Skip to content

Commit df425ac

Browse files
Fix etcd certificates reference to support etcd_kubeadm_enabled:true (kubernetes-sigs#7766)
* Fix etcd certificates reference to support etcd_kubeadm_enabled:true * Add retries to ETCD Join Member task * Fix etcd certificates reference when etcd_kubeadm_enabled:true * Fix conflicts
1 parent 57a1d18 commit df425ac

File tree

3 files changed

+10
-10
lines changed

3 files changed

+10
-10
lines changed

recover-control-plane.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
environment: "{{ proxy_disable_env }}"
1717
roles:
1818
- { role: kubespray-defaults}
19-
- { role: recover_control_plane/etcd }
19+
- { role: recover_control_plane/etcd, when: "not etcd_kubeadm_enabled|default(false)" }
2020

2121
- hosts: kube_control_plane[0]
2222
environment: "{{ proxy_disable_env }}"

roles/network_plugin/canal/tasks/main.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -42,9 +42,9 @@
4242
run_once: true
4343
environment:
4444
ETCDCTL_API: 2
45-
ETCDCTL_CA_FILE: "{{ etcd_cert_dir }}/ca.pem"
46-
ETCDCTL_CERT_FILE: "{{ etcd_cert_dir }}/admin-{{ groups['etcd'][0] }}.pem"
47-
ETCDCTL_KEY_FILE: "{{ etcd_cert_dir }}/admin-{{ groups['etcd'][0] }}-key.pem"
45+
ETCDCTL_CA_FILE: "{{ kube_cert_dir + '/etcd/ca.crt' if etcd_kubeadm_enabled else etcd_cert_dir + '/ca.pem' }}"
46+
ETCDCTL_CERT_FILE: "{{ kube_cert_dir + '/etcd/server.crt' if etcd_kubeadm_enabled else etcd_cert_dir + '/admin-' + groups['etcd'][0] + '.pem' }}"
47+
ETCDCTL_KEY_FILE: "{{ kube_cert_dir + '/etcd/server.key' if etcd_kubeadm_enabled else etcd_cert_dir + '/admin-' + groups['etcd'][0] + '-key.pem' }}"
4848
ETCDCTL_ENDPOINTS: "{{ etcd_access_addresses }}"
4949

5050
- name: Canal | Create canal node manifests

roles/remove-node/remove-etcd-node/tasks/main.yml

+6-6
Original file line numberDiff line numberDiff line change
@@ -34,9 +34,9 @@
3434
- facts
3535
environment:
3636
ETCDCTL_API: 3
37-
ETCDCTL_CERT: "{{ etcd_cert_dir }}/admin-{{ groups['etcd']|first }}.pem"
38-
ETCDCTL_KEY: "{{ etcd_cert_dir }}/admin-{{ groups['etcd']|first }}-key.pem"
39-
ETCDCTL_CACERT: "{{ etcd_cert_dir }}/ca.pem"
37+
ETCDCTL_CERT: "{{ kube_cert_dir + '/etcd/server.crt' if etcd_kubeadm_enabled else etcd_cert_dir + '/admin-' + groups['etcd']|first + '.pem' }}"
38+
ETCDCTL_KEY: "{{ kube_cert_dir + '/etcd/server.key' if etcd_kubeadm_enabled else etcd_cert_dir + '/admin-' + groups['etcd']|first + '-key.pem' }}"
39+
ETCDCTL_CACERT: "{{ kube_cert_dir + '/etcd/ca.crt' if etcd_kubeadm_enabled else etcd_cert_dir + '/ca.pem' }}"
4040
ETCDCTL_ENDPOINTS: "https://{{ hostvars[groups['etcd']|first]['etcd_access_address'] |
4141
default(hostvars[groups['etcd']|first]['ip']) |
4242
default(hostvars[groups['etcd']|first]['fallback_ips'][groups['etcd']|first]) }}:2379"
@@ -52,9 +52,9 @@
5252
- facts
5353
environment:
5454
ETCDCTL_API: 3
55-
ETCDCTL_CERT: "{{ etcd_cert_dir }}/admin-{{ groups['etcd']|first }}.pem"
56-
ETCDCTL_KEY: "{{ etcd_cert_dir }}/admin-{{ groups['etcd']|first }}-key.pem"
57-
ETCDCTL_CACERT: "{{ etcd_cert_dir }}/ca.pem"
55+
ETCDCTL_CERT: "{{ kube_cert_dir + '/etcd/server.crt' if etcd_kubeadm_enabled else etcd_cert_dir + '/admin-' + groups['etcd']|first + '.pem' }}"
56+
ETCDCTL_KEY: "{{ kube_cert_dir + '/etcd/server.key' if etcd_kubeadm_enabled else etcd_cert_dir + '/admin-' + groups['etcd']|first + '-key.pem' }}"
57+
ETCDCTL_CACERT: "{{ kube_cert_dir + '/etcd/ca.crt' if etcd_kubeadm_enabled else etcd_cert_dir + '/ca.pem' }}"
5858
ETCDCTL_ENDPOINTS: "https://{{ hostvars[groups['etcd']|first]['etcd_access_address'] |
5959
default(hostvars[groups['etcd']|first]['ip']) |
6060
default(hostvars[groups['etcd']|first]['fallback_ips'][groups['etcd']|first]) }}:2379"

0 commit comments

Comments
 (0)