diff --git a/README.md b/README.md index a949a37cb540e349ff5af27bbe862b7b54936db2..38346326771a617cb63f931d4bda588b1f2ebd14 100644 --- a/README.md +++ b/README.md @@ -83,7 +83,7 @@ vagrant up - [HA mode](docs/ha-mode.md) - [Network plugins](#network-plugins) - [Vagrant install](docs/vagrant.md) -- [CoreOS bootstrap](docs/coreos.md) +- [Flatcar Container Linux bootstrap](docs/flatcar.md) - [Fedora CoreOS bootstrap](docs/fcos.md) - [Debian Jessie setup](docs/debian.md) - [openSUSE setup](docs/opensuse.md) @@ -102,7 +102,7 @@ vagrant up ## Supported Linux Distributions -- **Container Linux by CoreOS** +- **Flatcar Container Linux by Kinvolk** - **Debian** Buster, Jessie, Stretch, Wheezy - **Ubuntu** 16.04, 18.04, 20.04 - **CentOS/RHEL** 7, 8 (experimental: see [centos 8 notes](docs/centos8.md)) diff --git a/Vagrantfile b/Vagrantfile index 160cb57d8202a81523217d704ad397ea016a3919..094295d58c24cbcb0c9145f65b02068aa2704b50 100644 --- a/Vagrantfile +++ b/Vagrantfile @@ -9,16 +9,12 @@ Vagrant.require_version ">= 2.0.0" CONFIG = File.join(File.dirname(__FILE__), ENV['KUBESPRAY_VAGRANT_CONFIG'] || 'vagrant/config.rb') -COREOS_URL_TEMPLATE = "https://storage.googleapis.com/%s.release.core-os.net/amd64-usr/current/coreos_production_vagrant.json" FLATCAR_URL_TEMPLATE = "https://%s.release.flatcar-linux.net/amd64-usr/current/flatcar_production_vagrant.json" # Uniq disk UUID for libvirt DISK_UUID = Time.now.utc.to_i SUPPORTED_OS = { - "coreos-stable" => {box: "coreos-stable", user: "core", box_url: COREOS_URL_TEMPLATE % ["stable"]}, - "coreos-alpha" => {box: "coreos-alpha", user: "core", box_url: COREOS_URL_TEMPLATE % ["alpha"]}, - "coreos-beta" => {box: "coreos-beta", user: "core", box_url: COREOS_URL_TEMPLATE % ["beta"]}, "flatcar-stable" => {box: "flatcar-stable", user: "core", box_url: FLATCAR_URL_TEMPLATE % ["stable"]}, "flatcar-beta" => {box: "flatcar-beta", user: "core", box_url: FLATCAR_URL_TEMPLATE % ["beta"]}, "flatcar-alpha" => {box: "flatcar-alpha", user: "core", box_url: FLATCAR_URL_TEMPLATE % ["alpha"]}, diff --git a/contrib/terraform/aws/README.md b/contrib/terraform/aws/README.md index 3feb03e98e3b8f2678d81eccd9f869bd0f6f4391..bf5c3d5e7aade1d5d59163bb63d3d4383abd8a91 100644 --- a/contrib/terraform/aws/README.md +++ b/contrib/terraform/aws/README.md @@ -22,7 +22,7 @@ export TF_VAR_AWS_SECRET_ACCESS_KEY ="xxx" export TF_VAR_AWS_SSH_KEY_NAME="yyy" export TF_VAR_AWS_DEFAULT_REGION="zzz" ``` -- Update `contrib/terraform/aws/terraform.tfvars` with your data. By default, the Terraform scripts use CoreOS as base image. If you want to change this behaviour, see note "Using other distrib than CoreOs" below. +- Update `contrib/terraform/aws/terraform.tfvars` with your data. By default, the Terraform scripts use Ubuntu 18.04 LTS (Bionic) as base image. If you want to change this behaviour, see note "Using other distrib than Ubuntu" below. - Create an AWS EC2 SSH Key - Run with `terraform apply --var-file="credentials.tfvars"` or `terraform apply` depending if you exported your AWS credentials @@ -41,12 +41,12 @@ ssh -F ./ssh-bastion.conf user@$ip - Once the infrastructure is created, you can run the kubespray playbooks and supply inventory/hosts with the `-i` flag. -Example (this one assumes you are using CoreOS) +Example (this one assumes you are using Ubuntu) ```commandline -ansible-playbook -i ./inventory/hosts ./cluster.yml -e ansible_user=core -b --become-user=root --flush-cache +ansible-playbook -i ./inventory/hosts ./cluster.yml -e ansible_user=ubuntu -b --become-user=root --flush-cache ``` -***Using other distrib than CoreOs*** -If you want to use another distribution than CoreOS, you can modify the search filters of the 'data "aws_ami" "distro"' in variables.tf. +***Using other distrib than Ubuntu*** +If you want to use another distribution than Ubuntu 18.04 (Bionic) LTS, you can modify the search filters of the 'data "aws_ami" "distro"' in variables.tf. For example, to use: - Debian Jessie, replace 'data "aws_ami" "distro"' in variables.tf with diff --git a/contrib/terraform/aws/variables.tf b/contrib/terraform/aws/variables.tf index 8a7e3ae302d09689731a7be202b3ff3b2be949f8..84635edae24f6edd6ddb14da0d5ba20b37c40aa9 100644 --- a/contrib/terraform/aws/variables.tf +++ b/contrib/terraform/aws/variables.tf @@ -25,7 +25,7 @@ data "aws_ami" "distro" { filter { name = "name" - values = ["CoreOS-stable-*"] + values = ["ubuntu/images/hvm-ssd/ubuntu-bionic-18.04-amd64-server-*"] } filter { @@ -33,7 +33,7 @@ data "aws_ami" "distro" { values = ["hvm"] } - owners = ["595879546273"] #CoreOS + owners = ["099720109477"] # Canonical } //AWS VPC Variables diff --git a/contrib/terraform/openstack/README.md b/contrib/terraform/openstack/README.md index 103b4cfe74cb21f52862563cb35428e019284cdf..61737f858a67b25ecaab155f04499e0dd22fb7e8 100644 --- a/contrib/terraform/openstack/README.md +++ b/contrib/terraform/openstack/README.md @@ -72,9 +72,9 @@ specify: - Size of the non-ephemeral volumes to be attached to store the GlusterFS bricks - Other properties related to provisioning the hosts -Even if you are using Container Linux by CoreOS for your cluster, you will still +Even if you are using Flatcar Container Linux by Kinvolk for your cluster, you will still need the GlusterFS VMs to be based on either Debian or RedHat based images. -Container Linux by CoreOS cannot serve GlusterFS, but can connect to it through +Flatcar Container Linux by Kinvolk cannot serve GlusterFS, but can connect to it through binaries available on hyperkube v1.4.3_coreos.0 or higher. ## Requirements @@ -482,7 +482,7 @@ So, either a bastion host, or at least master/node with a floating IP are requir #### Test access -Make sure you can connect to the hosts. Note that Container Linux by CoreOS will have a state `FAILED` due to Python not being present. This is okay, because Python will be installed during bootstrapping, so long as the hosts are not `UNREACHABLE`. +Make sure you can connect to the hosts. Note that Flatcar Container Linux by Kinvolk will have a state `FAILED` due to Python not being present. This is okay, because Python will be installed during bootstrapping, so long as the hosts are not `UNREACHABLE`. ``` $ ansible -i inventory/$CLUSTER/hosts -m ping all @@ -510,7 +510,7 @@ Edit `inventory/$CLUSTER/group_vars/all/all.yml`: # Directory where the binaries will be installed # Default: # bin_dir: /usr/local/bin -# For Container Linux by CoreOS: +# For Flatcar Container Linux by Kinvolk: bin_dir: /opt/bin ``` - and **cloud_provider**: @@ -531,7 +531,7 @@ kube_network_plugin: flannel # Can be docker_dns, host_resolvconf or none # Default: # resolvconf_mode: docker_dns -# For Container Linux by CoreOS: +# For Flatcar Container Linux by Kinvolk: resolvconf_mode: host_resolvconf ``` - Set max amount of attached cinder volume per host (default 256) diff --git a/contrib/terraform/packet/README.md b/contrib/terraform/packet/README.md index b216797e9fd3a5f46e790bc7f63082cf9a0d22c8..059c7ed66bec82a641e52748c8aeff9dcdd037f8 100644 --- a/contrib/terraform/packet/README.md +++ b/contrib/terraform/packet/README.md @@ -176,7 +176,7 @@ If you have deployed and destroyed a previous iteration of your cluster, you wil #### Test access -Make sure you can connect to the hosts. Note that Container Linux by CoreOS will have a state `FAILED` due to Python not being present. This is okay, because Python will be installed during bootstrapping, so long as the hosts are not `UNREACHABLE`. +Make sure you can connect to the hosts. Note that Flatcar Container Linux by Kinvolk will have a state `FAILED` due to Python not being present. This is okay, because Python will be installed during bootstrapping, so long as the hosts are not `UNREACHABLE`. ``` $ ansible -i inventory/$CLUSTER/hosts -m ping all diff --git a/contrib/terraform/terraform.py b/contrib/terraform/terraform.py index 96e57fa0a8b2b31556e2ba90d61d8793085ae11e..42586514276eae05494dd1d2ed13ea659646611f 100755 --- a/contrib/terraform/terraform.py +++ b/contrib/terraform/terraform.py @@ -223,8 +223,8 @@ def packet_device(resource, tfvars=None): 'provider': 'packet', } - if raw_attrs['operating_system'] == 'coreos_stable': - # For CoreOS set the ssh_user to core + if raw_attrs['operating_system'] == 'flatcar_stable': + # For Flatcar set the ssh_user to core attrs.update({'ansible_ssh_user': 'core'}) # add groups based on attrs diff --git a/contrib/vault/roles/vault/tasks/bootstrap/ca_trust.yml b/contrib/vault/roles/vault/tasks/bootstrap/ca_trust.yml index 30e00193fd49d4807ab9ac9f90b83e48e3ca9f9d..7943d5e0c876a0b0e2114bf0697b288971c96c4b 100644 --- a/contrib/vault/roles/vault/tasks/bootstrap/ca_trust.yml +++ b/contrib/vault/roles/vault/tasks/bootstrap/ca_trust.yml @@ -13,7 +13,7 @@ /usr/local/share/ca-certificates/vault-ca.crt {%- elif ansible_os_family == "RedHat" -%} /etc/pki/ca-trust/source/anchors/vault-ca.crt - {%- elif ansible_os_family in ["Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] -%} + {%- elif ansible_os_family in ["Flatcar Container Linux by Kinvolk"] -%} /etc/ssl/certs/vault-ca.pem {%- endif %} @@ -23,9 +23,9 @@ dest: "{{ ca_cert_path }}" register: vault_ca_cert -- name: bootstrap/ca_trust | update ca-certificates (Debian/Ubuntu/CoreOS) +- name: bootstrap/ca_trust | update ca-certificates (Debian/Ubuntu/Flatcar) command: update-ca-certificates - when: vault_ca_cert.changed and ansible_os_family in ["Debian", "CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: vault_ca_cert.changed and ansible_os_family in ["Debian", "Flatcar Container Linux by Kinvolk"] - name: bootstrap/ca_trust | update ca-certificates (RedHat) command: update-ca-trust extract diff --git a/docs/_sidebar.md b/docs/_sidebar.md index cde5247d9f2fab636138fef59153d4bcc6bb14af..c2bdf4e78129461654c520350a26ea1c0cab0454 100644 --- a/docs/_sidebar.md +++ b/docs/_sidebar.md @@ -27,7 +27,7 @@ * [vSphere](/docs/vsphere.md) * Operating Systems * [Debian](docs/debian.md) - * [Coreos](docs/coreos.md) + * [Flatcar Container Linux](docs/flatcar.md) * [Fedora CoreOS](docs/fcos.md) * [OpenSUSE](docs/opensuse.md) * Advanced diff --git a/docs/flatcar.md b/docs/flatcar.md new file mode 100644 index 0000000000000000000000000000000000000000..a581dc6c8ae0cf37f0ae519b715626c730cf5272 --- /dev/null +++ b/docs/flatcar.md @@ -0,0 +1,14 @@ +Flatcar Container Linux bootstrap +=============== + +Example with Ansible: + +Before running the cluster playbook you must satisfy the following requirements: + +General Flatcar Pre-Installation Notes: + +- Ensure that the bin_dir is set to `/opt/bin` +- ansible_python_interpreter should be `/opt/bin/python`. This will be laid down by the bootstrap task. +- The default resolvconf_mode setting of `docker_dns` **does not** work for Flatcar. This is because we do not edit the systemd service file for docker on Flatcar nodes. Instead, just use the `host_resolvconf` mode. It should work out of the box. + +Then you can proceed to [cluster deployment](#run-deployment) diff --git a/docs/vagrant.md b/docs/vagrant.md index f132ead8a136ac8d02d84cdff4c88ab6382ceea6..cd3aa666088b0415a887fce715464c16b973ef97 100644 --- a/docs/vagrant.md +++ b/docs/vagrant.md @@ -17,7 +17,7 @@ By default, Vagrant uses Ubuntu 18.04 box to provision a local cluster. You may Customize `$os` variable in `Vagrantfile` or as override, e.g.,: ```ShellSession -echo '$os = "coreos-stable"' >> vagrant/config.rb +echo '$os = "flatcar-stable"' >> vagrant/config.rb ``` The supported operating systems for vagrant are defined in the `SUPPORTED_OS` constant in the `Vagrantfile`. diff --git a/roles/bootstrap-os/README.md b/roles/bootstrap-os/README.md index e3400fba521b8a61e76fb95bb4fbebd63a1633e7..d202d5533d6032875c682b16faf069cbe0a83f64 100644 --- a/roles/bootstrap-os/README.md +++ b/roles/bootstrap-os/README.md @@ -29,7 +29,7 @@ Variables are listed with their default values, if applicable. ### Per distribution variables -#### CoreOS +#### Flatcar Container Linux * `coreos_locksmithd_disable: false` Whether `locksmithd` (responsible for rolling restarts) should be disabled or be left alone. diff --git a/roles/bootstrap-os/defaults/main.yml b/roles/bootstrap-os/defaults/main.yml index 661b985c3d579a507ea6b30225f8e15eca2224f3..40054b2e39cca0a14a5e2d49602b6efb414d48b7 100644 --- a/roles/bootstrap-os/defaults/main.yml +++ b/roles/bootstrap-os/defaults/main.yml @@ -3,7 +3,7 @@ # Use the fastestmirror yum plugin centos_fastestmirror_enabled: false -## CoreOS specific variables +## Flatcar Container Linux specific variables # Disable locksmithd or leave it in its current state coreos_locksmithd_disable: false diff --git a/roles/bootstrap-os/tasks/bootstrap-flatcar.yml b/roles/bootstrap-os/tasks/bootstrap-flatcar.yml new file mode 100644 index 0000000000000000000000000000000000000000..ba1e8142eb53463aa9a7c4aa7c895bf3295e2fc2 --- /dev/null +++ b/roles/bootstrap-os/tasks/bootstrap-flatcar.yml @@ -0,0 +1,40 @@ +--- +# Flatcar Container Linux ships without Python installed + +- name: Check if bootstrap is needed + raw: stat /opt/bin/.bootstrapped + register: need_bootstrap + environment: {} + failed_when: false + changed_when: false + tags: + - facts + +- name: Force binaries directory for Flatcar Container Linux by Kinvolk + set_fact: + bin_dir: "/opt/bin" + tags: + - facts + +- name: Run bootstrap.sh + script: bootstrap.sh + become: true + environment: + http_proxy: "{{ http_proxy | default('') }}" + https_proxy: "{{ https_proxy | default('') }}" + when: + - need_bootstrap.rc != 0 + +- name: Set the ansible_python_interpreter fact + set_fact: + ansible_python_interpreter: "{{ bin_dir }}/python" + tags: + - facts + +- name: Disable auto-upgrade + systemd: + name: locksmithd.service + masked: true + state: stopped + when: + - coreos_locksmithd_disable diff --git a/roles/bootstrap-os/tasks/main.yml b/roles/bootstrap-os/tasks/main.yml index 738c2001c4af41b2bfa6e811ef100d50749cacca..2047c5f4a9eb89f951e774e9d350f9842e302a56 100644 --- a/roles/bootstrap-os/tasks/main.yml +++ b/roles/bootstrap-os/tasks/main.yml @@ -16,9 +16,9 @@ - include_tasks: bootstrap-fedora-coreos.yml when: '"ID=fedora" in os_release.stdout and "VARIANT_ID=coreos" in os_release.stdout' -- include_tasks: bootstrap-coreos.yml +- include_tasks: bootstrap-flatcar.yml when: - - '"CoreOS" in os_release.stdout or "Flatcar" in os_release.stdout' + - '"Flatcar" in os_release.stdout' - '"ID=fedora" not in os_release.stdout' - include_tasks: bootstrap-debian.yml @@ -50,17 +50,17 @@ name: "{{ inventory_hostname }}" when: - override_system_hostname - - ansible_os_family not in ['Suse', 'Container Linux by CoreOS', 'Flatcar Container Linux by Kinvolk', 'ClearLinux'] and not is_fedora_coreos + - ansible_os_family not in ['Suse', 'Flatcar Container Linux by Kinvolk', 'ClearLinux'] and not is_fedora_coreos # (2/3) -- name: Assign inventory name to unconfigured hostnames (CoreOS, non-Flatcar, Suse and ClearLinux only) +- name: Assign inventory name to unconfigured hostnames (CoreOS, Flatcar, Suse and ClearLinux only) command: "hostnamectl set-hostname {{ inventory_hostname }}" register: hostname_changed become: true changed_when: false when: - override_system_hostname - - ansible_os_family in ['Suse', 'Container Linux by CoreOS', 'Flatcar Container Linux by Kinvolk', 'ClearLinux'] or is_fedora_coreos + - ansible_os_family in ['Suse', 'Flatcar Container Linux by Kinvolk', 'ClearLinux'] or is_fedora_coreos # (3/3) - name: Update hostname fact (CoreOS, Flatcar, Suse and ClearLinux only) @@ -69,7 +69,7 @@ filter: ansible_hostname when: - override_system_hostname - - ansible_os_family in ['Suse', 'Flatcar Container Linux by Kinvolk', 'Container Linux by CoreOS', 'ClearLinux'] or is_fedora_coreos + - ansible_os_family in ['Suse', 'Flatcar Container Linux by Kinvolk', 'ClearLinux'] or is_fedora_coreos - name: "Install ceph-commmon package" package: diff --git a/roles/container-engine/docker/handlers/main.yml b/roles/container-engine/docker/handlers/main.yml index 92eff2b1be1948a45faef78a9170d9a8b996e943..332b1a89f3036e680d4d560ce0970eee5cc1f435 100644 --- a/roles/container-engine/docker/handlers/main.yml +++ b/roles/container-engine/docker/handlers/main.yml @@ -15,7 +15,7 @@ service: name: docker.socket state: restarted - when: ansible_os_family in ['Coreos', 'CoreOS', 'Container Linux by CoreOS', 'Flatcar', 'Flatcar Container Linux by Kinvolk'] or is_fedora_coreos + when: ansible_os_family in ['Flatcar Container Linux by Kinvolk'] or is_fedora_coreos - name: Docker | reload docker service: diff --git a/roles/container-engine/docker/tasks/main.yml b/roles/container-engine/docker/tasks/main.yml index b0d5adbf6cbbdaaf919b515bd973260e8a405141..7e610369d1ef3d39262eaaa40a48bc877d4f8267 100644 --- a/roles/container-engine/docker/tasks/main.yml +++ b/roles/container-engine/docker/tasks/main.yml @@ -43,7 +43,7 @@ docker requires a minimum kernel version of {{ docker_kernel_min_version }} on {{ ansible_distribution }}-{{ ansible_distribution_version }} - when: (not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk", "ClearLinux"]) and (ansible_kernel is version(docker_kernel_min_version, "<")) + when: (not ansible_os_family in ["Flatcar Container Linux by Kinvolk", "ClearLinux"]) and (ansible_kernel is version(docker_kernel_min_version, "<")) tags: - facts @@ -74,7 +74,7 @@ retries: 4 delay: "{{ retry_stagger | d(3) }}" with_items: "{{ docker_repo_key_info.repo_keys }}" - when: not (ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk", "RedHat", "Suse", "ClearLinux"] or is_ostree) + when: not (ansible_os_family in ["Flatcar Container Linux by Kinvolk", "RedHat", "Suse", "ClearLinux"] or is_ostree) - name: ensure docker-ce repository is enabled action: "{{ docker_repo_info.pkg_repo }}" @@ -82,7 +82,7 @@ repo: "{{ item }}" state: present with_items: "{{ docker_repo_info.repos }}" - when: not (ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk", "RedHat", "Suse", "ClearLinux"] or is_ostree) and (docker_repo_info.repos|length > 0) + when: not (ansible_os_family in ["Flatcar Container Linux by Kinvolk", "RedHat", "Suse", "ClearLinux"] or is_ostree) and (docker_repo_info.repos|length > 0) - name: ensure docker-engine repository public key is installed action: "{{ dockerproject_repo_key_info.pkg_key }}" @@ -96,7 +96,7 @@ delay: "{{ retry_stagger | d(3) }}" with_items: "{{ dockerproject_repo_key_info.repo_keys }}" when: - - not (ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk", "RedHat", "Suse", "ClearLinux"] or is_ostree) + - not (ansible_os_family in ["Flatcar Container Linux by Kinvolk", "RedHat", "Suse", "ClearLinux"] or is_ostree) - use_docker_engine is defined and use_docker_engine - name: ensure docker-engine repository is enabled @@ -107,7 +107,7 @@ with_items: "{{ dockerproject_repo_info.repos }}" when: - use_docker_engine is defined and use_docker_engine - - not (ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk", "RedHat", "Suse", "ClearLinux"] or is_ostree) and (dockerproject_repo_info.repos|length > 0) + - not (ansible_os_family in ["Flatcar Container Linux by Kinvolk", "RedHat", "Suse", "ClearLinux"] or is_ostree) and (dockerproject_repo_info.repos|length > 0) - name: Configure docker repository on Fedora template: @@ -172,7 +172,7 @@ delay: "{{ retry_stagger | d(3) }}" with_items: "{{ docker_package_info.pkgs }}" notify: restart docker - when: not (ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk", "ClearLinux"] or is_ostree) and (docker_package_info.pkgs|length > 0) + when: not (ansible_os_family in ["Flatcar Container Linux by Kinvolk", "ClearLinux"] or is_ostree) and (docker_package_info.pkgs|length > 0) ignore_errors: true - name: Ensure docker packages are installed diff --git a/roles/container-engine/docker/tasks/systemd.yml b/roles/container-engine/docker/tasks/systemd.yml index 24d039c298834cf99dc32d16fd84e9f0865a3805..36c9a3a45556624b36a140f4d31fc57bd8028e1d 100644 --- a/roles/container-engine/docker/tasks/systemd.yml +++ b/roles/container-engine/docker/tasks/systemd.yml @@ -27,7 +27,7 @@ dest: /etc/systemd/system/docker.service register: docker_service_file notify: restart docker - when: not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - name: Write docker options systemd drop-in template: diff --git a/roles/download/defaults/main.yml b/roles/download/defaults/main.yml index 7aabc1a2f270c3e0306918bbaa86b13dcc13905b..61bb7ec767d68217e8f32842d454e6747837cb8e 100644 --- a/roles/download/defaults/main.yml +++ b/roles/download/defaults/main.yml @@ -19,7 +19,7 @@ skip_kubeadm_images: false kubeadm_images: {} # if this is set to true will only download files once. Doesn't work -# on Container Linux by CoreOS unless the download_localhost is true and localhost +# on Flatcar Container Linux by Kinvolk unless the download_localhost is true and localhost # is running another OS type. Default compress level is 1 (fastest). download_run_once: false download_compress: 1 @@ -29,7 +29,7 @@ download_container: true # if this is set to true, uses the localhost for download_run_once mode # (requires docker and sudo to access docker). You may want this option for -# local caching of docker images or for Container Linux by CoreOS cluster nodes. +# local caching of docker images or for Flatcar Container Linux by Kinvolk cluster nodes. # Otherwise, uses the first node in the kube-master group to store images # in the download_run_once mode. download_localhost: false @@ -920,7 +920,7 @@ downloads: - k8s-cluster install_socat: - enabled: "{{ ansible_os_family in ['CoreOS', 'Container Linux by CoreOS', 'Flatcar', 'Flatcar Container Linux by Kinvolk'] }}" + enabled: "{{ ansible_os_family in ['Flatcar Container Linux by Kinvolk'] }}" container: true repo: "{{ install_socat_image_repo }}" tag: "{{ install_socat_image_tag }}" diff --git a/roles/download/tasks/prep_download.yml b/roles/download/tasks/prep_download.yml index 88eb414ab2b034d9ad48389644595a327e2fd89c..001aec9538ba1d9285560b56d7ac07456696da69 100644 --- a/roles/download/tasks/prep_download.yml +++ b/roles/download/tasks/prep_download.yml @@ -85,7 +85,7 @@ mode: 0755 owner: "{{ ansible_ssh_user | default(ansible_user_id) }}" when: - - ansible_os_family not in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + - ansible_os_family not in ["Flatcar Container Linux by Kinvolk"] - name: prep_download | Create local cache for files and images on control node file: diff --git a/roles/etcd/meta/main.yml b/roles/etcd/meta/main.yml index 83ed7826a844a37c7ee6b323f45854c5aa38f08c..d7e02edecec355d33118af7e4f2cbf9e39242065 100644 --- a/roles/etcd/meta/main.yml +++ b/roles/etcd/meta/main.yml @@ -2,7 +2,7 @@ dependencies: - role: adduser user: "{{ addusers.etcd }}" - when: not (ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk", "ClearLinux"] or is_fedora_coreos) + when: not (ansible_os_family in ["Flatcar Container Linux by Kinvolk", "ClearLinux"] or is_fedora_coreos) - role: adduser user: "{{ addusers.kube }}" - when: not (ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk", "ClearLinux"] or is_fedora_coreos) + when: not (ansible_os_family in ["Flatcar Container Linux by Kinvolk", "ClearLinux"] or is_fedora_coreos) diff --git a/roles/etcd/tasks/upd_ca_trust.yml b/roles/etcd/tasks/upd_ca_trust.yml index d9b4d5ef8aa867d8e2593c2b1762b9de7696c295..0d1ba1231876614e0e6cae96235853e4dccd979e 100644 --- a/roles/etcd/tasks/upd_ca_trust.yml +++ b/roles/etcd/tasks/upd_ca_trust.yml @@ -6,7 +6,7 @@ /usr/local/share/ca-certificates/etcd-ca.crt {%- elif ansible_os_family == "RedHat" -%} /etc/pki/ca-trust/source/anchors/etcd-ca.crt - {%- elif ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] -%} + {%- elif ansible_os_family in ["Flatcar Container Linux by Kinvolk"] -%} /etc/ssl/certs/etcd-ca.pem {%- elif ansible_os_family == "Suse" -%} /etc/pki/trust/anchors/etcd-ca.pem @@ -23,9 +23,9 @@ remote_src: true register: etcd_ca_cert -- name: Gen_certs | update ca-certificates (Debian/Ubuntu/SUSE/Container Linux by CoreOS) # noqa 503 +- name: Gen_certs | update ca-certificates (Debian/Ubuntu/SUSE/Flatcar) # noqa 503 command: update-ca-certificates - when: etcd_ca_cert.changed and ansible_os_family in ["Debian", "CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk", "Suse"] + when: etcd_ca_cert.changed and ansible_os_family in ["Debian", "Flatcar Container Linux by Kinvolk", "Suse"] - name: Gen_certs | update ca-certificates (RedHat) # noqa 503 command: update-ca-trust extract diff --git a/roles/kubernetes-apps/external_provisioner/local_volume_provisioner/README.md b/roles/kubernetes-apps/external_provisioner/local_volume_provisioner/README.md index e732d1b5b397fe5886d390a4d101dbf082193e8c..c8b935b064868b60916aae73315fccd6ea5fc325 100644 --- a/roles/kubernetes-apps/external_provisioner/local_volume_provisioner/README.md +++ b/roles/kubernetes-apps/external_provisioner/local_volume_provisioner/README.md @@ -118,7 +118,7 @@ delete the daemonset pod on the relevant host after creating volumes. The pod will be recreated and read the size correctly. Make sure to make any mounts persist via /etc/fstab or with systemd mounts (for -CoreOS/Container Linux and Flatcar). Pods with persistent volume claims will not be +Flatcar Container Linux). Pods with persistent volume claims will not be able to start if the mounts become unavailable. Further reading diff --git a/roles/kubernetes-apps/helm/tasks/install_host.yml b/roles/kubernetes-apps/helm/tasks/install_host.yml index cc9a99c79bfc0d9f66f4107cdbf068a4fdd6947a..e4eb54c4358b8d38f5b2d4f12aad51c8003ac0d8 100644 --- a/roles/kubernetes-apps/helm/tasks/install_host.yml +++ b/roles/kubernetes-apps/helm/tasks/install_host.yml @@ -35,8 +35,8 @@ retries: 4 delay: "{{ retry_stagger | random + 3 }}" -- name: Helm | Copy socat wrapper for Container Linux and Flatcat +- name: Helm | Copy socat wrapper for Flatcar Container Linux by Kinvolk command: "{{ docker_bin_dir }}/docker run --rm -v {{ bin_dir }}:/opt/bin {{ install_socat_image_repo }}:{{ install_socat_image_tag }}" args: creates: "{{ bin_dir }}/socat" - when: ansible_os_family in ['CoreOS', 'Container Linux by CoreOS', 'Flatcar', 'Flatcar Container Linux by Kinvolk'] + when: ansible_os_family in ['Flatcar Container Linux by Kinvolk'] diff --git a/roles/kubernetes-apps/helm/tasks/main.yml b/roles/kubernetes-apps/helm/tasks/main.yml index d838fb60fdcb222e3c717304fe0cd2b96579828a..754ef74ebfc4b4b9404788d86a285d816439787c 100644 --- a/roles/kubernetes-apps/helm/tasks/main.yml +++ b/roles/kubernetes-apps/helm/tasks/main.yml @@ -126,4 +126,4 @@ shell: "umask 022 && {{ bin_dir }}/helm completion bash >/etc/bash_completion.d/helm.sh" when: - ((helm_container is defined and helm_container.changed) or (helm_task_result is defined and helm_task_result.changed)) - - not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + - not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] diff --git a/roles/kubernetes/node/tasks/install.yml b/roles/kubernetes/node/tasks/install.yml index 911d5d8b3018d35df229d9ec7576fe236623d8df..339c43df3adfc0fa943e8c7d30af952a4c8021b8 100644 --- a/roles/kubernetes/node/tasks/install.yml +++ b/roles/kubernetes/node/tasks/install.yml @@ -50,4 +50,4 @@ command: "{{ docker_bin_dir }}/docker run --rm -v {{ bin_dir }}:/opt/bin {{ install_socat_image_repo }}:{{ install_socat_image_tag }}" args: creates: "{{ bin_dir }}/socat" - when: ansible_os_family in ['CoreOS', 'Container Linux by CoreOS', 'Flatcar', 'Flatcar Container Linux by Kinvolk'] + when: ansible_os_family in ['Flatcar Container Linux by Kinvolk'] diff --git a/roles/kubernetes/preinstall/defaults/main.yml b/roles/kubernetes/preinstall/defaults/main.yml index 1a83ec9b451b930e0aec82df52971b75677e62ba..f0b54c444a4a28257270c453525d9c82f0486a1a 100644 --- a/roles/kubernetes/preinstall/defaults/main.yml +++ b/roles/kubernetes/preinstall/defaults/main.yml @@ -26,7 +26,7 @@ kube_cert_dir: "{{ kube_config_dir }}/ssl" kube_cert_compat_dir: /etc/kubernetes/pki kubelet_flexvolumes_plugins_dir: /usr/libexec/kubernetes/kubelet-plugins/volume/exec -# Container Linux by CoreOS cloud init config file to define /etc/resolv.conf content +# Flatcar Container Linux by Kinvolk cloud init config file to define /etc/resolv.conf content # for hostnet pods and infra needs resolveconf_cloud_init_conf: /etc/resolveconf_cloud_init.conf diff --git a/roles/kubernetes/preinstall/handlers/main.yml b/roles/kubernetes/preinstall/handlers/main.yml index 097ba1d73b3bdcb6e15c2f3f3e85c4db577f3d56..53013ffce9b35939ad1c5f9c1e908e4fd2f421b7 100644 --- a/roles/kubernetes/preinstall/handlers/main.yml +++ b/roles/kubernetes/preinstall/handlers/main.yml @@ -9,18 +9,18 @@ - Preinstall | restart kube-controller-manager crio/containerd - Preinstall | restart kube-apiserver docker - Preinstall | restart kube-apiserver crio/containerd - when: not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] and not is_fedora_coreos + when: not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] and not is_fedora_coreos -- name: Preinstall | update resolvconf for Container Linux by CoreOS and Flatcar +- name: Preinstall | update resolvconf for Flatcar Container Linux by Kinvolk command: /bin/true notify: - Preinstall | apply resolvconf cloud-init - Preinstall | reload kubelet - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - name: Preinstall | apply resolvconf cloud-init command: /usr/bin/coreos-cloudinit --from-file {{ resolveconf_cloud_init_conf }} - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - name: Preinstall | update resolvconf for Fedora CoreOS command: /bin/true diff --git a/roles/kubernetes/preinstall/tasks/0020-verify-settings.yml b/roles/kubernetes/preinstall/tasks/0020-verify-settings.yml index 0bdc2201076ca5ce6c2bd4cb86a0acb6106f18d1..07c53965d7fb4109909d093809a9653933863211 100644 --- a/roles/kubernetes/preinstall/tasks/0020-verify-settings.yml +++ b/roles/kubernetes/preinstall/tasks/0020-verify-settings.yml @@ -16,7 +16,7 @@ - name: Stop if unknown OS assert: - that: ansible_os_family in ['RedHat', 'CentOS', 'Fedora', 'Ubuntu', 'Debian', 'CoreOS', 'Coreos', 'Container Linux by CoreOS', 'Flatcar', 'Flatcar Container Linux by Kinvolk', 'Suse', 'ClearLinux', 'OracleLinux'] + that: ansible_os_family in ['RedHat', 'CentOS', 'Fedora', 'Ubuntu', 'Debian', 'Flatcar Container Linux by Kinvolk', 'Suse', 'ClearLinux', 'OracleLinux'] msg: "{{ ansible_os_family }} is not a known OS" when: not ignore_assert_errors @@ -282,8 +282,8 @@ msg: "download_run_once support only for docker. See https://github.com/containerd/containerd/issues/4075 for details" when: download_run_once or download_force_cache -- name: Stop if download_localhost is enabled for CoreOS or Flatcar +- name: Stop if download_localhost is enabled for Flatcar Container Linux assert: - that: ansible_os_family not in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] - msg: "download_run_once not support for CoreOS or Flatcar" + that: ansible_os_family not in ["Flatcar Container Linux by Kinvolk"] + msg: "download_run_once not supported for Flatcar Container Linux" when: download_run_once or download_force_cache diff --git a/roles/kubernetes/preinstall/tasks/0040-set_facts.yml b/roles/kubernetes/preinstall/tasks/0040-set_facts.yml index 784233c20b6f9fb762fbc21ae507d95b65a742e1..5fe9b5044b37ae1f3c1ea58563a1f4790ee44e77 100644 --- a/roles/kubernetes/preinstall/tasks/0040-set_facts.yml +++ b/roles/kubernetes/preinstall/tasks/0040-set_facts.yml @@ -1,8 +1,8 @@ --- -- name: Force binaries directory for Container Linux by CoreOS and Flatcar +- name: Force binaries directory for Flatcar Container Linux by Kinvolk set_fact: bin_dir: "/opt/bin" - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] tags: - facts @@ -73,12 +73,12 @@ {%- if resolvconf|bool -%}/etc/resolvconf/resolv.conf.d/base{%- endif -%} head: >- {%- if resolvconf|bool -%}/etc/resolvconf/resolv.conf.d/head{%- endif -%} - when: not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] and not is_fedora_coreos + when: not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] and not is_fedora_coreos -- name: target temporary resolvconf cloud init file (Container Linux by CoreOS) +- name: target temporary resolvconf cloud init file (Flatcar Container Linux by Kinvolk / Fedora CoreOS) set_fact: resolvconffile: /tmp/resolveconf_cloud_init_conf - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] or is_fedora_coreos + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] or is_fedora_coreos - name: check if /etc/dhclient.conf exists stat: diff --git a/roles/kubernetes/preinstall/tasks/0060-resolvconf.yml b/roles/kubernetes/preinstall/tasks/0060-resolvconf.yml index 805b93a37f6a828a36fd20d2bb2bfac8877eecb7..39921595ec408319414625d17919cada811d6027 100644 --- a/roles/kubernetes/preinstall/tasks/0060-resolvconf.yml +++ b/roles/kubernetes/preinstall/tasks/0060-resolvconf.yml @@ -1,7 +1,7 @@ --- - name: create temporary resolveconf cloud init file command: cp -f /etc/resolv.conf "{{ resolvconffile }}" - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - name: Add domain/search/nameservers/options to resolv.conf blockinfile: @@ -47,7 +47,7 @@ - name: get temporary resolveconf cloud init file content command: cat {{ resolvconffile }} register: cloud_config - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - name: persist resolvconf cloud init file template: @@ -55,5 +55,5 @@ src: resolvconf.j2 owner: root mode: 0644 - notify: Preinstall | update resolvconf for Container Linux by CoreOS and Flatcar - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + notify: Preinstall | update resolvconf for Flatcar Container Linux by Kinvolk + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] diff --git a/roles/kubernetes/preinstall/tasks/0070-system-packages.yml b/roles/kubernetes/preinstall/tasks/0070-system-packages.yml index d447c70e4c93f5b35ef603234388ca30866a75fa..fa5f5f0f3fab30f618bddb47f8f8ee1966feee7b 100644 --- a/roles/kubernetes/preinstall/tasks/0070-system-packages.yml +++ b/roles/kubernetes/preinstall/tasks/0070-system-packages.yml @@ -79,7 +79,7 @@ until: pkgs_task_result is succeeded retries: 4 delay: "{{ retry_stagger | random + 3 }}" - when: not (ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk", "ClearLinux"] or is_fedora_coreos) + when: not (ansible_os_family in ["Flatcar Container Linux by Kinvolk", "ClearLinux"] or is_fedora_coreos) tags: - bootstrap-os diff --git a/roles/kubernetes/preinstall/tasks/0080-system-configurations.yml b/roles/kubernetes/preinstall/tasks/0080-system-configurations.yml index 1ef46f6eeb532edaa3fb30ad0e576bd63ff7b6e2..03716c38aa041c2e63360c229f93ce272b98c94a 100644 --- a/roles/kubernetes/preinstall/tasks/0080-system-configurations.yml +++ b/roles/kubernetes/preinstall/tasks/0080-system-configurations.yml @@ -29,7 +29,7 @@ backup: yes when: - disable_ipv6_dns - - not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + - not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] tags: - bootstrap-os diff --git a/roles/kubernetes/preinstall/tasks/main.yml b/roles/kubernetes/preinstall/tasks/main.yml index e1a6a71af7a1e8585d85321cb3de57f25213f1ab..d1b1b112db1db3218c839ec1d6aa80225f81f850 100644 --- a/roles/kubernetes/preinstall/tasks/main.yml +++ b/roles/kubernetes/preinstall/tasks/main.yml @@ -79,7 +79,7 @@ when: - dns_mode != 'none' - resolvconf_mode == 'host_resolvconf' - - not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + - not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] tags: - bootstrap-os - resolvconf @@ -88,7 +88,7 @@ when: - dns_mode != 'none' - resolvconf_mode != 'host_resolvconf' - - not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + - not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] tags: - bootstrap-os - resolvconf diff --git a/roles/kubespray-defaults/defaults/main.yaml b/roles/kubespray-defaults/defaults/main.yaml index 34af681c7c93331c4165bdbce317d1d4b5b33072..dcbec258619df1ebeca264a557a0a4b656d6de95 100644 --- a/roles/kubespray-defaults/defaults/main.yaml +++ b/roles/kubespray-defaults/defaults/main.yaml @@ -428,7 +428,7 @@ contiv_global_neighbor_as: "500" ssl_ca_dirs: >- [ - {% if ansible_os_family in ['CoreOS', 'Container Linux by CoreOS', 'Flatcar', 'Flatcar Container Linux by Kinvolk'] -%} + {% if ansible_os_family in ['Flatcar Container Linux by Kinvolk'] -%} '/usr/share/ca-certificates', {% elif ansible_os_family == 'RedHat' -%} '/etc/pki/tls', diff --git a/roles/network_plugin/macvlan/handlers/main.yml b/roles/network_plugin/macvlan/handlers/main.yml index 37b7880233f49c5cb9793b63fc87ed6db61a6c84..ccce5c3dd1037cb6217582c80c9c976cdd6a6cbb 100644 --- a/roles/network_plugin/macvlan/handlers/main.yml +++ b/roles/network_plugin/macvlan/handlers/main.yml @@ -3,7 +3,7 @@ command: /bin/true notify: - Macvlan | reload network - when: not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - name: Macvlan | reload network service: @@ -16,4 +16,4 @@ networking {%- endif %} state: restarted - when: not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] and kube_network_plugin not in ['canal', 'calico'] + when: not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] and kube_network_plugin not in ['canal', 'calico'] diff --git a/roles/network_plugin/macvlan/tasks/main.yml b/roles/network_plugin/macvlan/tasks/main.yml index d965bfa96c52c2929ec9003095222cf8d1985cc8..45f877f6fb0a66fc4ef86e12653e0be713d9fb7f 100644 --- a/roles/network_plugin/macvlan/tasks/main.yml +++ b/roles/network_plugin/macvlan/tasks/main.yml @@ -57,20 +57,20 @@ notify: Macvlan | restart network when: ansible_os_family in ["CentOS","RedHat"] -- name: Macvlan | Install service nat via gateway on coreos +- name: Macvlan | Install service nat via gateway on Flatcar Container Linux template: src: coreos-service-nat_ouside.j2 dest: /etc/systemd/system/enable_nat_ouside.service - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] and enable_nat_default_gateway + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] and enable_nat_default_gateway -- name: Macvlan | Enable service nat via gateway on coreos +- name: Macvlan | Enable service nat via gateway on Flatcar Container Linux command: "{{ item }}" with_items: - systemctl daemon-reload - systemctl enable enable_nat_ouside.service - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] and enable_nat_default_gateway + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] and enable_nat_default_gateway -- name: Macvlan | Install network gateway interface on coreos +- name: Macvlan | Install network gateway interface on Flatcar Container Linux template: src: "{{ item.src }}.j2" dest: "/etc/systemd/network/{{ item.dst }}" @@ -79,7 +79,7 @@ - {src: coreos-interface-macvlan.cfg, dst: output.network } - {src: coreos-network-macvlan.cfg, dst: macvlan.network } notify: Macvlan | restart network - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - name: Macvlan | Install cni definition for Macvlan template: diff --git a/roles/reset/tasks/main.yml b/roles/reset/tasks/main.yml index 6d1d815ff18d891818a76fd0808f8c3f9c6c44a8..886fa9a41b3f547d3b3af69373d9e97dc4692b23 100644 --- a/roles/reset/tasks/main.yml +++ b/roles/reset/tasks/main.yml @@ -313,7 +313,7 @@ {%- endif %} state: restarted when: - - ansible_os_family not in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + - ansible_os_family not in ["Flatcar Container Linux by Kinvolk"] - reset_restart_network tags: - services diff --git a/tests/cloud_playbooks/create-do.yml b/tests/cloud_playbooks/create-do.yml index 4fa4c33ca54f1a17197af9f76e299356a3b5b0b0..3b58aa0d37470f100aef5cf9cce3338529e4672b 100644 --- a/tests/cloud_playbooks/create-do.yml +++ b/tests/cloud_playbooks/create-do.yml @@ -20,7 +20,6 @@ - sfo2 - blr1 cloud_images: - - coreos-beta - fedora-24-x64 - centos-5-x64 - centos-5-x32 @@ -31,12 +30,10 @@ - debian-8-x32 - centos-6-x32 - centos-6-x64 - - coreos-stable - ubuntu-16-10-x32 - ubuntu-16-10-x64 - freebsd-11-0-x64-zfs - freebsd-10-3-x64-zfs - - coreos-alpha - ubuntu-12-04-x32 - ubuntu-12-04-x64 - ubuntu-16-04-x64 diff --git a/tests/scripts/testcases_run.sh b/tests/scripts/testcases_run.sh index 551e854c889221336bb6ae2873ce0c59a9a6f275..658ca389040356427da8676575ca53a6b335b5b2 100755 --- a/tests/scripts/testcases_run.sh +++ b/tests/scripts/testcases_run.sh @@ -23,7 +23,7 @@ export ANSIBLE_BECOME_USER=root cd tests && make create-${CI_PLATFORM} -s ; cd - ansible-playbook tests/cloud_playbooks/wait-for-ssh.yml -# CoreOS needs auto update disabled +# Flatcar Container Linux needs auto update disabled if [[ "$CI_JOB_NAME" =~ "coreos" ]]; then ansible all -m raw -a 'systemctl disable locksmithd' ansible all -m raw -a 'systemctl stop locksmithd' diff --git a/tests/testcases/015_check-nodes-ready.yml b/tests/testcases/015_check-nodes-ready.yml index 7d2547574be3e0c6fc7e9fae399d5233c9102c59..e233d5e03b21b98245eb18e19cb081fee486a380 100644 --- a/tests/testcases/015_check-nodes-ready.yml +++ b/tests/testcases/015_check-nodes-ready.yml @@ -2,15 +2,15 @@ - hosts: kube-master[0] tasks: - - name: Force binaries directory for Container Linux by CoreOS and Flatcar + - name: Force binaries directory for Flatcar Container Linux by Kinvolk set_fact: bin_dir: "/opt/bin" - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - name: Force binaries directory for other hosts set_fact: bin_dir: "/usr/local/bin" - when: not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - import_role: name: cluster-dump diff --git a/tests/testcases/020_check-pods-running.yml b/tests/testcases/020_check-pods-running.yml index 33e0fa368dff99531a67bb85b251b46ac15507f0..504219dc46ccff05ef14ee970bc2967a66828500 100644 --- a/tests/testcases/020_check-pods-running.yml +++ b/tests/testcases/020_check-pods-running.yml @@ -2,15 +2,15 @@ - hosts: kube-master[0] tasks: - - name: Force binaries directory for Container Linux by CoreOS and Flatcar + - name: Force binaries directory for Flatcar Container Linux by Kinvolk set_fact: bin_dir: "/opt/bin" - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - name: Force binaries directory for other hosts set_fact: bin_dir: "/usr/local/bin" - when: not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - import_role: name: cluster-dump diff --git a/tests/testcases/030_check-network.yml b/tests/testcases/030_check-network.yml index c2dd62d907786e9d7d66ca3eb896d578e066ab0a..73e5de22e7f2876979e7f8869738c2bf24f002a8 100644 --- a/tests/testcases/030_check-network.yml +++ b/tests/testcases/030_check-network.yml @@ -5,15 +5,15 @@ test_image_tag: latest tasks: - - name: Force binaries directory for Container Linux by CoreOS and Flatcar + - name: Force binaries directory for Flatcar Container Linux by Kinvolk set_fact: bin_dir: "/opt/bin" - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - name: Force binaries directory for other hosts set_fact: bin_dir: "/usr/local/bin" - when: not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - name: Create test namespace # noqa 301 305 shell: "{{ bin_dir }}/kubectl create namespace test" diff --git a/tests/testcases/040_check-network-adv.yml b/tests/testcases/040_check-network-adv.yml index 2e9e4c4ef34826fde2818cd5140ef09d92818acb..42c1369290bcc1c9e2c56965517773cd283cdeb6 100644 --- a/tests/testcases/040_check-network-adv.yml +++ b/tests/testcases/040_check-network-adv.yml @@ -19,12 +19,12 @@ - name: Force binaries directory for Container Linux by CoreOS and Flatcar set_fact: bin_dir: "/opt/bin" - when: ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - name: Force binaries directory on other hosts set_fact: bin_dir: "/usr/local/bin" - when: not ansible_os_family in ["CoreOS", "Coreos", "Container Linux by CoreOS", "Flatcar", "Flatcar Container Linux by Kinvolk"] + when: not ansible_os_family in ["Flatcar Container Linux by Kinvolk"] - import_role: name: cluster-dump