kubespray/roles/network_plugin/calico/templates
Aleksandr Didenko 3a39904011 Move calico-policy-controller into separate role
By default Calico CNI does not create any network access policies
or profiles if 'policy' is enabled in CNI config. And without any
policies/profiles network access to/from PODs is blocked.

K8s related policies are created by calico-policy-controller in
such case. So we need to start it as soon as possible, before any
real workloads.

This patch also fixes kube-api port in calico-policy-controller
yaml template.

Closes #1132
2017-03-17 11:21:52 +01:00
..
calico-node.service.j2 Allow connections from pods to local endpoints 2017-03-01 09:21:02 +02:00
calico-node.service.legacy.j2 Switch to ansible_hostname in calico 2017-01-25 11:49:58 +01:00
calico.env.j2 Switch to ansible_hostname in calico 2017-01-25 11:49:58 +01:00
calicoctl-container.j2 Fix shell special vars 2017-02-21 22:22:40 +03:00
cni-calico.conf.j2 Move calico-policy-controller into separate role 2017-03-17 11:21:52 +01:00