Skip to content
  1. Feb 27, 2017
  2. Feb 23, 2017
  3. Feb 18, 2017
    • Abel Lopez's avatar
      Safe disable SELinux · 0bfc2d0f
      Abel Lopez authored
      Sometimes, a sysadmin might outright delete the SELinux rpms and
      delete the configuration. This causes the selinux module to fail
      with
      ```
      IOError: [Errno 2] No such file or directory: '/etc/selinux/config'\n",
      "module_stdout": "", "msg": "MODULE FAILURE"}
      ```
      
      This simply checks that /etc/selinux/config exists before we try
      to set it Permissive.
      
      Update from feedback
      0bfc2d0f
    • Andrew Greenwood's avatar
      Cleanup legacy syntax, spacing, files all to yml · ca9ea097
      Andrew Greenwood authored
      Migrate older inline= syntax to pure yml syntax for module args as to be consistant with most of the rest of the tasks
      Cleanup some spacing in various files
      Rename some files named yaml to yml for consistancy
      ca9ea097
  4. Feb 13, 2017
    • Vladimir Rutsky's avatar
      set "check_mode: no" for read-only "shell" steps that registers result · 09847567
      Vladimir Rutsky authored
      "shell" step doesn't support check mode, which currently leads to failures,
      when Ansible is being run in check mode (because Ansible doesn't run command,
      assuming that command might have effect, and no "rc" or "output" is registered).
      
      Setting "check_mode: no" allows to run those "shell" commands in check mode
      (which is safe, because those shell commands doesn't have side effects).
      09847567
    • Sergii Golovatiuk's avatar
      Replace always_run with check_mode · 5f4cc3e1
      Sergii Golovatiuk authored
      always_run was deprecated in Ansible 2.2 and will be removed in 2.4
      ansible logs contain "[DEPRECATION WARNING]: always_run is deprecated.
      Use check_mode = no instead". This patch fix deprecation.
      5f4cc3e1
  5. Feb 09, 2017
  6. Feb 06, 2017
  7. Jan 31, 2017
  8. Jan 27, 2017
  9. Jan 26, 2017
  10. Jan 20, 2017
    • Bogdan Dobrelya's avatar
      Drop linux capabilities and rework users/groups · cb2e5ac7
      Bogdan Dobrelya authored
      
      
      * Drop linux capabilities for unprivileged containerized
        worlkoads Kargo configures for deployments.
      * Configure required securityContext/user/group/groups for kube
        components' static manifests, etcd, calico-rr and k8s apps,
        like dnsmasq daemonset.
      * Rework cloud-init (etcd) users creation for CoreOS.
      * Fix nologin paths, adjust defaults for addusers role and ensure
        supplementary groups membership added for users.
      * Add netplug user for network plugins (yet unused by privileged
        networking containers though).
      * Grant the kube and netplug users read access for etcd certs via
        the etcd certs group.
      * Grant group read access to kube certs via the kube cert group.
      * Remove priveleged mode for calico-rr and run it under its uid/gid
        and supplementary etcd_cert group.
      * Adjust docs.
      * Align cpu/memory limits and dropped caps with added rkt support
        for control plane.
      
      Signed-off-by: default avatarBogdan Dobrelya <bogdando@mail.ru>
      cb2e5ac7
  11. Jan 18, 2017
  12. Jan 15, 2017
  13. Jan 13, 2017
  14. Jan 12, 2017
  15. Jan 11, 2017
  16. Jan 06, 2017
  17. Jan 05, 2017
  18. Jan 02, 2017
  19. Dec 27, 2016
  20. Dec 23, 2016
  21. Dec 22, 2016
  22. Dec 16, 2016
  23. Dec 15, 2016
  24. Dec 14, 2016
  25. Dec 13, 2016
Loading