28 lines
1.3 KiB
YAML
28 lines
1.3 KiB
YAML
---
|
|
- register: "clusterrolebinding_state"
|
|
command: "kubectl get clusterrolebinding heketi-gluster-admin -o=name --ignore-not-found=true"
|
|
changed_when: false
|
|
- name: "Kubernetes Apps | Deploy cluster role binding."
|
|
when: "clusterrolebinding_state.stdout == \"\""
|
|
command: "kubectl create clusterrolebinding heketi-gluster-admin --clusterrole=edit --serviceaccount=default:heketi-service-account"
|
|
- register: "clusterrolebinding_state"
|
|
command: "kubectl get clusterrolebinding heketi-gluster-admin -o=name --ignore-not-found=true"
|
|
changed_when: false
|
|
- assert: { that: "clusterrolebinding_state.stdout != \"\"", message: "Cluster role binding is not present." }
|
|
|
|
- register: "secret_state"
|
|
command: "kubectl get secret heketi-config-secret -o=name --ignore-not-found=true"
|
|
changed_when: false
|
|
- name: "Render Heketi secret configuration."
|
|
become: true
|
|
template:
|
|
src: "heketi.json.j2"
|
|
dest: "{{ kube_config_dir }}/heketi.json"
|
|
- name: "Deploy Heketi config secret"
|
|
when: "secret_state.stdout == \"\""
|
|
command: "kubectl create secret generic heketi-config-secret --from-file={{ kube_config_dir }}/heketi.json"
|
|
- register: "secret_state"
|
|
command: "kubectl get secret heketi-config-secret -o=name --ignore-not-found=true"
|
|
changed_when: false
|
|
- assert: { that: "secret_state.stdout != \"\"", message: "Heketi config secret is not present." }
|