clean up tags (#8880)

pull/8903/head
Samuel Liu 2022-05-31 22:52:53 +08:00 committed by GitHub
parent 14acd124bc
commit 1600fd9082
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
10 changed files with 0 additions and 42 deletions

View File

@ -1,7 +1,6 @@
--- ---
- include: credentials-check.yml - include: credentials-check.yml
tags: oci
- name: "OCI Cloud Controller | Generate Cloud Provider Configuration" - name: "OCI Cloud Controller | Generate Cloud Provider Configuration"
template: template:
@ -9,7 +8,6 @@
dest: "{{ kube_config_dir }}/controller-manager-config.yml" dest: "{{ kube_config_dir }}/controller-manager-config.yml"
mode: 0644 mode: 0644
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: oci
- name: "OCI Cloud Controller | Slurp Configuration" - name: "OCI Cloud Controller | Slurp Configuration"
slurp: slurp:
@ -20,7 +18,6 @@
set_fact: set_fact:
controller_manager_config_base64: "{{ controller_manager_config.content }}" controller_manager_config_base64: "{{ controller_manager_config.content }}"
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: oci
- name: "OCI Cloud Controller | Generate Manifests" - name: "OCI Cloud Controller | Generate Manifests"
template: template:
@ -28,7 +25,6 @@
dest: "{{ kube_config_dir }}/oci-cloud-provider.yml" dest: "{{ kube_config_dir }}/oci-cloud-provider.yml"
mode: 0644 mode: 0644
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: oci
- name: "OCI Cloud Controller | Apply Manifests" - name: "OCI Cloud Controller | Apply Manifests"
kube: kube:
@ -36,4 +32,3 @@
filename: "{{ kube_config_dir }}/oci-cloud-provider.yml" filename: "{{ kube_config_dir }}/oci-cloud-provider.yml"
state: latest state: latest
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: oci

View File

@ -11,7 +11,6 @@
- {name: aws-ebs-csi-nodeservice, file: aws-ebs-csi-nodeservice.yml} - {name: aws-ebs-csi-nodeservice, file: aws-ebs-csi-nodeservice.yml}
register: aws_csi_manifests register: aws_csi_manifests
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: aws-ebs-csi-driver
- name: AWS CSI Driver | Apply Manifests - name: AWS CSI Driver | Apply Manifests
kube: kube:
@ -25,4 +24,3 @@
- not item is skipped - not item is skipped
loop_control: loop_control:
label: "{{ item.item.file }}" label: "{{ item.item.file }}"
tags: aws-ebs-csi-driver

View File

@ -1,6 +1,5 @@
--- ---
- include_tasks: azure-credential-check.yml - include_tasks: azure-credential-check.yml
tags: azure-csi-driver
- name: Azure CSI Driver | Write Azure CSI cloud-config - name: Azure CSI Driver | Write Azure CSI cloud-config
template: template:
@ -9,14 +8,12 @@
group: "{{ kube_cert_group }}" group: "{{ kube_cert_group }}"
mode: 0640 mode: 0640
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: azure-csi-driver
- name: Azure CSI Driver | Get base64 cloud-config - name: Azure CSI Driver | Get base64 cloud-config
slurp: slurp:
src: "{{ kube_config_dir }}/azure_csi_cloud_config" src: "{{ kube_config_dir }}/azure_csi_cloud_config"
register: cloud_config_secret register: cloud_config_secret
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: azure-csi-driver
- name: Azure CSI Driver | Generate Manifests - name: Azure CSI Driver | Generate Manifests
template: template:
@ -32,7 +29,6 @@
- {name: azure-csi-node-info-crd.yml.j2, file: azure-csi-node-info-crd.yml} - {name: azure-csi-node-info-crd.yml.j2, file: azure-csi-node-info-crd.yml}
register: azure_csi_manifests register: azure_csi_manifests
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: azure-csi-driver
- name: Azure CSI Driver | Apply Manifests - name: Azure CSI Driver | Apply Manifests
kube: kube:
@ -46,4 +42,3 @@
- not item is skipped - not item is skipped
loop_control: loop_control:
label: "{{ item.item.file }}" label: "{{ item.item.file }}"
tags: azure-csi-driver

View File

@ -8,5 +8,4 @@
dest: "{{ kube_config_dir }}/cinder-cacert.pem" dest: "{{ kube_config_dir }}/cinder-cacert.pem"
group: "{{ kube_cert_group }}" group: "{{ kube_cert_group }}"
mode: 0640 mode: 0640
tags: cinder-csi-driver
delegate_to: "{{ delegate_host_to_write_cacert }}" delegate_to: "{{ delegate_host_to_write_cacert }}"

View File

@ -1,6 +1,5 @@
--- ---
- include_tasks: cinder-credential-check.yml - include_tasks: cinder-credential-check.yml
tags: cinder-csi-driver
- name: Cinder CSI Driver | Write cacert file - name: Cinder CSI Driver | Write cacert file
include_tasks: cinder-write-cacert.yml include_tasks: cinder-write-cacert.yml
@ -12,7 +11,6 @@
- inventory_hostname in groups['k8s_cluster'] - inventory_hostname in groups['k8s_cluster']
- cinder_cacert is defined - cinder_cacert is defined
- cinder_cacert | length > 0 - cinder_cacert | length > 0
tags: cinder-csi-driver
- name: Cinder CSI Driver | Write Cinder cloud-config - name: Cinder CSI Driver | Write Cinder cloud-config
template: template:
@ -21,14 +19,12 @@
group: "{{ kube_cert_group }}" group: "{{ kube_cert_group }}"
mode: 0640 mode: 0640
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: cinder-csi-driver
- name: Cinder CSI Driver | Get base64 cloud-config - name: Cinder CSI Driver | Get base64 cloud-config
slurp: slurp:
src: "{{ kube_config_dir }}/cinder_cloud_config" src: "{{ kube_config_dir }}/cinder_cloud_config"
register: cloud_config_secret register: cloud_config_secret
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: cinder-csi-driver
- name: Cinder CSI Driver | Generate Manifests - name: Cinder CSI Driver | Generate Manifests
template: template:
@ -45,7 +41,6 @@
- {name: cinder-csi-poddisruptionbudget, file: cinder-csi-poddisruptionbudget.yml} - {name: cinder-csi-poddisruptionbudget, file: cinder-csi-poddisruptionbudget.yml}
register: cinder_csi_manifests register: cinder_csi_manifests
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: cinder-csi-driver
- name: Cinder CSI Driver | Apply Manifests - name: Cinder CSI Driver | Apply Manifests
kube: kube:
@ -59,4 +54,3 @@
- not item is skipped - not item is skipped
loop_control: loop_control:
label: "{{ item.item.file }}" label: "{{ item.item.file }}"
tags: cinder-csi-driver

View File

@ -10,7 +10,6 @@
- {name: volumesnapshots, file: volumesnapshots.yml} - {name: volumesnapshots, file: volumesnapshots.yml}
register: csi_crd_manifests register: csi_crd_manifests
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: csi-driver
- name: CSI CRD | Apply Manifests - name: CSI CRD | Apply Manifests
kube: kube:
@ -25,4 +24,3 @@
- not item is skipped - not item is skipped
loop_control: loop_control:
label: "{{ item.item.file }}" label: "{{ item.item.file }}"
tags: csi-driver

View File

@ -3,7 +3,6 @@
fail: fail:
msg: "Credentials file cloud-sa.json is mandatory" msg: "Credentials file cloud-sa.json is mandatory"
when: gcp_pd_csi_sa_cred_file is not defined or not gcp_pd_csi_sa_cred_file when: gcp_pd_csi_sa_cred_file is not defined or not gcp_pd_csi_sa_cred_file
tags: gcp-pd-csi-driver
- name: GCP PD CSI Driver | Copy GCP credentials file - name: GCP PD CSI Driver | Copy GCP credentials file
copy: copy:
@ -12,14 +11,12 @@
group: "{{ kube_cert_group }}" group: "{{ kube_cert_group }}"
mode: 0640 mode: 0640
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: gcp-pd-csi-driver
- name: GCP PD CSI Driver | Get base64 cloud-sa.json - name: GCP PD CSI Driver | Get base64 cloud-sa.json
slurp: slurp:
src: "{{ kube_config_dir }}/cloud-sa.json" src: "{{ kube_config_dir }}/cloud-sa.json"
register: gcp_cred_secret register: gcp_cred_secret
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: gcp-pd-csi-driver
- name: GCP PD CSI Driver | Generate Manifests - name: GCP PD CSI Driver | Generate Manifests
template: template:
@ -33,7 +30,6 @@
- {name: gcp-pd-csi-node, file: gcp-pd-csi-node.yml} - {name: gcp-pd-csi-node, file: gcp-pd-csi-node.yml}
register: gcp_pd_csi_manifests register: gcp_pd_csi_manifests
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: gcp-pd-csi-driver
- name: GCP PD CSI Driver | Apply Manifests - name: GCP PD CSI Driver | Apply Manifests
kube: kube:
@ -47,4 +43,3 @@
- not item is skipped - not item is skipped
loop_control: loop_control:
label: "{{ item.item.file }}" label: "{{ item.item.file }}"
tags: gcp-pd-csi-driver

View File

@ -3,7 +3,6 @@
fail: fail:
msg: "UpCloud username is missing. Env UPCLOUD_USERNAME is mandatory" msg: "UpCloud username is missing. Env UPCLOUD_USERNAME is mandatory"
when: upcloud_username is not defined or not upcloud_username when: upcloud_username is not defined or not upcloud_username
tags: upcloud-csi-driver
- name: UpCloud CSI Driver | Check if UPCLOUD_PASSWORD exists - name: UpCloud CSI Driver | Check if UPCLOUD_PASSWORD exists
fail: fail:
@ -12,7 +11,6 @@
- upcloud_username is defined - upcloud_username is defined
- upcloud_username|length > 0 - upcloud_username|length > 0
- upcloud_password is not defined or not upcloud_password - upcloud_password is not defined or not upcloud_password
tags: upcloud-csi-driver
- name: UpCloud CSI Driver | Generate Manifests - name: UpCloud CSI Driver | Generate Manifests
template: template:
@ -27,7 +25,6 @@
- {name: upcloud-csi-driver, file: upcloud-csi-driver.yml} - {name: upcloud-csi-driver, file: upcloud-csi-driver.yml}
register: upcloud_csi_manifests register: upcloud_csi_manifests
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: upcloud-csi-driver
- name: UpCloud CSI Driver | Apply Manifests - name: UpCloud CSI Driver | Apply Manifests
kube: kube:
@ -41,4 +38,3 @@
- not item is skipped - not item is skipped
loop_control: loop_control:
label: "{{ item.item.file }}" label: "{{ item.item.file }}"
tags: upcloud-csi-driver

View File

@ -1,6 +1,5 @@
--- ---
- include_tasks: vsphere-credentials-check.yml - include_tasks: vsphere-credentials-check.yml
tags: vsphere-csi-driver
- name: vSphere CSI Driver | Generate CSI cloud-config - name: vSphere CSI Driver | Generate CSI cloud-config
template: template:
@ -10,7 +9,6 @@
with_items: with_items:
- vsphere-csi-cloud-config - vsphere-csi-cloud-config
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: vsphere-csi-driver
- name: vSphere CSI Driver | Generate Manifests - name: vSphere CSI Driver | Generate Manifests
template: template:
@ -27,14 +25,12 @@
- vsphere-csi-node.yml - vsphere-csi-node.yml
register: vsphere_csi_manifests register: vsphere_csi_manifests
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: vsphere-csi-driver
- name: vSphere CSI Driver | Generate a CSI secret manifest - name: vSphere CSI Driver | Generate a CSI secret manifest
command: "{{ kubectl }} create secret generic vsphere-config-secret --from-file=csi-vsphere.conf={{ kube_config_dir }}/vsphere-csi-cloud-config -n kube-system --dry-run --save-config -o yaml" command: "{{ kubectl }} create secret generic vsphere-config-secret --from-file=csi-vsphere.conf={{ kube_config_dir }}/vsphere-csi-cloud-config -n kube-system --dry-run --save-config -o yaml"
register: vsphere_csi_secret_manifest register: vsphere_csi_secret_manifest
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
no_log: true no_log: true
tags: vsphere-csi-driver
- name: vSphere CSI Driver | Apply a CSI secret manifest - name: vSphere CSI Driver | Apply a CSI secret manifest
command: command:
@ -42,7 +38,6 @@
stdin: "{{ vsphere_csi_secret_manifest.stdout }}" stdin: "{{ vsphere_csi_secret_manifest.stdout }}"
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
no_log: true no_log: true
tags: vsphere-csi-driver
- name: vSphere CSI Driver | Apply Manifests - name: vSphere CSI Driver | Apply Manifests
kube: kube:
@ -56,4 +51,3 @@
- not item is skipped - not item is skipped
loop_control: loop_control:
label: "{{ item.item }}" label: "{{ item.item }}"
tags: vsphere-csi-driver

View File

@ -1,6 +1,5 @@
--- ---
- include_tasks: vsphere-credentials-check.yml - include_tasks: vsphere-credentials-check.yml
tags: external-vsphere
- name: External vSphere Cloud Controller | Generate CPI cloud-config - name: External vSphere Cloud Controller | Generate CPI cloud-config
template: template:
@ -10,7 +9,6 @@
with_items: with_items:
- external-vsphere-cpi-cloud-config - external-vsphere-cpi-cloud-config
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: external-vsphere
- name: External vSphere Cloud Controller | Generate Manifests - name: External vSphere Cloud Controller | Generate Manifests
template: template:
@ -24,20 +22,17 @@
- external-vsphere-cloud-controller-manager-ds.yml - external-vsphere-cloud-controller-manager-ds.yml
register: external_vsphere_manifests register: external_vsphere_manifests
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: external-vsphere
- name: External vSphere Cloud Provider Interface | Create a CPI configMap manifest - name: External vSphere Cloud Provider Interface | Create a CPI configMap manifest
command: "{{ bin_dir }}/kubectl create configmap cloud-config --from-file=vsphere.conf={{ kube_config_dir }}/external-vsphere-cpi-cloud-config -n kube-system --dry-run --save-config -o yaml" command: "{{ bin_dir }}/kubectl create configmap cloud-config --from-file=vsphere.conf={{ kube_config_dir }}/external-vsphere-cpi-cloud-config -n kube-system --dry-run --save-config -o yaml"
register: external_vsphere_configmap_manifest register: external_vsphere_configmap_manifest
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: external-vsphere
- name: External vSphere Cloud Provider Interface | Apply a CPI configMap manifest - name: External vSphere Cloud Provider Interface | Apply a CPI configMap manifest
command: command:
cmd: "{{ bin_dir }}/kubectl apply -f -" cmd: "{{ bin_dir }}/kubectl apply -f -"
stdin: "{{ external_vsphere_configmap_manifest.stdout }}" stdin: "{{ external_vsphere_configmap_manifest.stdout }}"
when: inventory_hostname == groups['kube_control_plane'][0] when: inventory_hostname == groups['kube_control_plane'][0]
tags: external-vsphere
- name: External vSphere Cloud Controller | Apply Manifests - name: External vSphere Cloud Controller | Apply Manifests
kube: kube:
@ -51,4 +46,3 @@
- not item is skipped - not item is skipped
loop_control: loop_control:
label: "{{ item.item }}" label: "{{ item.item }}"
tags: external-vsphere