forked from tim/k3s-ansible
Merge branch 'master' into dependabot/pip/ansible-core-2.15.5
This commit is contained in:
@@ -81,3 +81,43 @@ proxmox_lxc_ct_ids:
|
|||||||
- 202
|
- 202
|
||||||
- 203
|
- 203
|
||||||
- 204
|
- 204
|
||||||
|
|
||||||
|
# Only enable this if you have set up your own container registry to act as a mirror / pull-through cache
|
||||||
|
# (harbor / nexus / docker's official registry / etc).
|
||||||
|
# Can be beneficial for larger dev/test environments (for example if you're getting rate limited by docker hub),
|
||||||
|
# or air-gapped environments where your nodes don't have internet access after the initial setup
|
||||||
|
# (which is still needed for downloading the k3s binary and such).
|
||||||
|
# k3s's documentation about private registries here: https://docs.k3s.io/installation/private-registry
|
||||||
|
custom_registries: false
|
||||||
|
# The registries can be authenticated or anonymous, depending on your registry server configuration.
|
||||||
|
# If they allow anonymous access, simply remove the following bit from custom_registries_yaml
|
||||||
|
# configs:
|
||||||
|
# "registry.domain.com":
|
||||||
|
# auth:
|
||||||
|
# username: yourusername
|
||||||
|
# password: yourpassword
|
||||||
|
# The following is an example that pulls all images used in this playbook through your private registries.
|
||||||
|
# It also allows you to pull your own images from your private registry, without having to use imagePullSecrets
|
||||||
|
# in your deployments.
|
||||||
|
# If all you need is your own images and you don't care about caching the docker/quay/ghcr.io images,
|
||||||
|
# you can just remove those from the mirrors: section.
|
||||||
|
custom_registries_yaml: |
|
||||||
|
mirrors:
|
||||||
|
docker.io:
|
||||||
|
endpoint:
|
||||||
|
- "https://registry.domain.com/v2/dockerhub"
|
||||||
|
quay.io:
|
||||||
|
endpoint:
|
||||||
|
- "https://registry.domain.com/v2/quayio"
|
||||||
|
ghcr.io:
|
||||||
|
endpoint:
|
||||||
|
- "https://registry.domain.com/v2/ghcrio"
|
||||||
|
registry.domain.com:
|
||||||
|
endpoint:
|
||||||
|
- "https://registry.domain.com"
|
||||||
|
|
||||||
|
configs:
|
||||||
|
"registry.domain.com":
|
||||||
|
auth:
|
||||||
|
username: yourusername
|
||||||
|
password: yourpassword
|
||||||
|
|||||||
6
roles/k3s_custom_registries/defaults/main.yml
Normal file
6
roles/k3s_custom_registries/defaults/main.yml
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
---
|
||||||
|
# Indicates whether custom registries for k3s should be configured
|
||||||
|
# Possible values:
|
||||||
|
# - present
|
||||||
|
# - absent
|
||||||
|
state: present
|
||||||
17
roles/k3s_custom_registries/tasks/main.yml
Normal file
17
roles/k3s_custom_registries/tasks/main.yml
Normal file
@@ -0,0 +1,17 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Create directory /etc/rancher/k3s
|
||||||
|
file:
|
||||||
|
path: "/etc/{{ item }}"
|
||||||
|
state: directory
|
||||||
|
mode: '0755'
|
||||||
|
loop:
|
||||||
|
- rancher
|
||||||
|
- rancher/k3s
|
||||||
|
|
||||||
|
- name: Insert registries into /etc/rancher/k3s/registries.yaml
|
||||||
|
blockinfile:
|
||||||
|
path: /etc/rancher/k3s/registries.yaml
|
||||||
|
block: "{{ custom_registries_yaml }}"
|
||||||
|
mode: '0600'
|
||||||
|
create: true
|
||||||
@@ -17,6 +17,7 @@
|
|||||||
|
|
||||||
- name: Deploy metallb manifest
|
- name: Deploy metallb manifest
|
||||||
include_tasks: metallb.yml
|
include_tasks: metallb.yml
|
||||||
|
tags: metallb
|
||||||
|
|
||||||
- name: Init cluster inside the transient k3s-init service
|
- name: Init cluster inside the transient k3s-init service
|
||||||
command:
|
command:
|
||||||
|
|||||||
@@ -1,6 +1,7 @@
|
|||||||
---
|
---
|
||||||
- name: Deploy metallb pool
|
- name: Deploy metallb pool
|
||||||
include_tasks: metallb.yml
|
include_tasks: metallb.yml
|
||||||
|
tags: metallb
|
||||||
|
|
||||||
- name: Remove tmp directory used for manifests
|
- name: Remove tmp directory used for manifests
|
||||||
file:
|
file:
|
||||||
|
|||||||
4
roles/prereq/defaults/main.yml
Normal file
4
roles/prereq/defaults/main.yml
Normal file
@@ -0,0 +1,4 @@
|
|||||||
|
---
|
||||||
|
secure_path:
|
||||||
|
RedHat: '/sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin'
|
||||||
|
Suse: '/usr/sbin:/usr/bin:/sbin:/bin:/usr/local/bin'
|
||||||
@@ -60,10 +60,10 @@
|
|||||||
|
|
||||||
- name: Add /usr/local/bin to sudo secure_path
|
- name: Add /usr/local/bin to sudo secure_path
|
||||||
lineinfile:
|
lineinfile:
|
||||||
line: 'Defaults secure_path = /sbin:/bin:/usr/sbin:/usr/bin:/usr/local/bin'
|
line: 'Defaults secure_path = {{ secure_path[ansible_os_family] }}'
|
||||||
regexp: "Defaults(\\s)*secure_path(\\s)*="
|
regexp: "Defaults(\\s)*secure_path(\\s)*="
|
||||||
state: present
|
state: present
|
||||||
insertafter: EOF
|
insertafter: EOF
|
||||||
path: /etc/sudoers
|
path: /etc/sudoers
|
||||||
validate: 'visudo -cf %s'
|
validate: 'visudo -cf %s'
|
||||||
when: ansible_os_family == "RedHat"
|
when: ansible_os_family in [ "RedHat", "Suse" ]
|
||||||
|
|||||||
Reference in New Issue
Block a user