* Env vars were not replaced in the templater and is always empty string
in the rendered yamls.
* Updated the correct syntax for using env in templater
Change-Id: I840d7d246d1408addbe9871e1e251e15a35e0305
This patchset introduces a generated with template [1] and encrypted
VariableCatalogue generated-secrets that contains steps to
generate: ephemeral and target CA+admin key/cert and passwords for
users in ephemeral bootstrap iso.
It also introduces the way how these secrets are used in manifests:
They're decrypted by kustomize and incorporated into the folders
`catalogues` in the site, so they can be used by replacement plugin.
This patchset contains modifications in replacement plugin
configurations to put the decrypted values from VariableCatalogue
in place.
Since k8s secrets were substituted with generated values
this patchset removes pre-generated k8s secrets.
[1]
manifests/type/gating/target/generator/secret-template.yaml
Change-Id: I0898c74012833f0e171d36bb8145acf358510b69
Updating linter to latest version, which also updates
gosec to latest version to keep on top of updated security
checks in source code. Also disable gosec testing for rand.new.
Co-Authored-By: Alexander Hughes <Alexander.Hughes@pm.me>
Co-Authored-By: Sreejith Punnapuzha <Sreejith.Punnapuzha@outlook.com>
Change-Id: I46e71c41597f70150ace6d9611da5a01f93a933d
Signed-off-by: Alexander Hughes <Alexander.Hughes@pm.me>
Now GenericContainer input config can be referenced as another
object inside the config bundle (with phase and executor objects).
Change-Id: Iff35e0844b1e9ce4beb72d939e229410208dcb16
zuul takes playbooks from master
and if it's necessary to add one more step to
that playbooks, it's necessary to add that first
to playbook, merge and only after that merge the step
itself.
Change-Id: I9569e1e7e4b8be216563ee66b6e6adea170f5aa1
* Currently if the cluster init command is run & the cluster-api
has already been initialized, the command fails.
* So,this commit adds a warning message that cluster-api already initialized.
Signed-off-by: bijayasharma <vetbijaya@gmail.com>
Change-Id: I93cc6b141c15fa4bc5661646ae0cbdf08580cbf9
Relates-To: #450
Closes: #450
* Add verbose to see little more details on each tasks of play
* Added option to prettyprint verbose in stdout
ANSIBLE_STDOUT_CALLBACK=debug
* Updated the virsh cleanup sequence.
The images(.img) within /var/lib/libvirt/images/ were not removed
Change-Id: I0a52aa4ccca41e3f2258420eb2e1173137ca0d06
This will make sure that phases have access to kubeconfgs generated
by cluster-api for the managed clusters.
Change-Id: Iabecced78192969d7a2ee5a48e75fc3adb0af092
This will make sure that stderr of the generic container in gathered
in a go routine, this way we won't have to wait to see debug messages
from the container until it finishes.
Change-Id: I929719c3369f4f5796d452b5f990bf5f28a4c0d5
This job doesn't work properly since a lot of changes in the
airshipctl logic were applied. All the issues were addressed.
Change-Id: Iec6fa7e6a3aa1ab46d496a8fd63822df1f8124cc
Signed-off-by: Ruslan Aliev <raliev@mirantis.com>
Relates-To: #19
This patch implements new constructor of document.Bundle type
using raw bytes as source.
Change-Id: Ie7742bcf245083ac988541aa9987448f5827fec3
Signed-off-by: Ruslan Aliev <raliev@mirantis.com>
This will enable airship to run containers in privileged mode
as well and to specify commands to be executed.
Change-Id: I663eb55547bb821f26a9071c24d08166a3b3d56b
This also moves KRM related logic from executors package to
container package, and creates ClientV1Alpha1 interface that
would allow us to have versioned clients for generic container
executor.
Change-Id: I4b32fd8dd089b9ccea2ed64a805702e6a8705706
This commit allows to specify options to get container logs, such
as stderr, stdout and if logs should be followed.
Also extends RunCommandOptions with ability to add mounts in addtion
to binds
Relates-To: #458
Change-Id: I83507f2f7ca6ea596f52f5d3e9f868467458b6a3
This patch implements ability to filter phase by given
cluster name.
Change-Id: I4eb95f9f75c57eff4ae8eb41c608c6f6d7fa009c
Signed-off-by: Ruslan Aliev <raliev@mirantis.com>