https://docs.cert-manager.io
|
||||||
|
apiVersion: cert-manager.io/v1alpha2
|
||||||
|
kind: Issuer
|
||||||
|
metadata:
|
||||||
|
name: selfsigned-issuer
|
||||||
|
namespace: system
|
||||||
|
spec:
|
||||||
|
selfSigned: {}
|
||||||
|
---
|
||||||
|
apiVersion: cert-manager.io/v1alpha2
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: serving-cert # this name should match the one appeared in kustomizeconfig.yaml
|
||||||
|
namespace: system
|
||||||
|
spec:
|
||||||
|
# $(SERVICE_NAME) and $(SERVICE_NAMESPACE) will be substituted by kustomize
|
||||||
|
dnsNames:
|
||||||
|
- $(SERVICE_NAME).$(SERVICE_NAMESPACE).svc
|
||||||
|
- $(SERVICE_NAME).$(SERVICE_NAMESPACE).svc.cluster.local
|
||||||
|
issuerRef:
|
||||||
|
kind: Issuer
|
||||||
|
name: selfsigned-issuer
|
||||||
|
secretName: $(SERVICE_NAME)-cert # this secret will not be prefixed, since it's not managed by kustomize
|
@ -0,0 +1,7 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
resources:
|
||||||
|
- certificate.yaml
|
||||||
|
|
||||||
|
configurations:
|
||||||
|
- kustomizeconfig.yaml
|
@ -0,0 +1,19 @@
|
|||||||
|
# This configuration is for teaching kustomize how to update name ref and var substitution
|
||||||
|
nameReference:
|
||||||
|
- kind: Issuer
|
||||||
|
group: cert-manager.io
|
||||||
|
fieldSpecs:
|
||||||
|
- kind: Certificate
|
||||||
|
group: cert-manager.io
|
||||||
|
path: spec/issuerRef/name
|
||||||
|
|
||||||
|
varReference:
|
||||||
|
- kind: Certificate
|
||||||
|
group: cert-manager.io
|
||||||
|
path: spec/commonName
|
||||||
|
- kind: Certificate
|
||||||
|
group: cert-manager.io
|
||||||
|
path: spec/dnsNames
|
||||||
|
- kind: Certificate
|
||||||
|
group: cert-manager.io
|
||||||
|
path: spec/secretName
|
@ -0,0 +1,558 @@
|
|||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
controller-gen.kubebuilder.io/version: v0.2.9
|
||||||
|
creationTimestamp: null
|
||||||
|
name: openstackclusters.infrastructure.cluster.x-k8s.io
|
||||||
|
spec:
|
||||||
|
group: infrastructure.cluster.x-k8s.io
|
||||||
|
names:
|
||||||
|
categories:
|
||||||
|
- cluster-api
|
||||||
|
kind: OpenStackCluster
|
||||||
|
listKind: OpenStackClusterList
|
||||||
|
plural: openstackclusters
|
||||||
|
singular: openstackcluster
|
||||||
|
scope: Namespaced
|
||||||
|
versions:
|
||||||
|
- additionalPrinterColumns:
|
||||||
|
- description: Cluster to which this OpenStackCluster belongs
|
||||||
|
jsonPath: .metadata.labels.cluster\.x-k8s\.io/cluster-name
|
||||||
|
name: Cluster
|
||||||
|
type: string
|
||||||
|
- description: Cluster infrastructure is ready for OpenStack instances
|
||||||
|
jsonPath: .status.ready
|
||||||
|
name: Ready
|
||||||
|
type: string
|
||||||
|
- description: Network the cluster is using
|
||||||
|
jsonPath: .status.network.id
|
||||||
|
name: Network
|
||||||
|
type: string
|
||||||
|
- description: Subnet the cluster is using
|
||||||
|
jsonPath: .status.network.subnet.id
|
||||||
|
name: Subnet
|
||||||
|
type: string
|
||||||
|
- description: API Endpoint
|
||||||
|
jsonPath: .status.network.apiServerLoadBalancer.ip
|
||||||
|
name: Endpoint
|
||||||
|
priority: 1
|
||||||
|
type: string
|
||||||
|
name: v1alpha3
|
||||||
|
schema:
|
||||||
|
openAPIV3Schema:
|
||||||
|
description: OpenStackCluster is the Schema for the openstackclusters API
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: 'APIVersion defines the versioned schema of this representation
|
||||||
|
of an object. Servers should convert recognized schemas to the latest
|
||||||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: 'Kind is a string value representing the REST resource this
|
||||||
|
object represents. Servers may infer this from the endpoint the client
|
||||||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
description: OpenStackClusterSpec defines the desired state of OpenStackCluster
|
||||||
|
properties:
|
||||||
|
apiServerLoadBalancerAdditionalPorts:
|
||||||
|
description: APIServerLoadBalancerAdditionalPorts adds additional
|
||||||
|
ports to the APIServerLoadBalancer
|
||||||
|
items:
|
||||||
|
type: integer
|
||||||
|
type: array
|
||||||
|
apiServerLoadBalancerFloatingIP:
|
||||||
|
description: APIServerLoadBalancerFloatingIP is the floatingIP which
|
||||||
|
will be associated to the APIServer loadbalancer. The floatingIP
|
||||||
|
will be created if it not already exists.
|
||||||
|
type: string
|
||||||
|
apiServerLoadBalancerPort:
|
||||||
|
description: APIServerLoadBalancerPort is the port on which the listener
|
||||||
|
on the APIServer loadbalancer will be created
|
||||||
|
type: integer
|
||||||
|
caKeyPair:
|
||||||
|
description: CAKeyPair is the key pair for ca certs.
|
||||||
|
properties:
|
||||||
|
cert:
|
||||||
|
description: base64 encoded cert and key
|
||||||
|
format: byte
|
||||||
|
type: string
|
||||||
|
key:
|
||||||
|
format: byte
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
cloudName:
|
||||||
|
description: The name of the cloud to use from the clouds secret
|
||||||
|
type: string
|
||||||
|
cloudsSecret:
|
||||||
|
description: The name of the secret containing the openstack credentials
|
||||||
|
properties:
|
||||||
|
name:
|
||||||
|
description: Name is unique within a namespace to reference a
|
||||||
|
secret resource.
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: Namespace defines the space within which the secret
|
||||||
|
name must be unique.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
controlPlaneAvailabilityZones:
|
||||||
|
description: ControlPlaneAvailabilityZones is the az to deploy control
|
||||||
|
plane to
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
type: array
|
||||||
|
controlPlaneEndpoint:
|
||||||
|
description: ControlPlaneEndpoint represents the endpoint used to
|
||||||
|
communicate with the control plane.
|
||||||
|
properties:
|
||||||
|
host:
|
||||||
|
description: The hostname on which the API server is serving.
|
||||||
|
type: string
|
||||||
|
port:
|
||||||
|
description: The port on which the API server is serving.
|
||||||
|
format: int32
|
||||||
|
type: integer
|
||||||
|
required:
|
||||||
|
- host
|
||||||
|
- port
|
||||||
|
type: object
|
||||||
|
disablePortSecurity:
|
||||||
|
description: DisablePortSecurity disables the port security of the
|
||||||
|
network created for the Kubernetes cluster, which also disables
|
||||||
|
SecurityGroups
|
||||||
|
type: boolean
|
||||||
|
disableServerTags:
|
||||||
|
description: 'Default: True. In case of server tag errors, set to
|
||||||
|
False'
|
||||||
|
type: boolean
|
||||||
|
dnsNameservers:
|
||||||
|
description: DNSNameservers is the list of nameservers for OpenStack
|
||||||
|
Subnet being created. Set this value when you need create a new
|
||||||
|
network/subnet while the access through DNS is required.
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
type: array
|
||||||
|
etcdCAKeyPair:
|
||||||
|
description: EtcdCAKeyPair is the key pair for etcd.
|
||||||
|
properties:
|
||||||
|
cert:
|
||||||
|
description: base64 encoded cert and key
|
||||||
|
format: byte
|
||||||
|
type: string
|
||||||
|
key:
|
||||||
|
format: byte
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
externalNetworkId:
|
||||||
|
description: ExternalNetworkID is the ID of an external OpenStack
|
||||||
|
Network. This is necessary to get public internet to the VMs.
|
||||||
|
type: string
|
||||||
|
externalRouterIPs:
|
||||||
|
description: ExternalRouterIPs is an array of externalIPs on the respective
|
||||||
|
subnets. This is necessary if the router needs a fixed ip in a specific
|
||||||
|
subnet.
|
||||||
|
items:
|
||||||
|
properties:
|
||||||
|
fixedIP:
|
||||||
|
description: The FixedIP in the corresponding subnet
|
||||||
|
type: string
|
||||||
|
subnet:
|
||||||
|
description: The subnet in which the FixedIP is used for the
|
||||||
|
Gateway of this router
|
||||||
|
properties:
|
||||||
|
filter:
|
||||||
|
description: Filters for optional network query
|
||||||
|
properties:
|
||||||
|
cidr:
|
||||||
|
type: string
|
||||||
|
description:
|
||||||
|
type: string
|
||||||
|
enableDhcp:
|
||||||
|
type: boolean
|
||||||
|
gateway_ip:
|
||||||
|
type: string
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
ipVersion:
|
||||||
|
type: integer
|
||||||
|
ipv6AddressMode:
|
||||||
|
type: string
|
||||||
|
ipv6RaMode:
|
||||||
|
type: string
|
||||||
|
limit:
|
||||||
|
type: integer
|
||||||
|
marker:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
networkId:
|
||||||
|
type: string
|
||||||
|
notTags:
|
||||||
|
type: string
|
||||||
|
notTagsAny:
|
||||||
|
type: string
|
||||||
|
projectId:
|
||||||
|
type: string
|
||||||
|
sortDir:
|
||||||
|
type: string
|
||||||
|
sortKey:
|
||||||
|
type: string
|
||||||
|
subnetpoolId:
|
||||||
|
type: string
|
||||||
|
tags:
|
||||||
|
type: string
|
||||||
|
tagsAny:
|
||||||
|
type: string
|
||||||
|
tenantId:
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
uuid:
|
||||||
|
description: The UUID of the network. Required if you omit
|
||||||
|
the port attribute.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- subnet
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
frontProxyCAKeyPair:
|
||||||
|
description: FrontProxyCAKeyPair is the key pair for FrontProxyKeyPair.
|
||||||
|
properties:
|
||||||
|
cert:
|
||||||
|
description: base64 encoded cert and key
|
||||||
|
format: byte
|
||||||
|
type: string
|
||||||
|
key:
|
||||||
|
format: byte
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
managedAPIServerLoadBalancer:
|
||||||
|
description: 'ManagedAPIServerLoadBalancer defines whether a LoadBalancer
|
||||||
|
for the APIServer should be created. If set to true the following
|
||||||
|
properties are mandatory: APIServerLoadBalancerFloatingIP, APIServerLoadBalancerPort'
|
||||||
|
type: boolean
|
||||||
|
managedSecurityGroups:
|
||||||
|
description: 'ManagedSecurityGroups defines that kubernetes manages
|
||||||
|
the OpenStack security groups for now, that means that we''ll create
|
||||||
|
security group allows traffic to/from machines belonging to that
|
||||||
|
group based on Calico CNI plugin default network requirements: BGP
|
||||||
|
and IP-in-IP for master node(s) and worker node(s) respectively.
|
||||||
|
In the future, we could make this more flexible.'
|
||||||
|
type: boolean
|
||||||
|
network:
|
||||||
|
description: If NodeCIDR cannot be set this can be used to detect
|
||||||
|
an existing network.
|
||||||
|
properties:
|
||||||
|
adminStateUp:
|
||||||
|
type: boolean
|
||||||
|
description:
|
||||||
|
type: string
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
limit:
|
||||||
|
type: integer
|
||||||
|
marker:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
notTags:
|
||||||
|
type: string
|
||||||
|
notTagsAny:
|
||||||
|
type: string
|
||||||
|
projectId:
|
||||||
|
type: string
|
||||||
|
shared:
|
||||||
|
type: boolean
|
||||||
|
sortDir:
|
||||||
|
type: string
|
||||||
|
sortKey:
|
||||||
|
type: string
|
||||||
|
status:
|
||||||
|
type: string
|
||||||
|
tags:
|
||||||
|
type: string
|
||||||
|
tagsAny:
|
||||||
|
type: string
|
||||||
|
tenantId:
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
nodeCidr:
|
||||||
|
description: NodeCIDR is the OpenStack Subnet to be created. Cluster
|
||||||
|
actuator will create a network, a subnet with NodeCIDR, and a router
|
||||||
|
connected to this subnet. If you leave this empty, no network will
|
||||||
|
be created.
|
||||||
|
type: string
|
||||||
|
saKeyPair:
|
||||||
|
description: SAKeyPair is the service account key pair.
|
||||||
|
properties:
|
||||||
|
cert:
|
||||||
|
description: base64 encoded cert and key
|
||||||
|
format: byte
|
||||||
|
type: string
|
||||||
|
key:
|
||||||
|
format: byte
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
subnet:
|
||||||
|
description: If NodeCIDR cannot be set this can be used to detect
|
||||||
|
an existing subnet.
|
||||||
|
properties:
|
||||||
|
cidr:
|
||||||
|
type: string
|
||||||
|
description:
|
||||||
|
type: string
|
||||||
|
enableDhcp:
|
||||||
|
type: boolean
|
||||||
|
gateway_ip:
|
||||||
|
type: string
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
ipVersion:
|
||||||
|
type: integer
|
||||||
|
ipv6AddressMode:
|
||||||
|
type: string
|
||||||
|
ipv6RaMode:
|
||||||
|
type: string
|
||||||
|
limit:
|
||||||
|
type: integer
|
||||||
|
marker:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
networkId:
|
||||||
|
type: string
|
||||||
|
notTags:
|
||||||
|
type: string
|
||||||
|
notTagsAny:
|
||||||
|
type: string
|
||||||
|
projectId:
|
||||||
|
type: string
|
||||||
|
sortDir:
|
||||||
|
type: string
|
||||||
|
sortKey:
|
||||||
|
type: string
|
||||||
|
subnetpoolId:
|
||||||
|
type: string
|
||||||
|
tags:
|
||||||
|
type: string
|
||||||
|
tagsAny:
|
||||||
|
type: string
|
||||||
|
tenantId:
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
tags:
|
||||||
|
description: Tags for all resources in cluster
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
type: array
|
||||||
|
useOctavia:
|
||||||
|
description: UseOctavia is weather LoadBalancer Service is Octavia
|
||||||
|
or not
|
||||||
|
type: boolean
|
||||||
|
type: object
|
||||||
|
status:
|
||||||
|
description: OpenStackClusterStatus defines the observed state of OpenStackCluster
|
||||||
|
properties:
|
||||||
|
controlPlaneSecurityGroup:
|
||||||
|
description: 'ControlPlaneSecurityGroups contains all the information
|
||||||
|
about the OpenStack Security Group that needs to be applied to control
|
||||||
|
plane nodes. TODO: Maybe instead of two properties, we add a property
|
||||||
|
to the group?'
|
||||||
|
properties:
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
rules:
|
||||||
|
items:
|
||||||
|
description: SecurityGroupRule represent the basic information
|
||||||
|
of the associated OpenStack Security Group Role.
|
||||||
|
properties:
|
||||||
|
description:
|
||||||
|
type: string
|
||||||
|
direction:
|
||||||
|
type: string
|
||||||
|
etherType:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
portRangeMax:
|
||||||
|
type: integer
|
||||||
|
portRangeMin:
|
||||||
|
type: integer
|
||||||
|
protocol:
|
||||||
|
type: string
|
||||||
|
remoteGroupID:
|
||||||
|
type: string
|
||||||
|
remoteIPPrefix:
|
||||||
|
type: string
|
||||||
|
securityGroupID:
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- description
|
||||||
|
- direction
|
||||||
|
- etherType
|
||||||
|
- name
|
||||||
|
- portRangeMax
|
||||||
|
- portRangeMin
|
||||||
|
- protocol
|
||||||
|
- remoteGroupID
|
||||||
|
- remoteIPPrefix
|
||||||
|
- securityGroupID
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
required:
|
||||||
|
- id
|
||||||
|
- name
|
||||||
|
- rules
|
||||||
|
type: object
|
||||||
|
failureDomains:
|
||||||
|
additionalProperties:
|
||||||
|
description: FailureDomainSpec is the Schema for Cluster API failure
|
||||||
|
domains. It allows controllers to understand how many failure
|
||||||
|
domains a cluster can optionally span across.
|
||||||
|
properties:
|
||||||
|
attributes:
|
||||||
|
additionalProperties:
|
||||||
|
type: string
|
||||||
|
description: Attributes is a free form map of attributes an
|
||||||
|
infrastructure provider might use or require.
|
||||||
|
type: object
|
||||||
|
controlPlane:
|
||||||
|
description: ControlPlane determines if this failure domain
|
||||||
|
is suitable for use by control plane machines.
|
||||||
|
type: boolean
|
||||||
|
type: object
|
||||||
|
description: FailureDomains represent OpenStack availability zones
|
||||||
|
type: object
|
||||||
|
network:
|
||||||
|
description: Network contains all information about the created OpenStack
|
||||||
|
Network. It includes Subnets and Router.
|
||||||
|
properties:
|
||||||
|
apiServerLoadBalancer:
|
||||||
|
description: Be careful when using APIServerLoadBalancer, because
|
||||||
|
this field is optional and therefore not set in all cases
|
||||||
|
properties:
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
internalIP:
|
||||||
|
type: string
|
||||||
|
ip:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- id
|
||||||
|
- internalIP
|
||||||
|
- ip
|
||||||
|
- name
|
||||||
|
type: object
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
router:
|
||||||
|
description: Router represents basic information about the associated
|
||||||
|
OpenStack Neutron Router
|
||||||
|
properties:
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- id
|
||||||
|
- name
|
||||||
|
type: object
|
||||||
|
subnet:
|
||||||
|
description: Subnet represents basic information about the associated
|
||||||
|
OpenStack Neutron Subnet
|
||||||
|
properties:
|
||||||
|
cidr:
|
||||||
|
type: string
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- cidr
|
||||||
|
- id
|
||||||
|
- name
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- id
|
||||||
|
- name
|
||||||
|
type: object
|
||||||
|
ready:
|
||||||
|
type: boolean
|
||||||
|
workerSecurityGroup:
|
||||||
|
description: WorkerSecurityGroup contains all the information about
|
||||||
|
the OpenStack Security Group that needs to be applied to worker
|
||||||
|
nodes.
|
||||||
|
properties:
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
rules:
|
||||||
|
items:
|
||||||
|
description: SecurityGroupRule represent the basic information
|
||||||
|
of the associated OpenStack Security Group Role.
|
||||||
|
properties:
|
||||||
|
description:
|
||||||
|
type: string
|
||||||
|
direction:
|
||||||
|
type: string
|
||||||
|
etherType:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
portRangeMax:
|
||||||
|
type: integer
|
||||||
|
portRangeMin:
|
||||||
|
type: integer
|
||||||
|
protocol:
|
||||||
|
type: string
|
||||||
|
remoteGroupID:
|
||||||
|
type: string
|
||||||
|
remoteIPPrefix:
|
||||||
|
type: string
|
||||||
|
securityGroupID:
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- description
|
||||||
|
- direction
|
||||||
|
- etherType
|
||||||
|
- name
|
||||||
|
- portRangeMax
|
||||||
|
- portRangeMin
|
||||||
|
- protocol
|
||||||
|
- remoteGroupID
|
||||||
|
- remoteIPPrefix
|
||||||
|
- securityGroupID
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
required:
|
||||||
|
- id
|
||||||
|
- name
|
||||||
|
- rules
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- ready
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
served: true
|
||||||
|
storage: true
|
||||||
|
subresources:
|
||||||
|
status: {}
|
||||||
|
status:
|
||||||
|
acceptedNames:
|
||||||
|
kind: ""
|
||||||
|
plural: ""
|
||||||
|
conditions: []
|
||||||
|
storedVersions: []
|
@ -0,0 +1,355 @@
|
|||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
controller-gen.kubebuilder.io/version: v0.2.9
|
||||||
|
creationTimestamp: null
|
||||||
|
name: openstackmachines.infrastructure.cluster.x-k8s.io
|
||||||
|
spec:
|
||||||
|
group: infrastructure.cluster.x-k8s.io
|
||||||
|
names:
|
||||||
|
categories:
|
||||||
|
- cluster-api
|
||||||
|
kind: OpenStackMachine
|
||||||
|
listKind: OpenStackMachineList
|
||||||
|
plural: openstackmachines
|
||||||
|
singular: openstackmachine
|
||||||
|
scope: Namespaced
|
||||||
|
versions:
|
||||||
|
- additionalPrinterColumns:
|
||||||
|
- description: Cluster to which this OpenStackMachine belongs
|
||||||
|
jsonPath: .metadata.labels.cluster\.x-k8s\.io/cluster-name
|
||||||
|
name: Cluster
|
||||||
|
type: string
|
||||||
|
- description: OpenStack instance state
|
||||||
|
jsonPath: .status.instanceState
|
||||||
|
name: State
|
||||||
|
type: string
|
||||||
|
- description: Machine ready status
|
||||||
|
jsonPath: .status.ready
|
||||||
|
name: Ready
|
||||||
|
type: string
|
||||||
|
- description: OpenStack instance ID
|
||||||
|
jsonPath: .spec.providerID
|
||||||
|
name: InstanceID
|
||||||
|
type: string
|
||||||
|
- description: Machine object which owns with this OpenStackMachine
|
||||||
|
jsonPath: .metadata.ownerReferences[?(@.kind=="Machine")].name
|
||||||
|
name: Machine
|
||||||
|
type: string
|
||||||
|
name: v1alpha3
|
||||||
|
schema:
|
||||||
|
openAPIV3Schema:
|
||||||
|
description: OpenStackMachine is the Schema for the openstackmachines API
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: 'APIVersion defines the versioned schema of this representation
|
||||||
|
of an object. Servers should convert recognized schemas to the latest
|
||||||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: 'Kind is a string value representing the REST resource this
|
||||||
|
object represents. Servers may infer this from the endpoint the client
|
||||||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
description: OpenStackMachineSpec defines the desired state of OpenStackMachine
|
||||||
|
properties:
|
||||||
|
cloudName:
|
||||||
|
description: The name of the cloud to use from the clouds secret
|
||||||
|
type: string
|
||||||
|
cloudsSecret:
|
||||||
|
description: The name of the secret containing the openstack credentials
|
||||||
|
properties:
|
||||||
|
name:
|
||||||
|
description: Name is unique within a namespace to reference a
|
||||||
|
secret resource.
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: Namespace defines the space within which the secret
|
||||||
|
name must be unique.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
configDrive:
|
||||||
|
description: Config Drive support
|
||||||
|
type: boolean
|
||||||
|
flavor:
|
||||||
|
description: The flavor reference for the flavor for your server instance.
|
||||||
|
type: string
|
||||||
|
floatingIP:
|
||||||
|
description: The floatingIP which will be associated to the machine,
|
||||||
|
only used for master. The floatingIP should have been created and
|
||||||
|
haven't been associated.
|
||||||
|
type: string
|
||||||
|
image:
|
||||||
|
description: The name of the image to use for your server instance.
|
||||||
|
If the RootVolume is specified, this will be ignored and use rootVolume
|
||||||
|
directly.
|
||||||
|
type: string
|
||||||
|
networks:
|
||||||
|
description: A networks object. Required parameter when there are
|
||||||
|
multiple networks defined for the tenant. When you do not specify
|
||||||
|
the networks parameter, the server attaches to the only network
|
||||||
|
created for the current tenant.
|
||||||
|
items:
|
||||||
|
properties:
|
||||||
|
filter:
|
||||||
|
description: Filters for optional network query
|
||||||
|
properties:
|
||||||
|
adminStateUp:
|
||||||
|
type: boolean
|
||||||
|
description:
|
||||||
|
type: string
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
limit:
|
||||||
|
type: integer
|
||||||
|
marker:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
notTags:
|
||||||
|
type: string
|
||||||
|
notTagsAny:
|
||||||
|
type: string
|
||||||
|
projectId:
|
||||||
|
type: string
|
||||||
|
shared:
|
||||||
|
type: boolean
|
||||||
|
sortDir:
|
||||||
|
type: string
|
||||||
|
sortKey:
|
||||||
|
type: string
|
||||||
|
status:
|
||||||
|
type: string
|
||||||
|
tags:
|
||||||
|
type: string
|
||||||
|
tagsAny:
|
||||||
|
type: string
|
||||||
|
tenantId:
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
fixedIp:
|
||||||
|
description: A fixed IPv4 address for the NIC.
|
||||||
|
type: string
|
||||||
|
subnets:
|
||||||
|
description: Subnet within a network to use
|
||||||
|
items:
|
||||||
|
properties:
|
||||||
|
filter:
|
||||||
|
description: Filters for optional network query
|
||||||
|
properties:
|
||||||
|
cidr:
|
||||||
|
type: string
|
||||||
|
description:
|
||||||
|
type: string
|
||||||
|
enableDhcp:
|
||||||
|
type: boolean
|
||||||
|
gateway_ip:
|
||||||
|
type: string
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
ipVersion:
|
||||||
|
type: integer
|
||||||
|
ipv6AddressMode:
|
||||||
|
type: string
|
||||||
|
ipv6RaMode:
|
||||||
|
type: string
|
||||||
|
limit:
|
||||||
|
type: integer
|
||||||
|
marker:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
networkId:
|
||||||
|
type: string
|
||||||
|
notTags:
|
||||||
|
type: string
|
||||||
|
notTagsAny:
|
||||||
|
type: string
|
||||||
|
projectId:
|
||||||
|
type: string
|
||||||
|
sortDir:
|
||||||
|
type: string
|
||||||
|
sortKey:
|
||||||
|
type: string
|
||||||
|
subnetpoolId:
|
||||||
|
type: string
|
||||||
|
tags:
|
||||||
|
type: string
|
||||||
|
tagsAny:
|
||||||
|
type: string
|
||||||
|
tenantId:
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
uuid:
|
||||||
|
description: The UUID of the network. Required if you
|
||||||
|
omit the port attribute.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
uuid:
|
||||||
|
description: The UUID of the network. Required if you omit the
|
||||||
|
port attribute.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
providerID:
|
||||||
|
description: ProviderID is the unique identifier as specified by the
|
||||||
|
cloud provider.
|
||||||
|
type: string
|
||||||
|
rootVolume:
|
||||||
|
description: The volume metadata to boot from
|
||||||
|
properties:
|
||||||
|
deviceType:
|
||||||
|
type: string
|
||||||
|
diskSize:
|
||||||
|
type: integer
|
||||||
|
sourceType:
|
||||||
|
type: string
|
||||||
|
sourceUUID:
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
securityGroups:
|
||||||
|
description: The names of the security groups to assign to the instance
|
||||||
|
items:
|
||||||
|
properties:
|
||||||
|
filter:
|
||||||
|
description: Filters used to query security groups in openstack
|
||||||
|
properties:
|
||||||
|
description:
|
||||||
|
type: string
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
limit:
|
||||||
|
type: integer
|
||||||
|
marker:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
notTags:
|
||||||
|
type: string
|
||||||
|
notTagsAny:
|
||||||
|
type: string
|
||||||
|
projectId:
|
||||||
|
type: string
|
||||||
|
sortDir:
|
||||||
|
type: string
|
||||||
|
sortKey:
|
||||||
|
type: string
|
||||||
|
tags:
|
||||||
|
type: string
|
||||||
|
tagsAny:
|
||||||
|
type: string
|
||||||
|
tenantId:
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
name:
|
||||||
|
description: Security Group name
|
||||||
|
type: string
|
||||||
|
uuid:
|
||||||
|
description: Security Group UID
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
serverGroupID:
|
||||||
|
description: The server group to assign the machine to
|
||||||
|
type: string
|
||||||
|
serverMetadata:
|
||||||
|
additionalProperties:
|
||||||
|
type: string
|
||||||
|
description: Metadata mapping. Allows you to create a map of key value
|
||||||
|
pairs to add to the server instance.
|
||||||
|
type: object
|
||||||
|
sshKeyName:
|
||||||
|
description: The ssh key to inject in the instance
|
||||||
|
type: string
|
||||||
|
tags:
|
||||||
|
description: Machine tags Requires Nova api 2.52 minimum!
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
type: array
|
||||||
|
trunk:
|
||||||
|
description: Whether the server instance is created on a trunk port
|
||||||
|
or not.
|
||||||
|
type: boolean
|
||||||
|
userDataSecret:
|
||||||
|
description: The name of the secret containing the user data (startup
|
||||||
|
script in most cases)
|
||||||
|
properties:
|
||||||
|
name:
|
||||||
|
description: Name is unique within a namespace to reference a
|
||||||
|
secret resource.
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: Namespace defines the space within which the secret
|
||||||
|
name must be unique.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- flavor
|
||||||
|
- image
|
||||||
|
type: object
|
||||||
|
status:
|
||||||
|
description: OpenStackMachineStatus defines the observed state of OpenStackMachine
|
||||||
|
properties:
|
||||||
|
addresses:
|
||||||
|
description: Addresses contains the OpenStack instance associated
|
||||||
|
addresses.
|
||||||
|
items:
|
||||||
|
description: NodeAddress contains information for the node's address.
|
||||||
|
properties:
|
||||||
|
address:
|
||||||
|
description: The node address.
|
||||||
|
type: string
|
||||||
|
type:
|
||||||
|
description: Node address type, one of Hostname, ExternalIP
|
||||||
|
or InternalIP.
|
||||||
|
type: string
|
||||||
|
required:
|
||||||
|
- address
|
||||||
|
- type
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
errorMessage:
|
||||||
|
description: "FailureMessage will be set in the event that there is
|
||||||
|
a terminal problem reconciling the Machine and will contain a more
|
||||||
|
verbose string suitable for logging and human consumption. \n This
|
||||||
|
field should not be set for transitive errors that a controller
|
||||||
|
faces that are expected to be fixed automatically over time (like
|
||||||
|
service outages), but instead indicate that something is fundamentally
|
||||||
|
wrong with the Machine's spec or the configuration of the controller,
|
||||||
|
and that manual intervention is required. Examples of terminal errors
|
||||||
|
would be invalid combinations of settings in the spec, values that
|
||||||
|
are unsupported by the controller, or the responsible controller
|
||||||
|
itself being critically misconfigured. \n Any transient errors that
|
||||||
|
occur during the reconciliation of Machines can be added as events
|
||||||
|
to the Machine object and/or logged in the controller's output."
|
||||||
|
type: string
|
||||||
|
errorReason:
|
||||||
|
description: Constants aren't automatically generated for unversioned
|
||||||
|
packages. Instead share the same constant for all versioned packages
|
||||||
|
type: string
|
||||||
|
instanceState:
|
||||||
|
description: InstanceState is the state of the OpenStack instance
|
||||||
|
for this machine.
|
||||||
|
type: string
|
||||||
|
ready:
|
||||||
|
description: Ready is true when the provider resource is ready.
|
||||||
|
type: boolean
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
served: true
|
||||||
|
storage: true
|
||||||
|
subresources:
|
||||||
|
status: {}
|
||||||
|
status:
|
||||||
|
acceptedNames:
|
||||||
|
kind: ""
|
||||||
|
plural: ""
|
||||||
|
conditions: []
|
||||||
|
storedVersions: []
|
@ -0,0 +1,305 @@
|
|||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
controller-gen.kubebuilder.io/version: v0.2.9
|
||||||
|
creationTimestamp: null
|
||||||
|
name: openstackmachinetemplates.infrastructure.cluster.x-k8s.io
|
||||||
|
spec:
|
||||||
|
group: infrastructure.cluster.x-k8s.io
|
||||||
|
names:
|
||||||
|
categories:
|
||||||
|
- cluster-api
|
||||||
|
kind: OpenStackMachineTemplate
|
||||||
|
listKind: OpenStackMachineTemplateList
|
||||||
|
plural: openstackmachinetemplates
|
||||||
|
singular: openstackmachinetemplate
|
||||||
|
scope: Namespaced
|
||||||
|
versions:
|
||||||
|
- name: v1alpha3
|
||||||
|
schema:
|
||||||
|
openAPIV3Schema:
|
||||||
|
description: OpenStackMachineTemplate is the Schema for the openstackmachinetemplates
|
||||||
|
API
|
||||||
|
properties:
|
||||||
|
apiVersion:
|
||||||
|
description: 'APIVersion defines the versioned schema of this representation
|
||||||
|
of an object. Servers should convert recognized schemas to the latest
|
||||||
|
internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources'
|
||||||
|
type: string
|
||||||
|
kind:
|
||||||
|
description: 'Kind is a string value representing the REST resource this
|
||||||
|
object represents. Servers may infer this from the endpoint the client
|
||||||
|
submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds'
|
||||||
|
type: string
|
||||||
|
metadata:
|
||||||
|
type: object
|
||||||
|
spec:
|
||||||
|
description: OpenStackMachineTemplateSpec defines the desired state of
|
||||||
|
OpenStackMachineTemplate
|
||||||
|
properties:
|
||||||
|
template:
|
||||||
|
description: OpenStackMachineTemplateResource describes the data needed
|
||||||
|
to create a OpenStackMachine from a template
|
||||||
|
properties:
|
||||||
|
spec:
|
||||||
|
description: Spec is the specification of the desired behavior
|
||||||
|
of the machine.
|
||||||
|
properties:
|
||||||
|
cloudName:
|
||||||
|
description: The name of the cloud to use from the clouds
|
||||||
|
secret
|
||||||
|
type: string
|
||||||
|
cloudsSecret:
|
||||||
|
description: The name of the secret containing the openstack
|
||||||
|
credentials
|
||||||
|
properties:
|
||||||
|
name:
|
||||||
|
description: Name is unique within a namespace to reference
|
||||||
|
a secret resource.
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: Namespace defines the space within which
|
||||||
|
the secret name must be unique.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
configDrive:
|
||||||
|
description: Config Drive support
|
||||||
|
type: boolean
|
||||||
|
flavor:
|
||||||
|
description: The flavor reference for the flavor for your
|
||||||
|
server instance.
|
||||||
|
type: string
|
||||||
|
floatingIP:
|
||||||
|
description: The floatingIP which will be associated to the
|
||||||
|
machine, only used for master. The floatingIP should have
|
||||||
|
been created and haven't been associated.
|
||||||
|
type: string
|
||||||
|
image:
|
||||||
|
description: The name of the image to use for your server
|
||||||
|
instance. If the RootVolume is specified, this will be ignored
|
||||||
|
and use rootVolume directly.
|
||||||
|
type: string
|
||||||
|
networks:
|
||||||
|
description: A networks object. Required parameter when there
|
||||||
|
are multiple networks defined for the tenant. When you do
|
||||||
|
not specify the networks parameter, the server attaches
|
||||||
|
to the only network created for the current tenant.
|
||||||
|
items:
|
||||||
|
properties:
|
||||||
|
filter:
|
||||||
|
description: Filters for optional network query
|
||||||
|
properties:
|
||||||
|
adminStateUp:
|
||||||
|
type: boolean
|
||||||
|
description:
|
||||||
|
type: string
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
limit:
|
||||||
|
type: integer
|
||||||
|
marker:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
notTags:
|
||||||
|
type: string
|
||||||
|
notTagsAny:
|
||||||
|
type: string
|
||||||
|
projectId:
|
||||||
|
type: string
|
||||||
|
shared:
|
||||||
|
type: boolean
|
||||||
|
sortDir:
|
||||||
|
type: string
|
||||||
|
sortKey:
|
||||||
|
type: string
|
||||||
|
status:
|
||||||
|
type: string
|
||||||
|
tags:
|
||||||
|
type: string
|
||||||
|
tagsAny:
|
||||||
|
type: string
|
||||||
|
tenantId:
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
fixedIp:
|
||||||
|
description: A fixed IPv4 address for the NIC.
|
||||||
|
type: string
|
||||||
|
subnets:
|
||||||
|
description: Subnet within a network to use
|
||||||
|
items:
|
||||||
|
properties:
|
||||||
|
filter:
|
||||||
|
description: Filters for optional network query
|
||||||
|
properties:
|
||||||
|
cidr:
|
||||||
|
type: string
|
||||||
|
description:
|
||||||
|
type: string
|
||||||
|
enableDhcp:
|
||||||
|
type: boolean
|
||||||
|
gateway_ip:
|
||||||
|
type: string
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
ipVersion:
|
||||||
|
type: integer
|
||||||
|
ipv6AddressMode:
|
||||||
|
type: string
|
||||||
|
ipv6RaMode:
|
||||||
|
type: string
|
||||||
|
limit:
|
||||||
|
type: integer
|
||||||
|
marker:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
networkId:
|
||||||
|
type: string
|
||||||
|
notTags:
|
||||||
|
type: string
|
||||||
|
notTagsAny:
|
||||||
|
type: string
|
||||||
|
projectId:
|
||||||
|
type: string
|
||||||
|
sortDir:
|
||||||
|
type: string
|
||||||
|
sortKey:
|
||||||
|
type: string
|
||||||
|
subnetpoolId:
|
||||||
|
type: string
|
||||||
|
tags:
|
||||||
|
type: string
|
||||||
|
tagsAny:
|
||||||
|
type: string
|
||||||
|
tenantId:
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
uuid:
|
||||||
|
description: The UUID of the network. Required
|
||||||
|
if you omit the port attribute.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
uuid:
|
||||||
|
description: The UUID of the network. Required if you
|
||||||
|
omit the port attribute.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
providerID:
|
||||||
|
description: ProviderID is the unique identifier as specified
|
||||||
|
by the cloud provider.
|
||||||
|
type: string
|
||||||
|
rootVolume:
|
||||||
|
description: The volume metadata to boot from
|
||||||
|
properties:
|
||||||
|
deviceType:
|
||||||
|
type: string
|
||||||
|
diskSize:
|
||||||
|
type: integer
|
||||||
|
sourceType:
|
||||||
|
type: string
|
||||||
|
sourceUUID:
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
securityGroups:
|
||||||
|
description: The names of the security groups to assign to
|
||||||
|
the instance
|
||||||
|
items:
|
||||||
|
properties:
|
||||||
|
filter:
|
||||||
|
description: Filters used to query security groups in
|
||||||
|
openstack
|
||||||
|
properties:
|
||||||
|
description:
|
||||||
|
type: string
|
||||||
|
id:
|
||||||
|
type: string
|
||||||
|
limit:
|
||||||
|
type: integer
|
||||||
|
marker:
|
||||||
|
type: string
|
||||||
|
name:
|
||||||
|
type: string
|
||||||
|
notTags:
|
||||||
|
type: string
|
||||||
|
notTagsAny:
|
||||||
|
type: string
|
||||||
|
projectId:
|
||||||
|
type: string
|
||||||
|
sortDir:
|
||||||
|
type: string
|
||||||
|
sortKey:
|
||||||
|
type: string
|
||||||
|
tags:
|
||||||
|
type: string
|
||||||
|
tagsAny:
|
||||||
|
type: string
|
||||||
|
tenantId:
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
name:
|
||||||
|
description: Security Group name
|
||||||
|
type: string
|
||||||
|
uuid:
|
||||||
|
description: Security Group UID
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
type: array
|
||||||
|
serverGroupID:
|
||||||
|
description: The server group to assign the machine to
|
||||||
|
type: string
|
||||||
|
serverMetadata:
|
||||||
|
additionalProperties:
|
||||||
|
type: string
|
||||||
|
description: Metadata mapping. Allows you to create a map
|
||||||
|
of key value pairs to add to the server instance.
|
||||||
|
type: object
|
||||||
|
sshKeyName:
|
||||||
|
description: The ssh key to inject in the instance
|
||||||
|
type: string
|
||||||
|
tags:
|
||||||
|
description: Machine tags Requires Nova api 2.52 minimum!
|
||||||
|
items:
|
||||||
|
type: string
|
||||||
|
type: array
|
||||||
|
trunk:
|
||||||
|
description: Whether the server instance is created on a trunk
|
||||||
|
port or not.
|
||||||
|
type: boolean
|
||||||
|
userDataSecret:
|
||||||
|
description: The name of the secret containing the user data
|
||||||
|
(startup script in most cases)
|
||||||
|
properties:
|
||||||
|
name:
|
||||||
|
description: Name is unique within a namespace to reference
|
||||||
|
a secret resource.
|
||||||
|
type: string
|
||||||
|
namespace:
|
||||||
|
description: Namespace defines the space within which
|
||||||
|
the secret name must be unique.
|
||||||
|
type: string
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- flavor
|
||||||
|
- image
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- spec
|
||||||
|
type: object
|
||||||
|
required:
|
||||||
|
- template
|
||||||
|
type: object
|
||||||
|
type: object
|
||||||
|
served: true
|
||||||
|
storage: true
|
||||||
|
status:
|
||||||
|
acceptedNames:
|
||||||
|
kind: ""
|
||||||
|
plural: ""
|
||||||
|
conditions: []
|
||||||
|
storedVersions: []
|
30
manifests/function/capo/v0.3.1/crd/kustomization.yaml
Normal file
30
manifests/function/capo/v0.3.1/crd/kustomization.yaml
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
commonLabels:
|
||||||
|
cluster.x-k8s.io/v1alpha3: v1alpha3
|
||||||
|
|
||||||
|
# This kustomization.yaml is not intended to be run by itself,
|
||||||
|
# since it depends on service name and namespace that are out of this kustomize package.
|
||||||
|
# It should be run by config/
|
||||||
|
resources:
|
||||||
|
- bases/infrastructure.cluster.x-k8s.io_openstackclusters.yaml
|
||||||
|
- bases/infrastructure.cluster.x-k8s.io_openstackmachines.yaml
|
||||||
|
- bases/infrastructure.cluster.x-k8s.io_openstackmachinetemplates.yaml
|
||||||
|
# +kubebuilder:scaffold:crdkustomizeresource
|
||||||
|
|
||||||
|
patchesStrategicMerge:
|
||||||
|
# [WEBHOOK] To enable webhook, uncomment all the sections with [WEBHOOK] prefix.
|
||||||
|
# patches here are for enabling the conversion webhook for each CRD
|
||||||
|
- patches/webhook_in_openstackclusters.yaml
|
||||||
|
- patches/webhook_in_openstackmachines.yaml
|
||||||
|
- patches/webhook_in_openstackmachinetemplates.yaml
|
||||||
|
# +kubebuilder:scaffold:crdkustomizewebhookpatch
|
||||||
|
|
||||||
|
# [CERTMANAGER] To enable webhook, uncomment all the sections with [CERTMANAGER] prefix.
|
||||||
|
# patches here are for enabling the CA injection for each CRD
|
||||||
|
- patches/cainjection_in_openstackclusters.yaml
|
||||||
|
- patches/cainjection_in_openstackmachines.yaml
|
||||||
|
- patches/cainjection_in_openstackmachinetemplates.yaml
|
||||||
|
# +kubebuilder:scaffold:crdkustomizecainjectionpatch
|
||||||
|
|
||||||
|
# the following config is for teaching kustomize how to do kustomization for CRDs.
|
||||||
|
configurations:
|
||||||
|
- kustomizeconfig.yaml
|
17
manifests/function/capo/v0.3.1/crd/kustomizeconfig.yaml
Normal file
17
manifests/function/capo/v0.3.1/crd/kustomizeconfig.yaml
Normal file
@ -0,0 +1,17 @@
|
|||||||
|
# This file is for teaching kustomize how to substitute name and namespace reference in CRD
|
||||||
|
nameReference:
|
||||||
|
- kind: Service
|
||||||
|
version: v1
|
||||||
|
fieldSpecs:
|
||||||
|
- kind: CustomResourceDefinition
|
||||||
|
group: apiextensions.k8s.io
|
||||||
|
path: spec/conversion/webhook/clientConfig/service/name
|
||||||
|
|
||||||
|
namespace:
|
||||||
|
- kind: CustomResourceDefinition
|
||||||
|
group: apiextensions.k8s.io
|
||||||
|
path: spec/conversion/webhook/clientConfig/service/namespace
|
||||||
|
create: false
|
||||||
|
|
||||||
|
varReference:
|
||||||
|
- path: metadata/annotations
|
@ -0,0 +1,8 @@
|
|||||||
|
# The following patch adds a directive for certmanager to inject CA into the CRD
|
||||||
|
# CRD conversion requires k8s 1.13 or later.
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
cert-manager.io/inject-ca-from: $(CERTIFICATE_NAMESPACE)/$(CERTIFICATE_NAME)
|
||||||
|
name: openstackclusters.infrastructure.cluster.x-k8s.io
|
@ -0,0 +1,8 @@
|
|||||||
|
# The following patch adds a directive for certmanager to inject CA into the CRD
|
||||||
|
# CRD conversion requires k8s 1.13 or later.
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
cert-manager.io/inject-ca-from: $(CERTIFICATE_NAMESPACE)/$(CERTIFICATE_NAME)
|
||||||
|
name: openstackmachines.infrastructure.cluster.x-k8s.io
|
@ -0,0 +1,8 @@
|
|||||||
|
# The following patch adds a directive for certmanager to inject CA into the CRD
|
||||||
|
# CRD conversion requires k8s 1.13 or later.
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
cert-manager.io/inject-ca-from: $(CERTIFICATE_NAMESPACE)/$(CERTIFICATE_NAME)
|
||||||
|
name: openstackmachinetemplates.infrastructure.cluster.x-k8s.io
|
@ -0,0 +1,19 @@
|
|||||||
|
# The following patch enables conversion webhook for CRD
|
||||||
|
# CRD conversion requires k8s 1.13 or later.
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
name: openstackclusters.infrastructure.cluster.x-k8s.io
|
||||||
|
spec:
|
||||||
|
conversion:
|
||||||
|
strategy: Webhook
|
||||||
|
webhook:
|
||||||
|
conversionReviewVersions: ["v1", "v1beta1"]
|
||||||
|
clientConfig:
|
||||||
|
# this is "\n" used as a placeholder, otherwise it will be rejected by the apiserver for being blank,
|
||||||
|
# but we're going to set it later using the cert-manager (or potentially a patch if not using cert-manager)
|
||||||
|
caBundle: Cg==
|
||||||
|
service:
|
||||||
|
namespace: system
|
||||||
|
name: webhook-service
|
||||||
|
path: /convert
|
@ -0,0 +1,19 @@
|
|||||||
|
# The following patch enables conversion webhook for CRD
|
||||||
|
# CRD conversion requires k8s 1.13 or later.
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
name: openstackmachines.infrastructure.cluster.x-k8s.io
|
||||||
|
spec:
|
||||||
|
conversion:
|
||||||
|
strategy: Webhook
|
||||||
|
webhook:
|
||||||
|
conversionReviewVersions: ["v1", "v1beta1"]
|
||||||
|
clientConfig:
|
||||||
|
# this is "\n" used as a placeholder, otherwise it will be rejected by the apiserver for being blank,
|
||||||
|
# but we're going to set it later using the cert-manager (or potentially a patch if not using cert-manager)
|
||||||
|
caBundle: Cg==
|
||||||
|
service:
|
||||||
|
namespace: system
|
||||||
|
name: webhook-service
|
||||||
|
path: /convert
|
@ -0,0 +1,19 @@
|
|||||||
|
# The following patch enables conversion webhook for CRD
|
||||||
|
# CRD conversion requires k8s 1.13 or later.
|
||||||
|
apiVersion: apiextensions.k8s.io/v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
metadata:
|
||||||
|
name: openstackmachinetemplates.infrastructure.cluster.x-k8s.io
|
||||||
|
spec:
|
||||||
|
conversion:
|
||||||
|
strategy: Webhook
|
||||||
|
webhook:
|
||||||
|
conversionReviewVersions: ["v1", "v1beta1"]
|
||||||
|
clientConfig:
|
||||||
|
# this is "\n" used as a placeholder, otherwise it will be rejected by the apiserver for being blank,
|
||||||
|
# but we're going to set it later using the cert-manager (or potentially a patch if not using cert-manager)
|
||||||
|
caBundle: Cg==
|
||||||
|
service:
|
||||||
|
namespace: system
|
||||||
|
name: webhook-service
|
||||||
|
path: /convert
|
11
manifests/function/capo/v0.3.1/default/kustomization.yaml
Normal file
11
manifests/function/capo/v0.3.1/default/kustomization.yaml
Normal file
@ -0,0 +1,11 @@
|
|||||||
|
namespace: capo-system
|
||||||
|
|
||||||
|
resources:
|
||||||
|
- namespace.yaml
|
||||||
|
|
||||||
|
bases:
|
||||||
|
- ../rbac
|
||||||
|
- ../manager
|
||||||
|
|
||||||
|
patchesStrategicMerge:
|
||||||
|
- manager_role_aggregation_patch.yaml
|
@ -0,0 +1,15 @@
|
|||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRole
|
||||||
|
metadata:
|
||||||
|
name: manager-role
|
||||||
|
labels:
|
||||||
|
cluster.x-k8s.io/aggregate-to-manager: "true"
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
metadata:
|
||||||
|
name: manager-rolebinding
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: ClusterRole
|
||||||
|
name: capi-system-capi-aggregated-manager-role
|
4
manifests/function/capo/v0.3.1/default/namespace.yaml
Normal file
4
manifests/function/capo/v0.3.1/default/namespace.yaml
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: system
|
29
manifests/function/capo/v0.3.1/kustomization.yaml
Normal file
29
manifests/function/capo/v0.3.1/kustomization.yaml
Normal file
@ -0,0 +1,29 @@
|
|||||||
|
namePrefix: capo-
|
||||||
|
|
||||||
|
commonLabels:
|
||||||
|
cluster.x-k8s.io/provider: "infrastructure-openstack"
|
||||||
|
|
||||||
|
bases:
|
||||||
|
- crd
|
||||||
|
- webhook # Disable this if you're not using the webhook functionality.
|
||||||
|
- default
|
||||||
|
|
||||||
|
patchesJson6902:
|
||||||
|
- target:
|
||||||
|
group: apiextensions.k8s.io
|
||||||
|
version: v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
name: openstackclusters.infrastructure.cluster.x-k8s.io
|
||||||
|
path: patch_crd_webhook_namespace.yaml
|
||||||
|
- target:
|
||||||
|
group: apiextensions.k8s.io
|
||||||
|
version: v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
name: openstackmachines.infrastructure.cluster.x-k8s.io
|
||||||
|
path: patch_crd_webhook_namespace.yaml
|
||||||
|
- target:
|
||||||
|
group: apiextensions.k8s.io
|
||||||
|
version: v1
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
name: openstackmachinetemplates.infrastructure.cluster.x-k8s.io
|
||||||
|
path: patch_crd_webhook_namespace.yaml
|
@ -0,0 +1,7 @@
|
|||||||
|
resources:
|
||||||
|
- manager.yaml
|
||||||
|
|
||||||
|
patchesStrategicMerge:
|
||||||
|
- manager_image_patch.yaml
|
||||||
|
- manager_pull_policy.yaml
|
||||||
|
- manager_auth_proxy_patch.yaml
|
45
manifests/function/capo/v0.3.1/manager/manager.yaml
Normal file
45
manifests/function/capo/v0.3.1/manager/manager.yaml
Normal file
@ -0,0 +1,45 @@
|
|||||||
|
---
|
||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: controller-manager
|
||||||
|
namespace: system
|
||||||
|
labels:
|
||||||
|
control-plane: capo-controller-manager
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
control-plane: capo-controller-manager
|
||||||
|
replicas: 1
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
control-plane: capo-controller-manager
|
||||||
|
annotations:
|
||||||
|
prometheus.io/scrape: 'true'
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- args:
|
||||||
|
- --enable-leader-election
|
||||||
|
image: controller:latest
|
||||||
|
imagePullPolicy: IfNotPresent
|
||||||
|
name: manager
|
||||||
|
ports:
|
||||||
|
- containerPort: 9440
|
||||||
|
name: healthz
|
||||||
|
protocol: TCP
|
||||||
|
- containerPort: 8080
|
||||||
|
name: metrics
|
||||||
|
protocol: TCP
|
||||||
|
readinessProbe:
|
||||||
|
httpGet:
|
||||||
|
path: /readyz
|
||||||
|
port: healthz
|
||||||
|
livenessProbe:
|
||||||
|
httpGet:
|
||||||
|
path: /healthz
|
||||||
|
port: healthz
|
||||||
|
terminationGracePeriodSeconds: 10
|
||||||
|
tolerations:
|
||||||
|
- effect: NoSchedule
|
||||||
|
key: node-role.kubernetes.io/master
|
@ -0,0 +1,25 @@
|
|||||||
|
# This patch inject a sidecar container which is a HTTP proxy for the controller manager,
|
||||||
|
# it performs RBAC authorization against the Kubernetes API using SubjectAccessReviews.
|
||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: controller-manager
|
||||||
|
namespace: system
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: kube-rbac-proxy
|
||||||
|
image: gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
|
||||||
|
args:
|
||||||
|
- "--secure-listen-address=0.0.0.0:8443"
|
||||||
|
- "--upstream=http://127.0.0.1:8080/"
|
||||||
|
- "--logtostderr=true"
|
||||||
|
- "--v=10"
|
||||||
|
ports:
|
||||||
|
- containerPort: 8443
|
||||||
|
name: https
|
||||||
|
- name: manager
|
||||||
|
args:
|
||||||
|
- "--metrics-addr=127.0.0.1:8080"
|
||||||
|
- "--enable-leader-election"
|
@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: controller-manager
|
||||||
|
namespace: system
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
# Change the value of image field below to your controller image URL
|
||||||
|
- image: gcr.io/k8s-staging-capi-openstack/capi-openstack-controller-amd64:v20200707-v0.3.1
|
||||||
|
name: manager
|
@ -0,0 +1,11 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: controller-manager
|
||||||
|
namespace: system
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: manager
|
||||||
|
imagePullPolicy: IfNotPresent
|
@ -0,0 +1,3 @@
|
|||||||
|
- op: replace
|
||||||
|
path: "/spec/conversion/webhook/clientConfig/service/namespace"
|
||||||
|
value: capi-webhook-system
|
13
manifests/function/capo/v0.3.1/rbac/auth_proxy_role.yaml
Normal file
13
manifests/function/capo/v0.3.1/rbac/auth_proxy_role.yaml
Normal file
@ -0,0 +1,13 @@
|
|||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRole
|
||||||
|
metadata:
|
||||||
|
name: proxy-role
|
||||||
|
rules:
|
||||||
|
- apiGroups: ["authentication.k8s.io"]
|
||||||
|
resources:
|
||||||
|
- tokenreviews
|
||||||
|
verbs: ["create"]
|
||||||
|
- apiGroups: ["authorization.k8s.io"]
|
||||||
|
resources:
|
||||||
|
- subjectaccessreviews
|
||||||
|
verbs: ["create"]
|
@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
metadata:
|
||||||
|
name: proxy-rolebinding
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: ClusterRole
|
||||||
|
name: proxy-role
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: default
|
||||||
|
namespace: system
|
18
manifests/function/capo/v0.3.1/rbac/auth_proxy_service.yaml
Normal file
18
manifests/function/capo/v0.3.1/rbac/auth_proxy_service.yaml
Normal file
@ -0,0 +1,18 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
annotations:
|
||||||
|
prometheus.io/port: "8443"
|
||||||
|
prometheus.io/scheme: https
|
||||||
|
prometheus.io/scrape: "true"
|
||||||
|
labels:
|
||||||
|
control-plane: capo-controller-manager
|
||||||
|
name: controller-manager-metrics-service
|
||||||
|
namespace: system
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- name: https
|
||||||
|
port: 8443
|
||||||
|
targetPort: https
|
||||||
|
selector:
|
||||||
|
control-plane: capo-controller-manager
|
10
manifests/function/capo/v0.3.1/rbac/kustomization.yaml
Normal file
10
manifests/function/capo/v0.3.1/rbac/kustomization.yaml
Normal file
@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
resources:
|
||||||
|
- role.yaml
|
||||||
|
- role_binding.yaml
|
||||||
|
- leader_election_role.yaml
|
||||||
|
- leader_election_role_binding.yaml
|
||||||
|
- auth_proxy_service.yaml
|
||||||
|
- auth_proxy_role.yaml
|
||||||
|
- auth_proxy_role_binding.yaml
|
@ -0,0 +1,26 @@
|
|||||||
|
# permissions to do leader election.
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: Role
|
||||||
|
metadata:
|
||||||
|
name: leader-election-role
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- configmaps
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- create
|
||||||
|
- update
|
||||||
|
- patch
|
||||||
|
- delete
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- configmaps/status
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- update
|
||||||
|
- patch
|
@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: RoleBinding
|
||||||
|
metadata:
|
||||||
|
name: leader-election-rolebinding
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: Role
|
||||||
|
name: leader-election-role
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: default
|
||||||
|
namespace: system
|
85
manifests/function/capo/v0.3.1/rbac/role.yaml
Normal file
85
manifests/function/capo/v0.3.1/rbac/role.yaml
Normal file
@ -0,0 +1,85 @@
|
|||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRole
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: manager-role
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- events
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- ""
|
||||||
|
resources:
|
||||||
|
- secrets
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- cluster.x-k8s.io
|
||||||
|
resources:
|
||||||
|
- clusters
|
||||||
|
- clusters/status
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- cluster.x-k8s.io
|
||||||
|
resources:
|
||||||
|
- machines
|
||||||
|
- machines/status
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- infrastructure.cluster.x-k8s.io
|
||||||
|
resources:
|
||||||
|
- openstackclusters
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- delete
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- infrastructure.cluster.x-k8s.io
|
||||||
|
resources:
|
||||||
|
- openstackclusters/status
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- apiGroups:
|
||||||
|
- infrastructure.cluster.x-k8s.io
|
||||||
|
resources:
|
||||||
|
- openstackmachines
|
||||||
|
verbs:
|
||||||
|
- create
|
||||||
|
- delete
|
||||||
|
- get
|
||||||
|
- list
|
||||||
|
- patch
|
||||||
|
- update
|
||||||
|
- watch
|
||||||
|
- apiGroups:
|
||||||
|
- infrastructure.cluster.x-k8s.io
|
||||||
|
resources:
|
||||||
|
- openstackmachines/status
|
||||||
|
verbs:
|
||||||
|
- get
|
||||||
|
- patch
|
||||||
|
- update
|
12
manifests/function/capo/v0.3.1/rbac/role_binding.yaml
Normal file
12
manifests/function/capo/v0.3.1/rbac/role_binding.yaml
Normal file
@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: ClusterRoleBinding
|
||||||
|
metadata:
|
||||||
|
name: manager-rolebinding
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: ClusterRole
|
||||||
|
name: manager-role
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: default
|
||||||
|
namespace: system
|
42
manifests/function/capo/v0.3.1/webhook/kustomization.yaml
Normal file
42
manifests/function/capo/v0.3.1/webhook/kustomization.yaml
Normal file
@ -0,0 +1,42 @@
|
|||||||
|
namespace: capi-webhook-system
|
||||||
|
|
||||||
|
resources:
|
||||||
|
- manifests.yaml
|
||||||
|
- service.yaml
|
||||||
|
- ../certmanager
|
||||||
|
- ../manager
|
||||||
|
|
||||||
|
configurations:
|
||||||
|
- kustomizeconfig.yaml
|
||||||
|
|
||||||
|
patchesStrategicMerge:
|
||||||
|
- manager_webhook_patch.yaml
|
||||||
|
- webhookcainjection_patch.yaml # Disable this value if you don't have any defaulting or validation webhook. If you don't know, you can check if the manifests.yaml file in the same directory has any contents.
|
||||||
|
|
||||||
|
vars:
|
||||||
|
- name: CERTIFICATE_NAMESPACE # namespace of the certificate CR
|
||||||
|
objref:
|
||||||
|
kind: Certificate
|
||||||
|
group: cert-manager.io
|
||||||
|
version: v1alpha2
|
||||||
|
name: serving-cert # this name should match the one in certificate.yaml
|
||||||
|
fieldref:
|
||||||
|
fieldpath: metadata.namespace
|
||||||
|
- name: CERTIFICATE_NAME
|
||||||
|
objref:
|
||||||
|
kind: Certificate
|
||||||
|
group: cert-manager.io
|
||||||
|
version: v1alpha2
|
||||||
|
name: serving-cert # this name should match the one in certificate.yaml
|
||||||
|
- name: SERVICE_NAMESPACE # namespace of the service
|
||||||
|
objref:
|
||||||
|
kind: Service
|
||||||
|
version: v1
|
||||||
|
name: webhook-service
|
||||||
|
fieldref:
|
||||||
|
fieldpath: metadata.namespace
|
||||||
|
- name: SERVICE_NAME
|
||||||
|
objref:
|
||||||
|
kind: Service
|
||||||
|
version: v1
|
||||||
|
name: webhook-service
|
27
manifests/function/capo/v0.3.1/webhook/kustomizeconfig.yaml
Normal file
27
manifests/function/capo/v0.3.1/webhook/kustomizeconfig.yaml
Normal file
@ -0,0 +1,27 @@
|
|||||||
|
# the following config is for teaching kustomize where to look at when substituting vars.
|
||||||
|
# It requires kustomize v2.1.0 or newer to work properly.
|
||||||
|
nameReference:
|
||||||
|
- kind: Service
|
||||||
|
version: v1
|
||||||
|
fieldSpecs:
|
||||||
|
- kind: MutatingWebhookConfiguration
|
||||||
|
group: admissionregistration.k8s.io
|
||||||
|
path: webhooks/clientConfig/service/name
|
||||||
|
- kind: ValidatingWebhookConfiguration
|
||||||
|
group: admissionregistration.k8s.io
|
||||||
|
path: webhooks/clientConfig/service/name
|
||||||
|
|
||||||
|
namespace:
|
||||||
|
- kind: MutatingWebhookConfiguration
|
||||||
|
group: admissionregistration.k8s.io
|
||||||
|
path: webhooks/clientConfig/service/namespace
|
||||||
|
create: true
|
||||||
|
- kind: ValidatingWebhookConfiguration
|
||||||
|
group: admissionregistration.k8s.io
|
||||||
|
path: webhooks/clientConfig/service/namespace
|
||||||
|
create: true
|
||||||
|
|
||||||
|
varReference:
|
||||||
|
- path: metadata/annotations
|
||||||
|
- kind: Deployment
|
||||||
|
path: spec/template/spec/volumes/secret/secretName
|
@ -0,0 +1,26 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: controller-manager
|
||||||
|
namespace: system
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: manager
|
||||||
|
args:
|
||||||
|
- "--metrics-addr=127.0.0.1:8080"
|
||||||
|
- "--webhook-port=9443"
|
||||||
|
ports:
|
||||||
|
- containerPort: 9443
|
||||||
|
name: webhook-server
|
||||||
|
protocol: TCP
|
||||||
|
volumeMounts:
|
||||||
|
- mountPath: /tmp/k8s-webhook-server/serving-certs
|
||||||
|
name: cert
|
||||||
|
readOnly: true
|
||||||
|
volumes:
|
||||||
|
- name: cert
|
||||||
|
secret:
|
||||||
|
defaultMode: 420
|
||||||
|
secretName: $(SERVICE_NAME)-cert
|
46
manifests/function/capo/v0.3.1/webhook/manifests.yaml
Normal file
46
manifests/function/capo/v0.3.1/webhook/manifests.yaml
Normal file
@ -0,0 +1,46 @@
|
|||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: admissionregistration.k8s.io/v1beta1
|
||||||
|
kind: ValidatingWebhookConfiguration
|
||||||
|
metadata:
|
||||||
|
creationTimestamp: null
|
||||||
|
name: validating-webhook-configuration
|
||||||
|
webhooks:
|
||||||
|
- clientConfig:
|
||||||
|
caBundle: Cg==
|
||||||
|
service:
|
||||||
|
name: webhook-service
|
||||||
|
namespace: system
|
||||||
|
path: /validate-infrastructure-cluster-x-k8s-io-v1alpha3-openstackmachine
|
||||||
|
failurePolicy: Fail
|
||||||
|
matchPolicy: Equivalent
|
||||||
|
name: validation.openstackmachine.infrastructure.cluster.x-k8s.io
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- infrastructure.cluster.x-k8s.io
|
||||||
|
apiVersions:
|
||||||
|
- v1alpha3
|
||||||
|
operations:
|
||||||
|
- CREATE
|
||||||
|
- UPDATE
|
||||||
|
resources:
|
||||||
|
- openstackmachines
|
||||||
|
- clientConfig:
|
||||||
|
caBundle: Cg==
|
||||||
|
service:
|
||||||
|
name: webhook-service
|
||||||
|
namespace: system
|
||||||
|
path: /validate-infrastructure-cluster-x-k8s-io-v1alpha3-openstackmachinetemplate
|
||||||
|
failurePolicy: Fail
|
||||||
|
matchPolicy: Equivalent
|
||||||
|
name: validation.openstackmachinetemplate.infrastructure.x-k8s.io
|
||||||
|
rules:
|
||||||
|
- apiGroups:
|
||||||
|
- infrastructure.cluster.x-k8s.io
|
||||||
|
apiVersions:
|
||||||
|
- v1alpha3
|
||||||
|
operations:
|
||||||
|
- CREATE
|
||||||
|
- UPDATE
|
||||||
|
resources:
|
||||||
|
- openstackmachinetemplates
|
9
manifests/function/capo/v0.3.1/webhook/service.yaml
Normal file
9
manifests/function/capo/v0.3.1/webhook/service.yaml
Normal file
@ -0,0 +1,9 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: webhook-service
|
||||||
|
namespace: system
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- port: 443
|
||||||
|
targetPort: webhook-server
|
@ -0,0 +1,16 @@
|
|||||||
|
# This patch add annotation to admission webhook config and
|
||||||
|
# the variables $(CERTIFICATE_NAMESPACE) and $(CERTIFICATE_NAME) will be substituted by kustomize.
|
||||||
|
# uncomment the following lines to enable mutating webhook
|
||||||
|
#apiVersion: admissionregistration.k8s.io/v1beta1
|
||||||
|
#kind: MutatingWebhookConfiguration
|
||||||
|
#metadata:
|
||||||
|
# name: mutating-webhook-configuration
|
||||||
|
# annotations:
|
||||||
|
# cert-manager.k8s.io/inject-ca-from: $(CERTIFICATE_NAMESPACE)/$(CERTIFICATE_NAME)
|
||||||
|
---
|
||||||
|
apiVersion: admissionregistration.k8s.io/v1beta1
|
||||||
|
kind: ValidatingWebhookConfiguration
|
||||||
|
metadata:
|
||||||
|
name: validating-webhook-configuration
|
||||||
|
annotations:
|
||||||
|
cert-manager.io/inject-ca-from: $(CERTIFICATE_NAMESPACE)/$(CERTIFICATE_NAME)
|
50
manifests/function/k8scontrol-capo/cluster.yaml
Normal file
50
manifests/function/k8scontrol-capo/cluster.yaml
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
apiVersion: cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: Cluster
|
||||||
|
metadata:
|
||||||
|
name: ostgt
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
clusterNetwork:
|
||||||
|
pods:
|
||||||
|
cidrBlocks:
|
||||||
|
- 192.168.0.0/16
|
||||||
|
serviceDomain: cluster.local
|
||||||
|
controlPlaneRef:
|
||||||
|
apiVersion: controlplane.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: KubeadmControlPlane
|
||||||
|
name: ostgt-control-plane
|
||||||
|
infrastructureRef:
|
||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: OpenStackCluster
|
||||||
|
name: ostgt
|
||||||
|
---
|
||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: OpenStackCluster
|
||||||
|
metadata:
|
||||||
|
name: ostgt
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
apiServerLoadBalancerFloatingIP: ${OPENSTACK_CONTROLPLANE_IP}
|
||||||
|
apiServerLoadBalancerPort: 6443
|
||||||
|
cloudName: devstack
|
||||||
|
cloudsSecret:
|
||||||
|
name: ostgt-cloud-config
|
||||||
|
namespace: default
|
||||||
|
disablePortSecurity: false
|
||||||
|
disableServerTags: true
|
||||||
|
dnsNameservers:
|
||||||
|
- "${OPENSTACK_DNS_NAMESERVERS}"
|
||||||
|
externalNetworkId: "{OPENSTACK_EXTERNAL_NETWORK_ID}"
|
||||||
|
managedAPIServerLoadBalancer: true
|
||||||
|
managedSecurityGroups: true
|
||||||
|
nodeCidr: 10.6.0.0/24
|
||||||
|
useOctavia: true
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
name: ostgt-cloud-config
|
||||||
|
namespace: default
|
||||||
|
data:
|
||||||
|
cacert: ${CLOUD_CERT_B64}
|
||||||
|
clouds.yaml: ${CLOUDS_YAML_B64}
|
85
manifests/function/k8scontrol-capo/controlplane.yaml
Normal file
85
manifests/function/k8scontrol-capo/controlplane.yaml
Normal file
@ -0,0 +1,85 @@
|
|||||||
|
apiVersion: controlplane.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: KubeadmControlPlane
|
||||||
|
metadata:
|
||||||
|
name: ostgt-control-plane
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
infrastructureTemplate:
|
||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: OpenStackMachineTemplate
|
||||||
|
name: ostgt-control-plane
|
||||||
|
kubeadmConfigSpec:
|
||||||
|
clusterConfiguration:
|
||||||
|
apiServer:
|
||||||
|
extraArgs:
|
||||||
|
cloud-config: /etc/kubernetes/cloud.conf
|
||||||
|
cloud-provider: openstack
|
||||||
|
extraVolumes:
|
||||||
|
- hostPath: /etc/kubernetes/cloud.conf
|
||||||
|
mountPath: /etc/kubernetes/cloud.conf
|
||||||
|
name: cloud
|
||||||
|
readOnly: true
|
||||||
|
controlPlaneEndpoint: ${OPENSTACK_CONTROL_PLANE_IP}:6443
|
||||||
|
controllerManager:
|
||||||
|
extraArgs:
|
||||||
|
cloud-config: /etc/kubernetes/cloud.conf
|
||||||
|
cloud-provider: openstack
|
||||||
|
extraVolumes:
|
||||||
|
- hostPath: /etc/kubernetes/cloud.conf
|
||||||
|
mountPath: /etc/kubernetes/cloud.conf
|
||||||
|
name: cloud
|
||||||
|
readOnly: true
|
||||||
|
- hostPath: /etc/certs/cacert
|
||||||
|
mountPath: /etc/certs/cacert
|
||||||
|
name: cacerts
|
||||||
|
readOnly: true
|
||||||
|
imageRepository: k8s.gcr.io
|
||||||
|
files:
|
||||||
|
- content: ${CLOUD_CONF_B64}
|
||||||
|
encoding: base64
|
||||||
|
owner: root
|
||||||
|
path: /etc/kubernetes/cloud.conf
|
||||||
|
permissions: "0600"
|
||||||
|
- content: ${CLOUD_CERT_B64}
|
||||||
|
encoding: base64
|
||||||
|
owner: root
|
||||||
|
path: /etc/certs/cacert
|
||||||
|
permissions: "0600"
|
||||||
|
initConfiguration:
|
||||||
|
nodeRegistration:
|
||||||
|
kubeletExtraArgs:
|
||||||
|
cloud-config: /etc/kubernetes/cloud.conf
|
||||||
|
cloud-provider: openstack
|
||||||
|
name: '{{ local_hostname }}'
|
||||||
|
joinConfiguration:
|
||||||
|
nodeRegistration:
|
||||||
|
kubeletExtraArgs:
|
||||||
|
cloud-config: /etc/kubernetes/cloud.conf
|
||||||
|
cloud-provider: openstack
|
||||||
|
name: '{{ local_hostname }}'
|
||||||
|
postKubeadmCommands:
|
||||||
|
- sudo kubectl --kubeconfig /etc/kubernetes/admin.conf apply -f https://docs.projectcalico.org/v3.15/manifests/calico.yaml
|
||||||
|
ntp:
|
||||||
|
servers: []
|
||||||
|
users:
|
||||||
|
- name: capo
|
||||||
|
sshAuthorizedKeys:
|
||||||
|
- ${OPENSTACK_SSH_KEY}
|
||||||
|
sudo: ALL=(ALL) NOPASSWD:ALL
|
||||||
|
replicas: 1
|
||||||
|
version: v1.17.3
|
||||||
|
---
|
||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: OpenStackMachineTemplate
|
||||||
|
metadata:
|
||||||
|
name: ostgt-control-plane
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
cloudName: devstack
|
||||||
|
cloudsSecret:
|
||||||
|
name: ostgt-cloud-config
|
||||||
|
namespace: default
|
||||||
|
flavor: ${CONTROLPLANE_MACHINE_FLAVOR}
|
||||||
|
image: ubuntu-1910-kube-v1.17.3
|
5
manifests/function/k8scontrol-capo/kustomization.yaml
Normal file
5
manifests/function/k8scontrol-capo/kustomization.yaml
Normal file
@ -0,0 +1,5 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
resources:
|
||||||
|
- cluster.yaml
|
||||||
|
- controlplane.yaml
|
4
manifests/function/workers-capo/kustomization.yaml
Normal file
4
manifests/function/workers-capo/kustomization.yaml
Normal file
@ -0,0 +1,4 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
resources:
|
||||||
|
- workers.yaml
|
72
manifests/function/workers-capo/workers.yaml
Normal file
72
manifests/function/workers-capo/workers.yaml
Normal file
@ -0,0 +1,72 @@
|
|||||||
|
apiVersion: cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: MachineDeployment
|
||||||
|
metadata:
|
||||||
|
name: ostgt-md-0
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
clusterName: ostgt
|
||||||
|
replicas: 0
|
||||||
|
selector:
|
||||||
|
matchLabels: null
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
bootstrap:
|
||||||
|
configRef:
|
||||||
|
apiVersion: bootstrap.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: KubeadmConfigTemplate
|
||||||
|
name: ostgt-md-0
|
||||||
|
clusterName: ostgt
|
||||||
|
failureDomain: nova
|
||||||
|
infrastructureRef:
|
||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: OpenStackMachineTemplate
|
||||||
|
name: ostgt-md-0
|
||||||
|
version: v1.17.3
|
||||||
|
---
|
||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: OpenStackMachineTemplate
|
||||||
|
metadata:
|
||||||
|
name: ostgt-md-0
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
cloudName: devstack
|
||||||
|
cloudsSecret:
|
||||||
|
name: ostgt-cloud-config
|
||||||
|
namespace: default
|
||||||
|
flavor: ${WORKER_MACHINE_FLAVOR}
|
||||||
|
image: ubuntu-1910-kube-v1.17.3
|
||||||
|
---
|
||||||
|
apiVersion: bootstrap.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: KubeadmConfigTemplate
|
||||||
|
metadata:
|
||||||
|
name: ostgt-md-0
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
files:
|
||||||
|
- content: ${CLOUD_CONF_B64}
|
||||||
|
encoding: base64
|
||||||
|
owner: root
|
||||||
|
path: /etc/kubernetes/cloud.conf
|
||||||
|
permissions: "0600"
|
||||||
|
- content: ${CLOUD_CERT_B64}
|
||||||
|
encoding: base64
|
||||||
|
owner: root
|
||||||
|
path: /etc/certs/cacert
|
||||||
|
permissions: "0600"
|
||||||
|
joinConfiguration:
|
||||||
|
nodeRegistration:
|
||||||
|
kubeletExtraArgs:
|
||||||
|
cloud-config: /etc/kubernetes/cloud.conf
|
||||||
|
cloud-provider: openstack
|
||||||
|
name: '{{ local_hostname }}'
|
||||||
|
ntp:
|
||||||
|
servers: []
|
||||||
|
users:
|
||||||
|
- name: capo
|
||||||
|
sshAuthorizedKeys:
|
||||||
|
- ${OPENSTACK_SSH_KEY}
|
||||||
|
sudo: ALL=(ALL) NOPASSWD:ALL
|
43
manifests/site/openstack-test-site/shared/clusterctl/clusterctl.yaml
Executable file
43
manifests/site/openstack-test-site/shared/clusterctl/clusterctl.yaml
Executable file
@ -0,0 +1,43 @@
|
|||||||
|
apiVersion: airshipit.org/v1alpha1
|
||||||
|
kind: Clusterctl
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
airshipit.org/deploy-k8s: "false"
|
||||||
|
name: clusterctl-v1
|
||||||
|
init-options:
|
||||||
|
core-provider: "cluster-api:v0.3.7"
|
||||||
|
bootstrap-providers:
|
||||||
|
- "kubeadm:v0.3.7"
|
||||||
|
infrastructure-providers:
|
||||||
|
- "openstack:v0.3.1"
|
||||||
|
control-plane-providers:
|
||||||
|
- "kubeadm:v0.3.7"
|
||||||
|
providers:
|
||||||
|
- name: "openstack"
|
||||||
|
type: "InfrastructureProvider"
|
||||||
|
versions:
|
||||||
|
v0.3.1: manifests/function/capo/v0.3.1
|
||||||
|
- name: "kubeadm"
|
||||||
|
type: "BootstrapProvider"
|
||||||
|
variable-substitution: true
|
||||||
|
versions:
|
||||||
|
v0.3.7: manifests/function/cabpk/v0.3.7
|
||||||
|
- name: "cluster-api"
|
||||||
|
type: "CoreProvider"
|
||||||
|
variable-substitution: true
|
||||||
|
versions:
|
||||||
|
v0.3.7: manifests/function/capi/v0.3.7
|
||||||
|
- name: "kubeadm"
|
||||||
|
type: "ControlPlaneProvider"
|
||||||
|
variable-substitution: true
|
||||||
|
versions:
|
||||||
|
v0.3.7: manifests/function/cacpk/v0.3.7
|
||||||
|
additional-vars:
|
||||||
|
CONTAINER_CAPM3_MANAGER: quay.io/metal3-io/cluster-api-provider-metal3:v0.3.2
|
||||||
|
CONTAINER_CACPK_MANAGER: us.gcr.io/k8s-artifacts-prod/cluster-api/kubeadm-control-plane-controller:v0.3.7
|
||||||
|
CONTAINER_CABPK_MANAGER: us.gcr.io/k8s-artifacts-prod/cluster-api/kubeadm-bootstrap-controller:v0.3.7
|
||||||
|
CONTAINER_CAPI_MANAGER: us.gcr.io/k8s-artifacts-prod/cluster-api/cluster-api-controller:v0.3.7
|
||||||
|
CONTAINER_CAPM3_AUTH_PROXY: gcr.io/kubebuilder/kube-rbac-proxy:v0.4.0
|
||||||
|
CONTAINER_CACPK_AUTH_PROXY: gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
|
||||||
|
CONTAINER_CABPK_AUTH_PROXY: gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
|
||||||
|
CONTAINER_CAPI_AUTH_PROXY: gcr.io/kubebuilder/kube-rbac-proxy:v0.4.1
|
2
manifests/site/openstack-test-site/shared/clusterctl/kustomization.yaml
Executable file
2
manifests/site/openstack-test-site/shared/clusterctl/kustomization.yaml
Executable file
@ -0,0 +1,2 @@
|
|||||||
|
resources:
|
||||||
|
- clusterctl.yaml
|
@ -0,0 +1,8 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Secret
|
||||||
|
metadata:
|
||||||
|
name: ostgt-cloud-config
|
||||||
|
namespace: default
|
||||||
|
data:
|
||||||
|
cacert: Cg==
|
||||||
|
clouds.yaml: Y2xvdWRzOgogIGRldnN0YWNrOgogICAgYXV0aDoKICAgICAgYXV0aF91cmw6IGh0dHA6Ly8xMC4wLjEuNC9pZGVudGl0eQogICAgICBwcm9qZWN0X2lkOiAyMThkMWNiYzMyOWM0YWUzYWNjODhjYTU5NTAwMTUwMQogICAgICB1c2VyX2RvbWFpbl9uYW1lOiBEZWZhdWx0CiAgICAgIHVzZXJuYW1lOiBkZW1vCiAgICAgIHBhc3N3b3JkOiBwYXNzCiAgICByZWdpb25fbmFtZTogUmVnaW9uT25lCg==
|
@ -0,0 +1,24 @@
|
|||||||
|
apiVersion: controlplane.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: KubeadmControlPlane
|
||||||
|
metadata:
|
||||||
|
name: ostgt-control-plane
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
infrastructureTemplate:
|
||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: OpenStackMachineTemplate
|
||||||
|
name: ostgt-control-plane
|
||||||
|
kubeadmConfigSpec:
|
||||||
|
files:
|
||||||
|
- path: /etc/kubernetes/cloud.conf
|
||||||
|
content: W0dsb2JhbF0KYXV0aC11cmw9aHR0cDovLzEwLjAuMS40L2lkZW50aXR5CnVzZXJuYW1lPSJkZW1vIgpwYXNzd29yZD0icGFzcyIKdGVuYW50LWlkPSIyMThkMWNiYzMyOWM0YWUzYWNjODhjYTU5NTAwMTUwMSIKZG9tYWluLW5hbWU9IkRlZmF1bHQiCnJlZ2lvbj0iUmVnaW9uT25lIgo=
|
||||||
|
encoding: base64
|
||||||
|
owner: root
|
||||||
|
permissions: "0600"
|
||||||
|
- path: /etc/certs/cacert
|
||||||
|
content: Cg==
|
||||||
|
encoding: base64
|
||||||
|
owner: root
|
||||||
|
permissions: "0600"
|
||||||
|
postKubeadmCommands:
|
||||||
|
- sudo kubectl --kubeconfig /etc/kubernetes/admin.conf apply -f https://docs.projectcalico.org/v3.15/manifests/calico.yaml
|
@ -0,0 +1,3 @@
|
|||||||
|
[
|
||||||
|
{ "op": "replace","path": "/spec/apiServerLoadBalancerFloatingIP","value": "172.24.4.120" }
|
||||||
|
]
|
@ -0,0 +1,9 @@
|
|||||||
|
apiVersion: controlplane.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: KubeadmControlPlane
|
||||||
|
metadata:
|
||||||
|
name: ostgt-control-plane
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
kubeadmConfigSpec:
|
||||||
|
clusterConfiguration:
|
||||||
|
controlPlaneEndpoint: 172.24.4.120:6443
|
@ -0,0 +1,7 @@
|
|||||||
|
apiVersion: controlplane.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: KubeadmControlPlane
|
||||||
|
metadata:
|
||||||
|
name: ostgt-control-plane
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
@ -0,0 +1,9 @@
|
|||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: OpenStackMachineTemplate
|
||||||
|
metadata:
|
||||||
|
name: ostgt-control-plane
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
flavor: ds4G
|
@ -0,0 +1,3 @@
|
|||||||
|
[
|
||||||
|
{ "op": "replace","path": "/spec/dnsNameservers/0","value": "8.8.8.8" }
|
||||||
|
]
|
@ -0,0 +1,3 @@
|
|||||||
|
[
|
||||||
|
{ "op": "replace","path": "/spec/externalNetworkId","value": "da57dbbe-c923-4641-b00a-0060d52f6f95" }
|
||||||
|
]
|
35
manifests/site/openstack-test-site/target/controlplane/kustomization.yaml
Executable file
35
manifests/site/openstack-test-site/target/controlplane/kustomization.yaml
Executable file
@ -0,0 +1,35 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
resources:
|
||||||
|
- ../../../../function/k8scontrol-capo
|
||||||
|
|
||||||
|
patchesJson6902:
|
||||||
|
|
||||||
|
- target:
|
||||||
|
group: infrastructure.cluster.x-k8s.io
|
||||||
|
version: v1alpha3
|
||||||
|
kind: OpenStackCluster
|
||||||
|
name: "ostgt"
|
||||||
|
path: control_plane_ip.json
|
||||||
|
|
||||||
|
- target:
|
||||||
|
group: infrastructure.cluster.x-k8s.io
|
||||||
|
version: v1alpha3
|
||||||
|
kind: OpenStackCluster
|
||||||
|
name: "ostgt"
|
||||||
|
path: dns_servers.json
|
||||||
|
|
||||||
|
- target:
|
||||||
|
group: infrastructure.cluster.x-k8s.io
|
||||||
|
version: v1alpha3
|
||||||
|
kind: OpenStackCluster
|
||||||
|
name: "ostgt"
|
||||||
|
path: external_network_id.json
|
||||||
|
|
||||||
|
patchesStrategicMerge:
|
||||||
|
- cluster_clouds_yaml_patch.yaml
|
||||||
|
- control_plane_ip_patch.yaml
|
||||||
|
- control_plane_config_patch.yaml
|
||||||
|
- ssh_key_patch.yaml
|
||||||
|
- control_plane_machine_count_patch.yaml
|
||||||
|
- control_plane_machine_flavor_patch.yaml
|
@ -0,0 +1,11 @@
|
|||||||
|
apiVersion: controlplane.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: KubeadmControlPlane
|
||||||
|
metadata:
|
||||||
|
name: ostgt-control-plane
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
kubeadmConfigSpec:
|
||||||
|
users:
|
||||||
|
- name: capo
|
||||||
|
sshAuthorizedKeys:
|
||||||
|
- ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5CeROtz81ZJ/2wCUBnK0X67dL01s5KgOQhqlvn2PG1onGoEwKuwVgnUH3CtGJj1wjq4GqWduBoLvPrSt6qGL/tX8ZiVp2XS8SkDcxo69zo4QMoBdjTwfXwASalcEjQr7nRW8eMlgeI8+bRkhDuCBQLTYHoe6jQh/sWKhj25cgeAkU8eqe+bB9C8d7C/DeWBN6AJaBGjX7F2Azm8Fg6ArtxabuEDw3DYvdm+Y4GvLDfJ3MQR/S2etk8lwWaxlDWIfTwVeCDlG098rRRKKtiaF9LFq08+wEPPEBsyX1q9aNNfdcoCZnuSoWZ5ceBMxZSobA3vBy2jHUGz+slR4ADM7P stack@devstack-magnum
|
4
manifests/site/openstack-test-site/target/initinfra/kustomization.yaml
Executable file
4
manifests/site/openstack-test-site/target/initinfra/kustomization.yaml
Executable file
@ -0,0 +1,4 @@
|
|||||||
|
resources:
|
||||||
|
- ../../shared/clusterctl
|
||||||
|
commonLabels:
|
||||||
|
airshipit.org/stage: initinfra
|
10
manifests/site/openstack-test-site/target/workers/kustomization.yaml
Executable file
10
manifests/site/openstack-test-site/target/workers/kustomization.yaml
Executable file
@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
resources:
|
||||||
|
- ../../../../function/workers-capo
|
||||||
|
|
||||||
|
patchesStrategicMerge:
|
||||||
|
- workers_machine_count_patch.yaml
|
||||||
|
- workers_machine_flavor_patch.yaml
|
||||||
|
- workers_cloud_conf_patch.yaml
|
||||||
|
- workers_ssh_key_patch.yaml
|
@ -0,0 +1,19 @@
|
|||||||
|
apiVersion: bootstrap.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: KubeadmConfigTemplate
|
||||||
|
metadata:
|
||||||
|
name: ostgt-md-0
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
files:
|
||||||
|
- content: W0dsb2JhbF0KYXV0aC11cmw9aHR0cDovLzEwLjAuMS40L2lkZW50aXR5CnVzZXJuYW1lPSJkZW1vIgpwYXNzd29yZD0icGFzcyIKdGVuYW50LWlkPSIyMThkMWNiYzMyOWM0YWUzYWNjODhjYTU5NTAwMTUwMSIKZG9tYWluLW5hbWU9IkRlZmF1bHQiCnJlZ2lvbj0iUmVnaW9uT25lIgo=
|
||||||
|
encoding: base64
|
||||||
|
owner: root
|
||||||
|
path: /etc/kubernetes/cloud.conf
|
||||||
|
permissions: "0600"
|
||||||
|
- content: Cg==
|
||||||
|
encoding: base64
|
||||||
|
owner: root
|
||||||
|
path: /etc/certs/cacert
|
||||||
|
permissions: "0600"
|
@ -0,0 +1,8 @@
|
|||||||
|
apiVersion: cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: MachineDeployment
|
||||||
|
metadata:
|
||||||
|
name: ostgt-md-0
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
clusterName: ostgt
|
||||||
|
replicas: 3
|
@ -0,0 +1,9 @@
|
|||||||
|
apiVersion: infrastructure.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: OpenStackMachineTemplate
|
||||||
|
metadata:
|
||||||
|
name: ostgt-md-0
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
flavor: m1.small
|
@ -0,0 +1,12 @@
|
|||||||
|
apiVersion: bootstrap.cluster.x-k8s.io/v1alpha3
|
||||||
|
kind: KubeadmConfigTemplate
|
||||||
|
metadata:
|
||||||
|
name: ostgt-md-0
|
||||||
|
namespace: default
|
||||||
|
spec:
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
users:
|
||||||
|
- name: capo
|
||||||
|
sshAuthorizedKeys:
|
||||||
|
- ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQC5CeROtz81ZJ/2wCUBnK0X67dL01s5KgOQhqlvn2PG1onGoEwKuwVgnUH3CtGJj1wjq4GqWduBoLvPrSt6qGL/tX8ZiVp2XS8SkDcxo69zo4QMoBdjTwfXwASalcEjQr7nRW8eMlgeI8+bRkhDuCBQLTYHoe6jQh/sWKhj25cgeAkU8eqe+bB9C8d7C/DeWBN6AJaBGjX7F2Azm8Fg6ArtxabuEDw3DYvdm+Y4GvLDfJ3MQR/S2etk8lwWaxlDWIfTwVeCDlG098rRRKKtiaF9LFq08+wEPPEBsyX1q9aNNfdcoCZnuSoWZ5ceBMxZSobA3vBy2jHUGz+slR4ADM7P stack@devstack-magnum
|
Loading…
Reference in New Issue
Block a user